Results for 'Labour security '

960 found
Order:
  1. Global Policy Convergence and Labour Relations in India.Deepa Kansra - 2013 - International Journal of Law and Policy Review 2 (1):209-218.
    The process of economic globalization has over the years accelerated the pace of labour policy convergence. In the Indian context, labour law since 1991 has witnessed a paradigm shift while embracing a policy of global integration. The ambit of labour relations is now being related with private practice or the informal settings, leading to multiple concerns over labour justice and security. In compliance with global standards, the continuous emphasis upon labour flexibility characterised by flexible (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Labor automation for fair cooperation: Why and how machines should provide meaningful work for all.Denise Celentano - 2023 - Journal of Social Philosophy (1):1-19.
    The article explores the problem of preferable technological changes in the context of work. To this end, it addresses the ‘why’ (motives and values) and the ‘how’ (organizational forms) of automation from a normative perspective. Concerning the ‘why,’ automation processes are currently mostly driven by values of economic efficiency. Yet, since automation processes are part of the basic structure of society, as is the division of labor, considerations of justice apply to them. As for the ‘how,’ the article suggests ‘fair (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Research of the intelligent resource security of the nanoeconomic development innovation paradigm.Tetiana Ostapenko, Igor Britchenko & Peter Lošonczi - 2021 - Baltic Journal of Economic Studies 7 (5):159-168.
    The resources and resource potential of the innovative component of nanoeconomics are analyzed. The factors of production – classical types of resources such as land, labor, capital and technology – are described. Ways of influencing the security resources of nanoeconomics within the innovation paradigm are evaluated. The purpose of the study is to identify the factor of nanoeconomics in the formation of resource security potential in the innovation paradigm. To achieve this goal, the following tasks were set: to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Harvesting the uncollected fruits of other people’s intellectual labour.Cristian Timmermann - 2017 - Acta Bioethica 23 (2):259-269.
    Intellectual property regimes necessarily create artificial scarcity leading to wastage, both by blocking follow-up research and hindering access to those who are only able to pay less then the actual retail price. After revising the traditional arguments to hinder access to people’s intellectual labour we will examine why we should be more open to allow free-riding of inventive efforts, especially in cases where innovators have not secured the widest access to the fruits of their research and failed to cooperate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Conflicts and Instability in the Contemporary Security Environment.Olesea Ţaranu - 2015 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 2 (3): 373–385.
    While current doctrines try to separate conflicts within two distinct categories – conventional versus irregular, there are, however, a series of contemporary conflicts that challenge this western view on war showing that the disjunctive manner of classification in ‘big and conventional’ versus ‘small and irregular’ is limited and simplistic. The military strategists as well as the academics used a series of concepts in order to describe the main shifts in the character of war – from the Fourth Generation Warfare (4GW) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  98
    A life-cycle approach highlights the nutritional and environmental superiority of agroecology over conventional farming.Alik Pelman, Jerke De Vries, Sigal Tepper, Gidi Eshel, Yohay Carmel & Alon Shepon - 2024 - Plos Sustainability and Transformation 3 (6):1-20.
    Providing equitable food security for a growing population while minimizing environmental impacts and enhancing resilience to climate shocks is an ongoing challenge. Here, we quantify the resource intensity, environmental impacts and nutritional output of a small (0.075 ha) low-input subsistence Mediterranean agroecological farm in a developed nation that is based on intercropping and annual crop rotation. The farm provides one individual, the proprietor, with nutritional self-sufficiency (adequate intake of an array of macro- and micro-nutrients) with limited labor, no synthetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Segregated specialists and nuclear culture.Sean F. Johnston - manuscript
    Communities of nuclear workers have evolved in distinctive contexts. During the Manhattan Project the UK, USA and Canada collectively developed the first reactors, isotope separation plants and atomic bombs and, in the process, nurtured distinct cadres of specialist workers. Their later workplaces were often inherited from wartime facilities, or built anew at isolated locations. For a decade, nuclear specialists were segregated and cossetted to gestate practical expertise. At Oak Ridge Tennessee, for example, the informal ‘Clinch College of Nuclear Knowledge’ aimed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  72
    Are Technological Unemployment and a Basic Income Guarantee Inevitable or Desirable?James J. Hughes - 2014 - Journal of Ethics and Emerging Technologies 24 (1):1-4.
    Robotics and artificial intelligence are beginning to fundamentally change the relative profitability and productivity of investments in capital versus human labor; creating technological unemployment at all levels of the workforce; from the North to the developing world. As robotics and expert systems become cheaper and more capable the percentage of the population that can find employment will also fall; stressing economies already trying to curtail "entitlements" and adopt austerity. Two additional technology-driven trends will exacerbate the structural unemployment crisis in the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Neither opaque nor transparent: A transdisciplinary methodology to investigate datafication at the EU borders.Ana Valdivia, Claudia Aradau, Tobias Blanke & Sarah Perret - 2022 - Big Data and Society 9 (2).
    In 2020, the European Union announced the award of the contract for the biometric part of the new database for border control, the Entry Exit System, to two companies: IDEMIA and Sopra Steria. Both companies had been previously involved in the development of databases for border and migration management. While there has been a growing amount of publicly available documents that show what kind of technologies are being implemented, for how much money, and by whom, there has been limited engagement (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. COVID-19, gender inequality, and the responsibility of the state.Nikki Fortier - 2020 - International Journal of Wellbeing 3 (10):77-93.
    Previous research has shown that women are disproportionately negatively affected by a variety of socio-economic hardships, many of which COVID-19 is making worse. In particular, because of gender roles, and because women’s jobs tend to be given lower priority than men’s (since they are more likely to be part-time, lower-income, and less secure), women assume the obligations of increased caregiving needs at a much higher rate. This unfairly renders women especially susceptible to short- and long-term economic insecurity and decreases in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. "Houselessness".Kevin Jobe - 2019 - In Joseph S. Biehl, Samantha Noll & Sharon M. Meagher (eds.), The Routledge Handbook of the Philosophy of the City. London, UK: Routledge. pp. 203-215.
    When we take into consideration all those who fall under the UN-Habitat’s definition of “houseless” or at risk of houselessness, we see that the central issue of homelessness is not the specific problems or failings of the various subpopulations of the houseless, but rather the structural causes of houselessness themselves: social, political, economic, and ecological factors which deprive and dispossess people of their livelihoods, their labor, their security, and their dignity. However, when debates are framed too narrowly as if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Equality, Liberty and the Limits of Person-centred Care’s Principle of Co-production.Gabriele Badano - 2019 - Public Health Ethics 12 (2):176-187.
    The idea that healthcare should become more person-centred is extremely influential. By using recent English policy developments as a case study, this article aims to critically analyse an important element of person-centred care, namely, the belief that to treat patients as persons is to think that care should be ‘co-produced’ by formal healthcare providers and patients together with unpaid carers and voluntary organizations. I draw on insights from political philosophy to highlight overlooked tensions between co-production and values like equality and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Work/Life Integration.Erin C. Tarver - 2013 - In Christopher Luetege (ed.), Handbook of the Philosophical Foundations of Business Ethics. Springer. pp. 1191--1202.
    Some provisions of the UN’s Convention on the Elimination of Discrimination Against Women (CEDAW) are clearly important from the perspective of business ethics, particularly those calling for equal rights for women to employment and financial security. Some other provisions of CEDAW are equally as important for ethical business practices and Corporate Social Responsibility (CSR), but are frequently overlooked because of the presumption that they are not strictly business concerns: the rights of women to participation in public life, marriage, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Global Regulatory System of Human Resources Development.Sergii Sardak - 2014 - Dissertation, Київський Національний Економічний Університет Імені Вадима Гетьмана
    ANNOTATION Sardak S.E. Global Regulatory System of Human Resources Development. – Manuscript. Thesis for the Doctor of Economic Science academic degree with major in 08.00.02 – World Economy and international economic relations. – SHEE «Kyiv National Economic University named after Vadym Hetman», Kyiv, 2014. The preconditions and factors of the global economic system with the identified relevant subjects areas and mechanisms of regulation instruments have been investigated. The crucial role of humans in the global economic system as a key factor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Structural transformation, agriculture and livestock in Vietnam (1970-2015).Nguyen Mai Huong - 2017 - Journées de Recherches En Sciences Sociales 11:1-35.
    Vietnam has exhibited rapid economic growth over thirty years of comprehensive economic reforms. However, about half of the country’s active population remains in agriculture. In order to characterize the role of agriculture and livestock in Vietnam’s structural transformation, we assess ongoing dynamics at three complementary scales: national, sectoral (agriculture and livestock) and local (district of Bavi). We show that the transition since Doi Moi (Renovation) has given rise to a political economy that provides incentives to industries and services. However, labor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The perception movement economy of Ukraine to business/Igor Britchenko, Volodymyr Saienko//Списание «Икономически изследвания (Economic Studies)». – Институт за икономически изследвания при БАН, София (България). – № 4. – 2017. – P. 163 - 181. ISSN 02053292.Igor Britchenko & Volodymyr Saienko - 2017 - Списание «Икономически Изследвания (Economic Studies)» 4 (4):163 - 181.
    The article provides the analysis of the entrance into the innovative activity and organized regulation of interaction which is based on the scientific and technological changes, concentration of production and the feasibility study of administrative decisions, which are dominated by a conglomerate of technical, technological and engineering management decisions. The research formulates the provisions for the productive use of business as the form of economic relations which is based on the entrepreneur function. These provisions are formulated basing on the conditions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Modernizing Frontier Chemical Transformations of Young People’s Minds and Bodies in Puerto Princesa.Anita P. Hardon & Michael L. Tan - 2017 - Amsterdam, Netherlands: The Amsterdam Institute for Social Science Research University of Amsterdam Department of Anthropology University of the Philippines Diliman and Palawan Studies Center Palawan State University.
    Palawan is a land of promise, and of paradox. On maps, it appears on the edge of the Philippines, isolated. Indeed, it is a kind of last frontier. Its population remained tiny for centuries, the government offering homestead land in the 1950s practically for free to attract migrants from outside. The Palawan State University was established by law in 1965, but did not become operational until 1972. A commercial airport did not exist until the 1980s, and for many years, flights (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Parasitic Resilience: The Next Phase of Public Health Preparedness Must Address Disparities Between Communities.Jordan Pascoe & Mitch Stripling - 2023 - Health Securities 21 (6).
    Community resilience, a system’s ability to maintain its essential functions despite disturbance, is a cornerstone of public health preparedness. However, as currently practiced, community resilience generally focuses on defined neighborhood characteristics to describe factors such as vulnerability or social capital. This ignores the way that residents of some neighborhoods (as ‘essential workers’’) were required during the COVID-19 pandemic to sacrifice their wellbeing for the sake of others staying at home in more affluent neighborhoods. Using the global care chain theory, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Hermeneutic Labor: The Gendered Burden of Interpretation in Intimate Relationships Between Women and Men.Ellie Anderson - 2023 - Hypatia 38 (1):177-197.
    In recent years, feminist scholarship on emotional labor has proliferated. I identify a related but distinct form of care labor, hermeneutic labor. Hermeneutic labor is the burdensome activity of: understanding and coherently expressing one’s own feelings, desires, intentions, and movitations; discerning those of others; and inventing solutions for relational issues arising from interpersonal tensions. I argue that hermeneutic labor disproportionately falls on women’s shoulders in heteropatriachal societies, especially in intimate relationships between women and men. I also suggest that some of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Wozu Labor? Zur vernachlässigten Erkenntnistheorie hinter der Labordidaktik.Berendes Jochen & Mathias Gutmann - 2020 - In Terkowski Claudius (ed.), Labore in der Hochschullehre: Labordidaktik, Digitalisierung, Organisation. pp. 35-49.
    Der Beitrag beleuchtet die Struktur und Funktion forschender Laborpraxis vor dem Hintergrund verschiedener erkenntnis- und wissenschaftstheoretischer Positionen. Das Labor kann in seiner Relevanz unterschätzt werden – mit Blick auf die darin verrichteten praktischen Tätigkeiten, auf dabei erforderliche Urteilsbildungen und nicht zuletzt auf unverzichtbare Impulse für die Wissenschaft. Die abstrakte Gegenüberstellung von Theorie und Praxis ist aufzugeben. Zugleich sollte Wissenschaft weder allein über das Labor noch über die Theoriebildung bestimmt werden. Abschließend plädiert der Beitrag dafür, die skizzierten Fragestellungen in die Labordidaktik (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  24. The Labour Theory of Property and Marginal Productivity Theory.David Ellerman - 2016 - Economic Thought 5 (1):19.
    After Marx, dissenting economics almost always used 'the labour theory' as a theory of value. This paper develops a modern treatment of the alternative labour theory of property that is essentially the property theoretic application of the juridical principle of responsibility: impute legal responsibility in accordance with who was in fact responsible. To understand descriptively how assets and liabilities are appropriated in normal production, a 'fundamental myth' needs to be cleared away, and then the market mechanism of appropriation (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Forced Labour and Access to Education of Rohingya Refugee Children in Bangladesh: Beyond a Humanitarian Crisis.Md Mahmudul Hoque - 2021 - Journal of Modern Slavery 6 (3):19-33.
    Rohingya refugee children in Bangladesh are forced into labour both inside and outside the camps for a wide range of reasons. This article examines this situation in relation to the access to education for those children living in the camps in Cox’s Bazar. Being informed by several perspectives concerning child labour and access to schooling in developing country contexts, this research work has adopted a qualitative approach to study various factors working behind this pressing issue. After collecting data (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Emotional Labor.Sfetcu Nicolae - manuscript
    Emotional labor can be defined as a form of emotional regulation in which employees have to display certain emotions as part of their work and promote organizational goals. Such organizational control of emotions can lead to suppression of feelings through emotional dissonance, altered relational perceptions, changed communication patterns, and other negative and counterproductive personal and work effects including stress, demotivation and exhaustion. Emotional labor involves managing feelings and emotions to meet the demands of a job. DOI: 10.13140/RG.2.2.13203.30248.
    Download  
     
    Export citation  
     
    Bookmark  
  27. New Labour, School Effectiveness and Ideological Commitment.Robert Archer - 2003 - In Justin Cruickshank (ed.), The Difference It Makes.
    As Bhaskar (1989:1) argues, we need to take philosophy seriously because it underwrites both what constitutes science and knowledge and which political practices are deemed legitimate. At present, the field of educational research internationally is witnessing a pragmatist trend, whereby practical education research is carried out without reference to ontological and epistemological concerns. For David Reynolds, a leading UK school effectiveness academic, '[p]recisely because we did not waste time on philosophical discussion or on values debates, we made rapid progress' (1998:20). (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Transnational labor regulation, reification and commodification: A critical review.George Tsogas - 2018 - Journal of Labor and Society 21 (4):517-532.
    Why does scholarship on transnational labor regulation (TLR) consistently fails to search for improvements in working conditions, and instead devotes itself to relentless efforts for identifying administrative processes, semantics, and amalgamations of stakeholders? This article critiques TLR from a pro-worker perspective, through the philosophical work of Georg Lukács, and the concepts of reification and commodification. A set of theoretically grounded criteria is developed and these are applied against selected contemporary cases of TLR. In the totality that is capitalism, reification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Dual Labor Market.Andrzej Klimczuk & Magdalena Klimczuk-Kochańska - 2016 - In Nancy Naples, Renee Hoogland, Wickramasinghe C., Wong Maithree & Wai Ching Angela (eds.), The Wiley Blackwell Encyclopedia of Gender and Sexuality Studies, 5 Volume Set. Wiley-Blackwell. pp. 1--3.
    The dual labor market theory is one of the primary explanations for the gender differences in earnings. It shows that gender inequality and stereotypes lead to employment of men and women in different segments of the labor market characterized by various incomes. This theory is based on the hypothesis that such markets are divided into segments, which are divided by different rules of conduct for workers and employers. Differences also include production conditions, terms of employment, productivity of employees, and the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Distribution of Ethical Labor in the Scientific Community.Vincenzo Politi & Alexei Grinbaum - 2020 - Journal of Responsible Innovation 7:263-279.
    To believe that every single scientist ought to be individually engaged in ethical thinking in order for science to be responsible at a collective level may be too demanding, if not plainly unrealistic. In fact, ethical labor is typically distributed across different kinds of scientists within the scientific community. Based on the empirical data collected within the Horizon 2020 ‘RRI-Practice’ project, we propose a classification of the members of the scientific community depending on their engagement in this collective activity. Our (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  33. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Linguistic labor and its division.Jeff Engelhardt - 2019 - Philosophical Studies 176 (7):1855-1871.
    This paper exposes a common mistake concerning the division of linguistic labor. I characterize the mistake as an overgeneralization from natural kind terms; this misleads philosophers about which terms are subject to the division of linguistic labor, what linguistic labor is, how linguistic labor is divided, and how the extensions of non-natural kind terms subject to the division of linguistic labor are determined. I illustrate these points by considering Sally Haslanger’s account of the division of linguistic labor for social kind (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Labour, exchange and recognition: Marx contra Honneth.David A. Borman - 2009 - Philosophy and Social Criticism 35 (8):935-959.
    This article explores Marx’s contention that the achievement of full personhood and, not just consequently, but simultaneously, of genuine intersubjectivity depends upon the attainment of recognition for one’s place in the social division of labour, recognition which is systematically denied to some individuals and groups of individuals through the capitalist organization of production and exchange. This reading is then employed in a critique of Axel Honneth’s theory of recognition which, it is argued, cannot account for the systematic obstacles faced (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  40. AI Art is Theft: Labour, Extraction, and Exploitation, Or, On the Dangers of Stochastic Pollocks.Trystan S. Goetze - 2024 - Proceedings of the 2024 Acm Conference on Fairness, Accountability, and Transparency:186-196.
    Since the launch of applications such as DALL-E, Midjourney, and Stable Diffusion, generative artificial intelligence has been controversial as a tool for creating artwork. While some have presented longtermist worries about these technologies as harbingers of fully automated futures to come, more pressing is the impact of generative AI on creative labour in the present. Already, business leaders have begun replacing human artistic labour with AI-generated images. In response, the artistic community has launched a protest movement, which argues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  44. Child labor in the Era of Sustainable Development: insights from Jhenaidah City of Bangladesh.Md Ashfikur Rahman, Md Sazedur Rahman, Md Ashraful Alam, Mahamudul Hasan & Md Imtiaz Hasan Rahul - 2019 - International Journal of Social Sciences, Humanities and Education 3 (2):137-149.
    The existence of child labor in developing countries like Bangladesh is undoubtedly a serious problem in the era of sustainable development. Undoubtedly to abolish child labor from all level is not so easy. The current study was intended to assess the livelihoods pattern and causes of being involved as child labor in Jhenaidah city-Bangladesh and to find out the ways in which child labor can be diminished gradually. This study was exploratory in nature where convenience sampling was adapted, seventy-five children (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Egoism, Labour, and Possession: A reading of “Interiority and Economy,” Section II of Lévinas' Totality of Infinity.Jacob Blumenfeld - 2014 - Journal of the British Society for Phenomenology 45 (2):107-117.
    Lévinas is the philosopher of the absolutely Other, the thinker of the primacy of the ethical relation, the poet of the face. Against the formalism of Kantian subjectivity, the totality of the Hegelian system, the monism of Husserlian phenomenology and the instrumentalism of Heideggerian ontology, Lévinas develops a phenomenological account of the ethical relation grounded in the idea of infinity, an idea which is concretely produced in the experience with the absolutely other, particularly, in their face. The face of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  38
    Domestic Labor, Citizenship, and Exceptionalism: Rethinking Kant's “Woman Problem”.Jordan Pascoe - 2015 - Journal of Social Philosophy 46 (3):340-356.
    There is no doubt that Immanuel Kant has a woman problem. His anthropo-logical studies of women are full of cutting remarks, and despite a generation offeminist Kantian scholarship, it is an open question whether he meant to include women as full, equal agents in either his moral or political philosophy. Those who engage this question within Kant’s political philosophy ask whether or not women can “work their way up” to full, active citizenship. If women can achieve equality in this way, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Labor-Saving Device: Evidence of Responsibility?Edmund Byrne - 1990 - In Gayle L. Ormiston (ed.), From Artifact to Habitat: Studies in the Critical Engagement of Technology. Lehigh University Press. pp. 132-154.
    -/- This article was first published in Technology and Contemporary Life, Philosophy and Technoloy vol. IV, ed. Paul T. Durbin, Dordrecht/Boston: D. Reidel, 1988, pp. 63-85.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan (ed.), Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 960