Results for 'Security Council'

969 found
Order:
  1. The UN Security Council, normative legitimacy and the challenge of specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. (1 other version)UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. UN75 ↔ Philosophical Basics of UN Reform ↔ Security Council Reform ↔ UN Funding System (2).Vladimir Rogozhin - manuscript
    Development of ideas on UN reform presented in the essay "United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century" (2017).
    Download  
     
    Export citation  
     
    Bookmark  
  4. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Humanitarian Intervention: An Inquiry Into Law and Morality.Fernando R. Tesón - 2005 - Brill Nijhoff.
    This work offers an analysis of all the legal and moral issues surrounding humanitarian intervention: the deaths of innocent persons and the Doctrine of Double Effect Governmental legitimacy - The Doctrine of Effective Political Control; UN Charter and evaluation of the Nicaragua ruling; The Morality of not intervening; US-led invasion of Iraq; Humanitarian intervention authorised by the UN Security Council - Iraq, Somalia, Haiti, Rwanda, and Bosnia among others highlight NATO's intervention in Kosovo; The Nicaragua Decision; and The (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  6. Intervención Humanitaria Electoral: El Consejo de Seguridad de la ONU y la superación del conflicto político en Venezuela.Jesus Enrrique Caldera Ynfante - 2020 - Revista Opción de Ciencias Humanas 36 (ISSN 1012-1587):493-553.
    Abstrac. The work argues the activation of the competence of the UN Security Council to review the complex humanitarian emergency situation in Venezuela, and adopt as a provisional measure a Humanitarian Electoral Intervention (IHE), which allows to settle and alleviate conflicts by holding some general elections, based on the experience of Cambodia (1992-1993) and Timor Leste (2001-2002), and thus ruling out any possibility of violence in the Venezuelan conflict, also removing any possibility of military intervention, bearing in mind (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Justified Exception to the Prohibition on Use of Force.Damian Williams - forthcoming - Forthcoming.
    After nearly 76 years following the UN Charter, the dominant feature of the multilateral international order has shifted from a focus on states’ sovereignty to the rights of the individual. It is now widely accepted that human rights are not the province of any one state’s domestic affairs, but of importance to the entire international community. The UN Security Council sits atop the supra-state order, and holds the ultimate authority to initiate consensus-based, collective action so as to limit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Ethics of International Sanctions: The Case of Yugoslavia.Jovan Babić & Aleksandar Jokic - 2000 - Fletcher Forum of World Affairs (no. 2):107-119.
    Sanctions such as those applied by the United Nations against Yugoslavia, or rather the actions of implementing and maintaining them, at the very least implicitly purport to have moral justification. While the rhetoric used to justify sanctions is clearly moralistic, even sanctions themselves, as worded, often include phrases indicating moral implication. On May 30, 1992, United Nation Security Council Resolution 757 imposed a universal, binding blockage on all trade and all scientific, cultural and sports exchanges with Serbia and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Het primaat van de rechtspraak in de verzekering van de vrede.M. E. Notermans - 2011 - Rechtsgeleerd Magazijn Themis 2:38-47.
    In spite of his post-World War II works on international law, which seems more purely juridical, Hans Kelsen continues to put forward in his vast body of work an implicit – and sometimes even explicit – juridical objectivism and pacifism. Especially before and during the second World War he makes – by means of many moral-political writings – an effort for a more effective assurance of international peace. The fact that Kelsen regards the law as the pre-eminent means to achieve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Is the ICC Effective?Damian Wayne Williams - forthcoming - Forthcoming.
    The International Criminal Court was established by the Rome Statue in 1998, and began operating in 2002, to the widespread applause in the international community. Under the post‐UN Charter multilateral system, the ICC’s formation was a welcomed extension of the UN Security Council’s reach, as part of the new supra‐state legal order whereby consenting states hold certain criminal acts arising to a scale of severity—crimes of scale—unacceptable by all. Yet, in its near 19‐year history, it remains unclear whether (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Britain and the Iranian Nuclear Program: An Illuminating Appraisal.Alireza Salehi-Nejad - 2019 - In The First Biennial Conference on Contemporary Iranian Studies.
    Owing to the escalating regional rivalries and the conventional arms race, Iran’s post-revolutionary hostilities towards the West, in addition to the crucial geopolitical and economic significance of the region, the complex Iranian nuclear crisis has made the global leaders to brood over the multilateral Iranian negotiations with the P5+1 and the International Atomic Energy Agency, which led to finalization and adoption of the Joint Comprehensive Plan of Action in 2015. The United Kingdom as a permanent member of the United Nations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Preventive Wars, Just War Principles, and the United Nations.John W. Lango - 2005 - The Journal of Ethics 9 (1-2):247-268.
    This paper explores the question of whether the United Nations should engage in preventive military actions. Correlatively, it asks whether UN preventive military actions could satisfy just war principles. Rather than from the standpoint of the individual nation state, the ethics of preventive war is discussed from the standpoint of the UN. For the sake of brevity, only the legitimate authority, just cause, last resort, and proportionality principles are considered. Since there has been disagreement about the specific content of these (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. An Analytical Study of the Reality of Electronic Documents and Electronic Archiving in the Management of Electronic Documents in the Palestinian Pension Agency (PPA).Mohammed Khair I. Kassab, Samy S. Abu Naser & Mazen J. Al Shobaki - 2017 - European Academic Research 4 (12):10052-10102.
    The study aims to identify the reality of management of electronic documents and electronic archiving retirement in the Palestinian Pension Agency -analytical study, as well as to recognize the reality of the current document management system in the Palestinian Pension Agency. The study found the following results: that the reality of the current system for the management of documents in the agency is weak and suffers from many jams. Employee in the agency understand the importance and benefits of the management (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. To Colorize a Worldview Painted in Black and White : Philosophical dialogues to reduce the influence of extremism on youths online.Daniella Nilsson, Viktor Gardelli, Ylva Backman & Teodor Gardelli - 2015 - International Journal of Humanities and Social Science 5 (1):64-70.
    A recent report by the Swedish National Council for Crime Prevention in cooperation with the Swedish Security Service shows that the Internet has been extensively used to spread propaganda by proponents of violent political extremism, characterized by a worldview painted in black and white, an anti-democratic viewpoint, and intolerance towards persons with opposing ideas. We provide five arguments suggesting that philosophical dialogue with young persons would be beneficial to their acquisition of insights, attitudes and thinking tools for encountering (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  15. Cold case: the 1994 death of British MP Stephen David Wyatt Milligan.Sally Ramage - 2016 - Criminal Law News (87):02-36.
    In the December 2015 Issue of the Police Journal Sam Poyser and Rebecca Milne addressed the subject of miscarriages of justice. Cold case investigations can address some of these wrongs. The salient points for attention are those just before his sudden death: Milligan was appointed Private Secretary to Jonathan Aitken, the then Minister of Arms in the Conservative government in 1994. The known facts are as follows: 1. Stephen David Wyatt Milligan was found deceased on Tuesday 8th February 1994 at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. (1 other version)Right to Silence-UK, U.S, France, Germany.Sally Serena Ramage - 2008 - Current Criminal Law 1 (2):2-30.
    RIGHT TO SILENCE-UK, U.S, FRANCE, and GERMANY SALLY RAMAGE (TRADE MARK REGISTERED) WIPO Orchid ID 0000-0002-8854-4293 Pages 2-30 Current Criminal Law, Volume 1, Issue 2, -/- Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Orchid ID 0000-0002-8854-4293 Publisher & Managing Editor Criminal Lawyer series [1980-2022](ISSN 2049-8047) Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson Reuters) (Licensed Annotator of UK Statutes) in annual law books Current Law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (PRC), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  36
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  71
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  23. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  34
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  31
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  35.  24
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  38
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri (eds.), Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Debunking Arguments: Mathematics, Logic, and Modal Security.Justin Clarke-Doane - 2017 - In Michael Ruse & Robert J. Richards (eds.), The Cambridge Handbook of Evolutionary Ethics. New York: Cambridge University Press.
    I discuss the structure of genealogical debunking arguments. I argue that they undermine our mathematical beliefs if they undermine our moral beliefs. The contrary appearance stems from a confusion of arithmetic truths with (first-order) logical truths, or from a confusion of reliability with justification. I conclude with a discussion of the cogency of debunking arguments, in light of the above. Their cogency depends on whether information can undermine all of our beliefs of a kind, F, without giving us direct reason (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan (ed.), Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Influence of Family Income Level on Academic Performance Among Secondary School Students of Kitswamba and Rugendabara-Kikongo Town Councils, Kasese District, Uganda.Biitikoro Masereka, Tukur Muhammad & Abdul Rahim - 2023 - Iaa Journal of Education 9 (2):117-128.
    The study investigated the impact of parental income on students' academic performance in secondary schools in Kitswamba and Rugendabara-Kikongo town councils in Kasese District. A cross-sectional research design was used, with data collected from 286 students and five head teachers. The findings showed that family income significantly influenced students' academic performance. The findings have implications for parents, teachers, policymakers, and administrators in the education sector, emphasizing the importance of parental income in determining academic success.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Robust evidence and secure evidence claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
1 — 50 / 969