Results for 'Security Engineering'

999 found
Order:
  1. Conceptual Engineering and the Politics of Implementation.Matthieu Https://Orcidorg Queloz & Friedemann Https://Orcidorg Bieber - 2022 - Pacific Philosophical Quarterly 103 (3):670-691.
    Conceptual engineering is thought to face an ‘implementation challenge’: the challenge of securing uptake of engineered concepts. But is the fact that implementation is challenging really a defect to be overcome? What kind of picture of political life would be implied by making engineering easy to implement? We contend that the ambition to obviate the implementation challenge goes against the very idea of liberal democratic politics. On the picture we draw, the implementation challenge can be overcome by institutionalizing (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  2. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Broad-Spectrum Conceptual Engineering.Manuel Gustavo Https://Orcidorg Isaac - 2021 - Ratio: An International Journal for Analytic Philosophy 34 (4):286-302.
    Conceptual engineering is the method for assessing and improving our representational devices. On its ‘broad-spectrum’ version, it is expected to be appropriately applicable to any of our representation-involving cognitive activities, with major consequences for our whole cognitive life. This paper is about the theoretical foundations of conceptual engineering thus characterised. With a view to ensuring the actionability of conceptual engineering as a broad-spectrum method, it addresses the issue of how best to construe the subject matter of conceptual (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  5. Engineering Topology of Construction Ecology for Dynamic Integration of Sustainability Outcomes to Functions in Urban Environments: Spatial Modeling.Moustafa Osman Mohammed - 2022 - International Scholarly and Scientific Research and Innovation 16 (11):312-323.
    Integration sustainability outcomes give attention to construction ecology in the design review of urban environments to comply with Earth’s System that is composed of integral parts of the (i.e., physical, chemical and biological components). Naturally, exchange patterns of industrial ecology have consistent and periodic cycles to preserve energy flows and materials in Earth’s System. When engineering topology is affecting internal and external processes in system networks, it postulated the valence of the first-level spatial outcome (i.e., project compatibility success). These (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  7. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The New Philosopher-Kings: Conceptual Engineering and Social Authority.Nick Smyth - manuscript
    Many philosophers have recently become interested in conceptual engineering, or the activity of producing better conceptual schemes in human populations. But few, if any, are asking the question: what would it mean for actual human agents to possess the social authority to modify a conceptual scheme in this way? This paper argues for a deontological approach to conceptual engineering, wherein we have to secure social authority qua engineers before attempting to modify social concepts. I show that the dominant, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Handles for Pentesting Modern Secure Coding: bypassing mobile security.Mourad M. H. Henchiri - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):8-15.
    Abstract— Malware behavior was and still is a key solution, for top security appliances, to monitor algorithmic approaches when performing regular security tasks; scan, detection, cleaning and removal. And even for early actions; when building a security framework and securing all possible access points to all data sources. The first suspect in such scenario is the inner residents; appliances and system functions. Numerous are available at each operating system, and thus, the security is raised and set (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their qualities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Heidegger-Sartre Anlaşmazlığının Hümanizmin Güncel Terminoloji Sorununa bir Çözüm Getirme Olasılığına Dair bir Araştırma.Engin Yurt - 2017 - Felsefi Düsün 9 (9):289-317.
    When humanism is thought, especially within the borders of 20th century philosophy, one of the things that first comes to mind is the statements which have occurred in 1950s between Martin Heidegger and Jean-Paul Sartre, can be named as Heidegger-Sartre Controversy on Humanism and mainly based on two texts. Sartre, in one of his speeches, builds an essential connection between humanism and existentialism and in here he defines Heidegger as an existentialist like himself. In return, Heidegger, probably as a criticism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Yol ve Yolcu Arasındaki İlişki Üzerine Kısa bir Felsefi-Edebi İnceleme: Herakleitos DK 22B60 VE Frost'un Road Not Taken Şiirinden Hareketle Yol.Engin Yurt - 2018 - Journal of History School (JOHS) 11 (XXXIV):987-1003.
    In here, philosophical-literate thinking on the way is mainly tried. On one side, making a philosophical analysis of Heraclitus’ fragment 60 is aimed. The different views on what Heraclitus might have meant in this article which is generally translated as the way up and the way down are one and the same are examined. On the other side, with a reading of Robert Frost’s famous poem of Road Not Taken, it has been tried whether a phenomenological interpretation of the way (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Felsefede İnsan-Hayvan Sorunu: Derrida ve Levinas Arasındaki Karşıtlığa Yeni Bir Yaklaşım: Kucaklama Olarak Sarılma Üzerine.Engin Yurt - 2018 - Flsf 25 (25):181-206.
    In this article, the difference between human and animal in philosophy is mainly handled. This difference is thought over the concept of “the other” and Heidegger’s phenomenological distinction between human and animal. With respect to especially the views of Derrida and Levinas regarding to this matter, it has been attempted to exhibit this difference. Therefore, the two approaches -which were represented as the opposition of Derrida and Levinas- have been tried to clarify. After this, as a new approach to this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Nietzsche’nin Zerdüşt’ünün Çınlayamadığı Kulaklar: Nietzsche 21. Yüzyıl İnsanına Ahlak Üzerine Ne Söyleyebilir?Engin Yurt & Nurten Ki̇ri̇ş Yilmaz - 2018 - Beytulhikme An International Journal of Philosophy 8 (1):170-190.
    In this article, it has been aimed to examine Nietzsche’s main critique towards different understandings of morals in his era. With this criticism, it is aimed to integrally understand the opinions -which are articulated directly or metaphorically- towards morals which have been encountered. In here, while keeping in mind the difference between the concepts of immoralism and amoralism, Nietzsche’s views are interpreted. Being parallel to that aim mentioned above, it has been investigated if there is a thinking in Nietzsche which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Herder'den Heidegger'e: Sorge.Engin Yurt & Erdal Yıldız - 2016 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 30 (30):375-399.
    The article which is presented here includes an analysis of concept of “care” which mostly has found itself a place in history of philosophy in different forms. Even though thinkers who gave a place to this concept in their works, the main interest is about what Herder and Heidegger said. It has been tried to show how concept of “care” is understood throughout the history of philosophy. Lastly, it has been tried if there is a possible and genuine interpretation.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Varlıktan Dile Dilden Varlığa.Engin Yurt & Erdal Yıldız - 2016 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 30 (30):777-799.
    In this text presented here, it has been tried to Show the difference between Heidegger’s first and second era understanding of language. In his first era, to manifest Heidegger’s understanding of language, outlines of Being and Time has been discussed and concerned chapter is read carefully. To manifest his understanding of language in second era, the work of On the Way to the Language has been taken as a base. With this comparative study, it has been tried to shown the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Hıristiyanlıkta Kutsalın Doğasına Dair Fikir Ayrılığı ve Buna Kilise Babaları'nda Olası bir Çözüm.Engin Yurt - 2018 - Felsefi Düsün 10 (10):337-363.
    This article mainly aims to make an examination over the holy. It has been inquired into how something being ascribed holy can have a meaning in philosophy. As the article's research area, the differences in both opinion and execution which have later divided Christianity into two as Catholic and Orthodox Churches have been selected. The separation of these two churches under the subject titles such as Filioque controversy, the idea of First Among Equals (primas inter pares), and ritual of Transubstantiation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Negatif Teoloji Bağlamında Apophasis ile Aphairesis ve Aristoteles'te Olası Terim Kökeni Araştırması.Engin Yurt - 2017 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 34 (34):111-137.
    In this work, it has been mainly aimed to make a research on origin, meaning and context of two terms [Apophasis and Aphairesis]. These two terms which have an important place within the negative theology that has been thought explicitly appeared first with Pseudo-Dionysos Areopagita –but if required, it can be started in Plotinus, Aristotle, Plato or Parmenides– in history of philosophy [terms which also have been a subject to a misunderstanding, to a problem due to their being understood as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. İnsan Aklının Evrimsel Gelişimi Üzerine: Zıt Görüşlerin Kısa bir Analizi ve Felsefi bir Yorum.Engin Yurt - 2018 - Felsefe Dünyasi 67 (67):120-143.
    In this article, some theories about evolutionary progress of human mind are examined and criticised. Through a comparative reading of these theories -which are sometimes contradictory to each other- it has been tried to present the common missing parts of these theories. The meaning of these theories for philosophy has been thought and the presupposition of linearity in these theories is criticised. The relation of the concept of emotion with the terms like cognition, apprehension, comprehension, intellect, self-awareness, consciousness -which stand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. İnsan Olmak: Dil ve Bilincin Eşkökenliğine Dair bir Analiz ve Araştırma.Engin Yurt - 2018 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 37 (37):233-250.
    In this article, it has been searched if the language and consciousness have a co-origin or not. This origin of language and consciousness problem which draws interest in areas especially like anthropology, biology and evolutionary linguistics and evolutionary psychology is tried to be handled from a philosophical point of view. By presenting the theories about the relation between language and consciousness, theories that are well-accepted but contradicted to another from certain aspects, a thinking -which tries to go beyond this contradiction- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Integration of Motion Capture and EMG data for Classifying the Human Motions.Mihai Nadin, Gaurav N. Pradhan, Navzer Engineer & Balakrishnan Prabhakaran - 2007 - 2007 IEEE 23rd International Conference on Data Engineering Workshop.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Granting Automata Human Rights: Challenge to a Basis of Full-Rights Privilege.Lantz Fleming Miller - 2015 - Human Rights Review 16 (4):369-391.
    As engineers propose constructing humanlike automata, the question arises as to whether such machines merit human rights. The issue warrants serious and rigorous examination, although it has not yet cohered into a conversation. To put it into a sure direction, this paper proposes phrasing it in terms of whether humans are morally obligated to extend to maximally humanlike automata full human rights, or those set forth in common international rights documents. This paper’s approach is to consider the ontology of humans (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  26. The Dworkin–Williams Debate: Liberty, Conceptual Integrity, and Tragic Conflict in Politics.Matthieu Queloz - 2023 - Philosophy and Phenomenological Research (open access):1-27.
    Bernard Williams articulated his later political philosophy notably in response to Ronald Dworkin, who, striving for coherence or integrity among our political concepts, sought to immunize the concepts of liberty and equality against conflict. Williams, doubtful that we either could or should eliminate the conflict, resisted the pursuit of conceptual integrity. Here, I reconstruct this Dworkin–Williams debate with an eye to drawing out ideas of ongoing philosophical and political importance. The debate not only exemplifies Williams's political realism and its connection (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility).Jo Ann Oravec (ed.) - 2018 - IGI Global.
    Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Segregated specialists and nuclear culture.Sean F. Johnston - manuscript
    Communities of nuclear workers have evolved in distinctive contexts. During the Manhattan Project the UK, USA and Canada collectively developed the first reactors, isotope separation plants and atomic bombs and, in the process, nurtured distinct cadres of specialist workers. Their later workplaces were often inherited from wartime facilities, or built anew at isolated locations. For a decade, nuclear specialists were segregated and cossetted to gestate practical expertise. At Oak Ridge Tennessee, for example, the informal ‘Clinch College of Nuclear Knowledge’ aimed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Sniper and the Psychopath: A Parable in Defense of the Weapons Industry.Duncan MacIntosh - 2023 - In Daniel Schoeni, Tobias Vestner & Kevin Govern (eds.), Ethical Dilemmas in the Global Defense Industry. Oxford University Press. pp. 47-78.
    This chapter discusses the fundamental question of the defense industry’s role and legitimacy for societies. It begins with a parable of a psychopath doing something self-serving that has beneficial moral consequences. Analogously, it is argued, the defense industry profiting by selling weapons that can kill people makes it useful in solving moral problems not solvable by people with ordinary moral scruples. Next, the chapter argues that while the defense industry is a business, it is also implicated in the security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The perception movement economy of Ukraine to business/Igor Britchenko, Volodymyr Saienko//Списание «Икономически изследвания (Economic Studies)». – Институт за икономически изследвания при БАН, София (България). – № 4. – 2017. – P. 163 - 181. ISSN 02053292.Igor Britchenko & Volodymyr Saienko - 2017 - Списание «Икономически Изследвания (Economic Studies)» 4 (4):163 - 181.
    The article provides the analysis of the entrance into the innovative activity and organized regulation of interaction which is based on the scientific and technological changes, concentration of production and the feasibility study of administrative decisions, which are dominated by a conglomerate of technical, technological and engineering management decisions. The research formulates the provisions for the productive use of business as the form of economic relations which is based on the entrepreneur function. These provisions are formulated basing on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Good Robot, Bad Robot: Dark and Creepy Sides of Robotics, Automated Vehicles, and Ai.Jo Ann Oravec - 2022 - New York, NY, USA: Palgrave-Macmillan.
    This book explores how robotics and artificial intelligence can enhance human lives but also have unsettling “dark sides.” It examines expanding forms of negativity and anxiety about robots, AI, and autonomous vehicles as our human environments are reengineered for intelligent military and security systems and for optimal workplace and domestic operations. It focuses on the impacts of initiatives to make robot interactions more humanlike and less creepy. It analyzes the emerging resistances against these entities in the wake of omnipresent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Geoengineering: A war on climate change?Andrew Lockley - 2016 - Journal of Evolution and Technology 26 (1):26-49.
    Geoengineering; specifically Solar Radiation Management ; has been proposed to effect rapid influence over the Earth’s climate system in order to counteract Anthropogenic Global Warming. This poses near-term to long-term governance challenges; some of which are within the planning horizon of current political administrations. Previous discussions of governance of SRM have focused primarily on two scenarios: an isolated “Greenfinger” individual; or state; acting independently ; versus more consensual; internationalist approaches. I argue that these models represent a very limited sub-set of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Social norms and farm animal protection.Nicolas Delon - 2018 - Palgrave Communications 4:1-6.
    Social change is slow and difficult. Social change for animals is formidably slow and difficult. Advocates and scholars alike have long tried to change attitudes and convince the public that eating animals is wrong. The topic of norms and social change for animals has been neglected, which explains in part the relative failure of the animal protection movement to secure robust support reflected in social and legal norms. Moreover, animal ethics has suffered from a disproportionate focus on individual attitudes and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Life-centered ethics, and the human future in space.Michael N. Mautner - 2008 - Bioethics 23 (8):433-440.
    In the future, human destiny may depend on our ethics. In particular, biotechnology and expansion in space can transform life, raising profound questions. Guidance may be found in Life-centered ethics, as biotic ethics that value the basic patterns of organic gene/protein life, and as panbiotic ethics that always seek to expand life. These life-centered principles can be based on scientific insights into the unique place of life in nature, and the biological unity of all life. Belonging to life then implies (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Even good bots fight: the case of Wikipedia.Milena Tsvetkova, Ruth García-Gavilanes, Luciano Floridi & Taha Yasseri - 2017 - PLoS ONE 12 (2).
    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or data engineer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Who owns the taste of coffee – examining implications of biobased means of production in food.Zoë Robaey & Cristian Timmermann - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 85-90.
    Synthetic foods advocates offer the promise of efficient, reliable, and sustainable food production. Engineered organisms become factories to produce food. Proponents claim that through this technique important barriers can be eliminated which would facilitate the production of traditional foods outside their climatic range. This technique would allow reducing food miles, secure future supply, and maintain quality and taste expectations. In this paper, we examine coffee production via biobased means. A startup called Atomo Coffee aims to produce synthetic coffee with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Shifting perspectives: holography and the emergence of technical communities.Sean F. Johnston - 2005 - Technology and Culture 46 (1):77-103.
    Holography, the technology of three-dimensional imaging, has repeatedly been reconceptualised by new communities. Conceived in 1947 as a means of improving electron microscopy, holography was revitalized in the early 1960s by engineer-scientists at classified laboratories. The invention promoted the transformation of a would-be discipline (optical engineering) and spawned limited artist-scientist collaborations. However, a separate artisanal community promoted a distinct countercultural form of holography via a revolutionary technology: the sandbox optical table. Their tools, sponsorship, products, literature and engagement with wider (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  63
    Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. "Don't Be Evil" and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility).Jo Ann Oravec - 2018 - In “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility). IGI Global. pp. 200-237.
    Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/ Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Making Better Informed, More Confident COVID-19 Decisions: Vaccine Hesitancy, Its Barriers and Impact Studies: Taking Bayelsa State as an Example.Morufu Olalekan Raimi, Emeka Chisom Lucky, Ebikapaye Okoyen, Angalabiri Clement, Christopher Ogbointuwei & Atoyebi Babatunde - 2021 - International Journal of Vaccines and Immunization 5 (1):1-13.
    Background: Health care practitioners are recognized to have a large influence in shaping uptake of vaccine in new borns, children, adolescents, as well as adults. Parents remain more secure in their decisions when health care practitioners communicate successfully with them about vaccine dangers and benefits, the value as well as necessity for vaccinations, as well as vaccine safety. Thus, immunization remain the foundation of the primary health care system, an indisputable human right as well as a global health and development (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Preliminaries of a Space Situational Awareness Ontology.Robert J. Rovetto & T. S. Kelso - 2016 Feb - In Renato Zanetti, Ryan P. Russell, Martin T. Oximek & Angela L. Bowes (eds.), Proceedings of AAS/AIAA Spaceflight Mechanics Meeting, in Advances in the Astronautical Sciences. Univelt Inc.. pp. 4177-4192.
    Space situational awareness (SSA) is vital for international safety and security, and for the future of space travel. The sharing of SSA data and information should improve the state of global SSA for planetary defense and spaceflight safety. I take steps toward a Space Situational Awareness (SSA) Ontology, and outline some central objectives, requirements and desiderata in the ontology development process for this domain. The purpose of this ontological system is to explore the potential for the ontology research topic (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Looking Backward to Move Forward: Legitimation and Authoritarian Origins In East Asia.Junhyoung Lee - 2022 - Dissertation, University College Dublin. School of Politics and International Relations
    Having a ‘title to govern’ is critical for regime survival. Authoritarian rulers have also attempted to legitimise themselves as justified rulers. Numerous case studies have examined rulers’ collective efforts to explain their right to govern (legitimacy claims, or legitimation). This thesis tries to examine how the ruler’s seizure of power shapes legitimation capacity in order to gain a thorough grasp of the relationship between legitimation and regime resilience. Using comparative historical case studies of Vietnam, Mongolia and North Korea, this project (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Will Hominoids or Androids Destroy the Earth? —A Review of How to Create a Mind by Ray Kurzweil (2012).Michael Starks - 2017 - In Suicidal Utopian Delusions in the 21st Century 4th ed (2019). Henderson, NV USA: Michael Starks. pp. 675.
    Some years ago I reached the point where I can usually tell from the title of a book, or at least from the chapter titles, what kinds of philosophical mistakes will be made and how frequently. In the case of nominally scientific works these may be largely restricted to certain chapters which wax philosophical or try to draw general conclusions about the meaning or long term significance of the work. Normally however the scientific matters of fact are generously interlarded with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Doctor of Philosophy Thesis in Military Informatics (OpenPhD ) : Lethal Autonomy of Weapons is Designed and/or Recessive.Nyagudi Nyagudi Musandu - 2016-12-09 - Dissertation, Openphd (#Openphd) E.G. Wikiversity Https://En.Wikiversity.Org/Wiki/Doctor_of_Philosophy , Etc.
    My original contribution to knowledge is : Any weapon that exhibits intended and/or untended lethal autonomy in targeting and interdiction – does so by way of design and/or recessive flaw(s) in its systems of control – any such weapon is capable of war-fighting and other battle-space interaction in a manner that its Human Commander does not anticipate. Even with the complexity of Lethal Autonomy issues there is nothing particular to gain from being a low-tech Military. Lethal autonomous weapons are therefore (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Conceptual Engineering: A Road Map to Practice.Manuel Gustavo Isaac, Steffen Koch & Ryan Nefdt - 2022 - Philosophy Compass 17 (10):1-15.
    This paper discusses the logical space of alternative conceptual engineering projects, with a specific focus on (1) the processes, (2) the targets and goals, and (3) the methods of such projects. We present an overview of how these three aspects interact in the contemporary literature and discuss those alternative projects that have yet to be explored based on our suggested typology. We show how choices about each element in a conceptual engineering project constrain the possibilities for the others, (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  49. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Conceptual Engineering: The Master Argument.Herman Cappelen - 2019 - In Alexis Burgess, Herman Cappelen & David Plunkett (eds.), Conceptual Engineering and Conceptual Ethics. New York, USA: Oxford University Press.
    I call the activity of assessing and developing improvements of our representational devices ‘conceptual engineering’.¹ The aim of this chapter is to present an argument for why conceptual engineering is important for all parts of philosophy (and, more generally, all inquiry). Section I of the chapter provides some background and defines key terms. Section II presents the argument. Section III responds to seven objections. The replies also serve to develop the argument and clarify what conceptual engineering is.
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
1 — 50 / 999