Results for 'Security Problems'

959 found
Order:
  1. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan (ed.), Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  73
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Monitoring Peace and Security Mandates for Human Rights.Deepa Kansra - 2022 - Artha: The Sri Ram Economics Journal 1 (1):188-192.
    The jurisprudence under international human rights treaties has had a considerable impact across countries. Known for addressing complex agendas, the work of expert bodies under the treaties has been credited and relied upon for filling the gaps in the realization of several objectives, including the peace and security agenda. -/- In 1982, the Human Rights Committee (ICCPR), in a General Comment observed that “states have the supreme duty to prevent wars, acts of genocide and other acts of mass violence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  11. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The Problem of Evil and the Pauline Principle: Consent, Logical Constraints, and Free Will.Marilie Coetsee - 2023 - Religions 14 (1):1-15.
    James Sterba uses the Pauline Principle to argue that the occurrence of significant, horrendous evils is logically incompatible with the existence of a good God. The Pauline Principle states that (as a rule) one must never do evil so that good may come from it, and according to Sterba, this principle implies that God may not permit significant evils even if that permission would be necessary to secure other, greater goods. By contrast, I argue that the occurrence of significant evils (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Evaluating energy security of the European Union and overcoming current challenges.Bezpartochnyi Maksym, Igor Britchenko & Bezpartochna Olesia - 2021 - In Grigorii Vazov (ed.), Actual issues of modern development of socio-economic systems in terms of the COVID-19 pandemic. VUZF Publishing House “St. Grigorii Bogoslov”. pp. 419 – 441.
    The European Union (EU) has been experiencing an unprecedented energy crisis for the last 50 years, with severe economic, social and political consequences. Rising energy demand, extreme weather events (unprecedented heat and long winters), disruptions in supply chain and poor regional and global reserves have all contributed to the current energy crisis in the EU. Prices on natural gas in the EU are rising as demand around the world increases. Prices on the gas rose by more than 800 percent year-on-year (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. CPPIS Pehowa. pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Environmental and economic security in the conditions of the Ukraine`s economy.Igor Britchenko, Jozefína Drotárová, Mykola Antonov, Juliia Kholodna, Olena Polonska & Yuliia Popova - 2022 - Ad Alta: Journal of Interdisciplinary Research 2 (12):118-122.
    The article examines the peculiarities and modern specifics of the formation of ecological and economic security in Ukraine in the conditions of digitalization. It was determined that the lack of dynamic growth, the violation of the optimal balance and balance of the ecological and economic system are caused by the depletion of raw resources, a decrease in the overall potential of the environment, and the irrational use of natural resources. It has been proven that in the conditions of digitalization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The UN Security Council, normative legitimacy and the challenge of specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human rights. Both of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Problems for Wright's entitlement theory.Luca Moretti - 2021 - In Luca Moretti & Nikolaj Jang Lee Linding Pedersen (eds.), Non-Evidentialist Epistemology. Leiden: Brill. pp. 121-138.
    Crispin Wright’s entitlement theory holds that we have non-evidential justification for accepting propositions of a general type––which Wright calls “cornerstones”––that enables us to acquire justification for believing other propositions––those that we take to be true on the grounds of ordinary evidence. Entitlement theory is meant by Wright to deliver a forceful response to the sceptic who argues that we cannot justify ordinary beliefs. I initially focus on strategic entitlement, which is one of the types of entitlement that Wright has described (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. The Problem of Political Sovereignty: Hegel and Schmitt (3rd edition).Markos H. Feseha - 2021 - Cosmos and History : The Journal of Natural and Social Philosophy 17 (3):145-170.
    Both G.F.W. Hegel and Carl Schmitt took seriously the problem of political sovereignty entailed by liberal political theories. In Dictatorship (1919) and Political Theology (1922), Schmitt rejects liberal political theories that argue for the immediate unity of democracy and legality i.e., popular sovereignty, because he thinks they cannot secure political sovereignty. In the Philosophy of Right, Hegel denounces popular sovereignty for similar reasons. Yet given Schmitt’s negative assessment of Hegel their positions are seldom related to one another. I argue in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Painless Civilization and Fundamental Sense of Security: A Philosophical Challenge in the Age of Human Biotechnology.Masahiro Morioka - 2005 - Polylog: Forum for Intercultural Philosophy 6:1-1.
    This paper discusses some philosophical problems lurking behind the issues of human biotechnology, particularly prenatal screening. Firstly, prenatal screening technology disempowers existing disabled people. The second problem is that it systematically deprives us of the “fundamental sense of security.” This is a sense of security that allows us to believe that we will never be looked upon by anyone with such unspoken words as, “I wish you were never born” or “I wish you would disappear from the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Ecosophy, Philosophy of Security, New Technologies and the Digital Philosophy.Sarbu Ion - 2017 - In Proceedings of the 13th International Scientific Committee "Strategies XXI". Technologies, Military Applications, Simulations and Resources. Bucharest: "Carol I" National Defence University. pp. 437-443.
    Defining Ecosophy (ecological wisdom) like a contemporary philosophy of survival, security and a sustainable Human Development, terrestrial nature and society, the author of this article approaches the correlation between it and the digital version of security in the context of new technologies. Human survival is in connection with the protection, optimal functioning of the natural environment and the development of human society. Human evolution, physical and psychological (the issues of Anthropoecology, a medical-biological science, deals with them), depends on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  27. Export logistics of agricultural products of Ukraine in the context of ensuring food security during martial law.Maksym Bezpartochnyi & Igor Britchenko - 2022 - In Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.), Current issues of security management during martial law. Vysoká škola bezpečnostného manažérstva v Košiciach. pp. 163-184.
    The study determined the dynamics of growing grain crops in Ukraine and the geography of their export. The problems of ensuring export logistics as a result of military aggression by russia in the context of ensuring food security are pointed out. The main directions of export logistics of grain crops from Ukraine and the peculiarities of transportation by railway, river and road transport were studied. The directions of diversification of export logistics of grain crops from Ukraine during martial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Libertarianism and the Problem of Flip-flopping.John Martin Fischer - 2016 - In Kevin Timpe & Daniel Speak (eds.), Free Will and Theism: Connections, Contingencies, and Concerns. Oxford: Oxford University Press UK. pp. 48-61.
    I am going to argue that it is a cost of libertarianism that it holds our status as agents hostage to theoretical physics, but that claim has met with disagreement. Some libertarians regard it as the cost of doing business, not a philosophical liability. By contrast, Peter van Inwagen has addressed the worry head on. He says that if he were to become convinced that causal determinism were true, he would not change his view that humans are free and morally (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. The Caesar Problem — A Piecemeal Solution.J. P. Studd - 2023 - Philosophia Mathematica 31 (2):236-267.
    The Caesar problem arises for abstractionist views, which seek to secure reference for terms such as ‘the number of Xs’ or #X by stipulating the content of ‘unmixed’ identity contexts like ‘#X = #Y’. Frege objects that this stipulation says nothing about ‘mixed’ contexts such as ‘# X = Julius Caesar’. This article defends a neglected response to the Caesar problem: the content of mixed contexts is just as open to stipulation as that of unmixed contexts.
    Download  
     
    Export citation  
     
    Bookmark  
  30. (1 other version)UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the viability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Existing Problems in Improvement of Capital Mobilization in Vietnam Bank for Social Policies.Hoang Minh Hien & Wei Huai An - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (5):66-72.
    Abstract: In 16 years of Vietnam Bank for Social Policies (VBSP) operation, although mobilized capital has basically met the demand for loans of poor households and other policy beneficiaries, there are still certain limitations. This study is aimed to assess the remaining difficulties in raising capital in VBSP. Research results are surveys of capital mobilization at 8 VBSP’s provinical branches and questionnaire to customers, staff at branches of VBSP across Vietnam. The key problem is mechanism of creating capital source, which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Problem of the Unity of the Representative Assembly in Hobbes’s Leviathan.Douglas C. Wadle - 2017 - Hobbes Studies 30 (2):178-201.
    In _Leviathan_, Hobbes embraces three seemingly inconsistent claims: (i) the unity of a multitude is secured only by the unity of its representer, (ii) assemblies can represent other multitudes, and (iii) assemblies are, or are constituted by, multitudes. Together these claims require that a representative assembly, itself, be represented. If that representer is another assembly, it too will need a unifying representer, and so on. To stop a regress, we will need an already unified representer. But a multitude can only (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Problems and prospects of Ukraine’s energy supply in the aspects of international trade.Nataliya Krasnikova & A. A. Redchenkov - 2017 - Visnyk of Dniprop’Etrovsk University. Ser. World Economy and International Economic Relations 9 (25):70-79.
    The article studies the energy efficiency of the economy and determines the need to reform the energy sector of Ukraine and conditions of its adaptation to EU requirements. Annual energy consumption in the world is about 14 billion tons of fuel. This is mainly organic origin resources – coal, oil, natural gas – 82 %, nuclear power – 7 %, hydroelectric energy – 3%, wood – 7 % renewable energy and – 1 %. The economic development of any country in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that the decline in its (...) was the result of a complex interaction of external and internal factors, the main of which were tight government regulation, shifting the financial burden of social responsibilities to Ukrzaliznytsya, PJSC, lack of competition in the transportation of the main nomenclature of cargo and the unsatisfactory state of non-current assets. Based on the Argenti’s method, it is shown that the consequence of the inefficient financial management of Ukrzaliznytsia, PJSC are the reduction of its insolvency. Three main determinants of the financial security of rail enterprises were identified: a reduction in traffic volumes, an unstable capital structure and the impossibility of timely repayment of current liabilities. An additive model for assessing the impact of selected determinants on the level of financial security of Ukrzaliznytsia, PJSC is proposed. The analysis of the model parameters showed that the greatest impact has the index of industrial production, which is due to the predominant formation of its own financial resources of rail transport due to income from freight traffic. A complex of measures designed to improve the financial condition of rail enterprises was proposed. It is substantiated that in order to equalize existing threats, it is necessary to take political decisions aimed at improving the financial condition of Ukrzaliznytsia, PJSC by reducing the intensity of leaching of its financial resources, as well as implementing an anti-crisis financial strategy aimed at optimizing the capital structure and financial rehabilitation of rail enterprises. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  90
    The Boundary Problem in Democratic Theory: Why the Demos Should Be Bounded by the State.Sarah Song - 2012 - International Theory 4 (1):39-68.
    Democracy is rule by the demos, but by what criteria is the demos constituted? Theorists of democracy have tended to assume that the demos is properly defined by national boundaries or by the territorial boundaries of the modern state. In a recent turn, many democratic theorists have advanced the principles of affected interests and coercion as the basis for defining the boundaries of democracy. According to these principles, it is not co-nationals or fellow citizens but all affected or all subjected (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  37. Responsibility and the recursion problem.Ben Davies - 2021 - Ratio 35 (2):112-122.
    A considerable literature has emerged around the idea of using ‘personal responsibility’ as an allocation criterion in healthcare distribution, where a person's being suitably responsible for their health needs may justify additional conditions on receiving healthcare, and perhaps even limiting access entirely, sometimes known as ‘responsibilisation’. This discussion focuses most prominently, but not exclusively, on ‘luck egalitarianism’, the view that deviations from equality are justified only by suitably free choices. A superficially separate issue in distributive justice concerns the two–way relationship (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Non-Human Moral Status: Problems with Phenomenal Consciousness.Joshua Shepherd - 2023 - American Journal of Bioethics Neuroscience 14 (2):148-157.
    Consciousness-based approaches to non-human moral status maintain that consciousness is necessary for (some degree or level of) moral status. While these approaches are intuitive to many, in this paper I argue that the judgment that consciousness is necessary for moral status is not secure enough to guide policy regarding non-humans, that policies responsive to the moral status of non-humans should take seriously the possibility that psychological features independent of consciousness are sufficient for moral status. Further, I illustrate some practical consequences (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  39. Singularity and Coordination Problems: Pandemic Lessons from 2020.Nicholas Kluge Corrêa & Nythamar De Oliveira - 2021 - Journal of Future Studies 26 (1): 61–74.
    One of the strands of the Transhumanist movement, Singulitarianism, studies the possibility that high-level artificial intelligence may be created in the future, debating ways to ensure that the interaction between human society and advanced artificial intelligence can occur safely and beneficially. But how can we guarantee this safe interaction? Are there any indications that a Singularity may be on the horizon? In trying to answer these questions, We'll make a small introduction to the area of security research in artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Problems of gender parity in the state administration system: conceptual and empirical aspects.Zoia Kireieva, Karinna Sardaryan, Yuliya Voytsekhovska, Igor Britchenko, Viktoria Samoilenko & Yuliia Popova - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (2):369–375.
    The article is timed to coincide with the thirtieth anniversary of Ukraine's independence. Based on the generalization of fundamental and applied studies of scientists, the author's vision of such category as the gender parity is conceptualized. Based on the analysis of historical events related to the development of the state, the formation of cultural and social values in determining the gender identity of modern society is substantiated. Based on the analysis of literary and regulatory sources, the structure of the state (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Kant and the Problem of Unequal Enforcement of Law.Daniel Koltonski - 2021 - Journal of Ethics and Social Philosophy 20 (2):188-210.
    Kant infamously opposes not only revolution but also any resistance or disobedience by citizens that aims to compel states to reform themselves. This paper argues that, in fact, the Kantian account of the legitimate state has the resources for a distinctive justification of principled disobedience, including even violent or destructive resistance, that applies to citizens of contemporary Western democracies. When a state fails to enforce the law equally, this lack of equal enforcement can deprive some citizens of the equal assurance (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Biodiversity and Biocollections: Problem of Correspondence.Igor Pavlinov - 2016 - In Pavlinov Igor (ed.), Aspects of Biodiversity. KMK Sci Press. pp. 733-786.
    This text is an English translation of those several sections of the original paper in Russian, where collection-related issues are considered. The full citation of the original paper is as following: Pavlinov I.Ya. 2016. [Bioraznoobrazie i biokollektsii: problema sootvetstvia]. In: Pavlinov I.Ya. (comp.). Aspects of Biodiversity. Archives of Zoological Museum of Lomonosov Moscow State University, Vol. 54, Pр. 733–786. -/- Orientation of biology, as a natural science, on the study and explanation of the similarities and differences between organisms led in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. A State-of-Affairs-Semantic Solution to the Problem of Extensionality in Free Logic.Hans-Peter Leeb - 2020 - Journal of Philosophical Logic 49 (6):1091-1109.
    If one takes seriously the idea that a scientific language must be extensional, and accepts Quine’s notion of truth-value-related extensionality, and also recognizes that a scientific language must allow for singular terms that do not refer to existing objects, then there is a problem, since this combination of assumptions must be inconsistent. I will argue for a particular solution to the problem, namely, changing what is meant by the word ‘extensionality’, so that it would not be the truth-value that had (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. A Critical Evaluation of Rea’s Response to the Problem of Divine Hiddenness.Ross Parker - 2014 - European Journal for Philosophy of Religion 6 (2):117--138.
    In an important discussion of the problem of hiddenness, Michael Rea briefly presents and defends an argument from divine hiddenness which he thinks encapsulates the problem of divine hiddenness, and then develops a detailed and nuanced response to this argument. Importantly, Rea claims that his response does not depend on the commonly held theistic view that God allows hiddenness to secure human goods. In this paper I offer a detailed criticism of Rea’s account of what justifies God in allowing divine (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Free Will and the Divergence Problem.Takuo Aoyama, Shogo Shimizu & Yuki Yamada - 2015 - Annals of the Japan Association for Philosophy of Science 23:1-18.
    This paper presents what the authors call the ‘divergence problem’ regarding choosing between different future possibilities. As is discussed in the first half, the central issue of the problem is the difficulty of temporally locating the ‘active cause’ on the modal divergent diagram. In the second half of this paper, we discuss the ‘second-person freedom’ which is, strictly, neither compatibilist negative freedom nor incompatibilist positive freedom. The divergence problem leads us to two hypothetical views (i.e. the view of single-line determination (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Symbol Systems as Collective Representational Resources: Mary Hesse, Nelson Goodman, and the Problem of Scientific Representation.Axel Gelfert - 2015 - Social Epistemology Review and Reply Collective 4 (6):52-61.
    This short paper grew out of an observation—made in the course of a larger research project—of a surprising convergence between, on the one hand, certain themes in the work of Mary Hesse and Nelson Goodman in the 1950/60s and, on the other hand, recent work on the representational resources of science, in particular regarding model-based representation. The convergence between these more recent accounts of representation in science and the earlier proposals by Hesse and Goodman consists in the recognition that, in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Intentional Structure and the Identity Theory of Knowledge in Bernard Lonergan: A Problem with Rational Self-Appropriation.Greg P. Hodes - 2002 - International Philosophical Quarterly 42 (4):437-452.
    Bernard Lonergan has argued for a theory of cognition that is transcendentally secure, that is, one such that any plausible attempt to refute it must presuppose its correctness, and one that also grounds a correct metaphysics and ontology. His proposal combines an identity theory of knowledge with an intentional relation between knower and known. It depends in a crucial way upon an appropriation of one’s own cognitional motives and acts, that is, upon “knowing one’s own knowing.” I argue that because (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. What's wrong with racial profiling? Another look at the problem.Annabelle Lever - 2007 - Criminal Justice Ethics 26 (1):20-28.
    According to Mathias Risse and Richard Zeckhauser, racial profiling can be justified in a society, such as the contemporary United States, where the legacy of slavery and segregation is found in lesser but, nonetheless, troubling forms of racial inequality. Racial profiling, Risse and Zeckhauser recognize, is often marked by police abuse and the harassment of racial minorities and by the disproportionate use of race in profiling. These, on their view, are unjustified. But, they contend, this does not mean that all (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  49. Synthetic Health Data: Real Ethical Promise and Peril.Daniel Susser, Daniel S. Schiff, Sara Gerke, Laura Y. Cabrera, I. Glenn Cohen, Megan Doerr, Jordan Harrod, Kristin Kostick-Quenet, Jasmine McNealy, Michelle N. Meyer, W. Nicholson Price & Jennifer K. Wagner - 2024 - Hastings Center Report 54 (5):8-13.
    Researchers and practitioners are increasingly using machine‐generated synthetic data as a tool for advancing health science and practice, by expanding access to health data while—potentially—mitigating privacy and related ethical concerns around data sharing. While using synthetic data in this way holds promise, we argue that it also raises significant ethical, legal, and policy concerns, including persistent privacy and security problems, accuracy and reliability issues, worries about fairness and bias, and new regulatory challenges. The virtue of synthetic data is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  84
    Implicaciones de la tecnosecuritización en las relaciones internacionales contemporáneas.Felix D. Andueza Araque - 2022 - Dissertation, Pontificia Universidad Católica Del Ecuador
    In recent years there has been a transition within society towards governments much more permeated by technology. One of the areas where this technological increase has been seen is in security processes. Currently, under the justification of a safer world, perpetual surveillance is given to the population through facial recognition cameras and data collection. For this reason, this research work seeks to explain how securitisation processes have become more complex to give way to much broader subjective prevention of (...) problems. This research was carried out using a qualitative approach with a bibliographic review. Given these facts, it was found that this complex form of securitisation has led to transcending discursive acts and ending up institutionalising this securitisation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 959