Results for 'collective security'

955 found
Order:
  1. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  2. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Perceived Influence of Entrepreneurship Education Methods on Economic Security in Cross River State.Stephen Bepeh Undie, Ezekiel Usip Mfon, Lydia Ochuole Ogbudu, Ubong Edet Uko & Joseph Ogbaji Ebiale - 2023 - Prestige Journal of Education 6 (1):158-171.
    This study investigated the perception of how methods of entrepreneurial education predict the level of economic security in the Southern Senatorial District of Cross River State. It was guided by two research questions and two hypotheses, tested at a significant level of 0.05. The research design was a survey. The study had 350 participants. A 40-item "Entrepreneurship Education and Economic Security Questionnaire" (EEESQ) was validated by five experts from the University of Calabar and used in data collection. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Motivational Strategies and Security Service Delive ry in Universities in Cross River State, Nigeria.Comfort Robert Etor & Michael Ekpenyong Asuquo - 2021 - International Journal of Educational Administrati on, Planning, and Research 13 (1):55-65.
    This study assessed two motivational strategies and their respective ties to the service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study. The entire population of 440 security personnel in two public universities was studied, based on the census approach and following the ex-post facto research design. Three sets of expert-validated questionnaires, with Cronbach reliability estimates of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
    In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than national security. Just what more important means is its own question, though, so I will be more precise. I will argue that national security rationales cannot by themselves justify some kinds of encroachments on individual privacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Institutional variables and the supervision of security in public secondary schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  87
    Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual rights and privacy. This method involves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Symbol Systems as Collective Representational Resources: Mary Hesse, Nelson Goodman, and the Problem of Scientific Representation.Axel Gelfert - 2015 - Social Epistemology Review and Reply Collective 4 (6):52-61.
    This short paper grew out of an observation—made in the course of a larger research project—of a surprising convergence between, on the one hand, certain themes in the work of Mary Hesse and Nelson Goodman in the 1950/60s and, on the other hand, recent work on the representational resources of science, in particular regarding model-based representation. The convergence between these more recent accounts of representation in science and the earlier proposals by Hesse and Goodman consists in the recognition that, in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Philosophical foundations of intelligence collection and analysis: a defense of ontological realism.William Mandrick & Barry Smith - 2022 - Intelligence and National Security 38.
    There is a common misconception across the lntelligence Community (IC) to the effect that information trapped within multiple heterogeneous data silos can be semantically integrated by the sorts of meaning-blind statistical methods employed in much of artificial intelligence (Al) and natural language processlng (NLP). This leads to the misconception that incoming data can be analysed coherently by relying exclusively on the use of statistical algorithms and thus without any shared framework for classifying what the data are about. Unfortunately, such approaches (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Transformation of international economic relations: modern challenges, risks, opportunities and prospects: collective monograph.M. Bezpartochnyi - 2017 - ISMA University.
    The authors of the book have come to the conclusion that it is necessary to effectively use the methodological tools for assessing the competitiveness of financial and insurance markets, methodological approaches to assessing the effectiveness of regional policy, internal audit of resources. Basic research is aimed at researching the main trends in the international economy, socialization of global economic development, investment aspects of development countries, functioning of consumer market in the international economic system, trends of international population migration, processes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Military Intervention in Interstate Armed Conflicts.Cécile Fabre - 2023 - Social Philosophy and Policy 40 (2):431-454.
    Suppose that state A attacks state D without warrant. The ensuing military conflict threatens international peace and security. State D (I assume) has a justification for defending itself by means of military force. Do third parties have a justification for intervening in that conflict by such means? To international public lawyers, the well-rehearsed and obvious answer is “yes.” Threats to international peace and security provide one of two exceptions to the legal and moral prohibition (as set out in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Justifying Coercive and Non-Coercive Intervention: Strategic and Humanitarian Arguments.Rory J. Conces - 2001 - Acta Analytica 16 (27):133-52.
    The world's political and military leaders are under increasing pressure to intervene in the affairs of sovereign nations. Although the sovereignty of states and the corollary principle of nonintervention have been part of the foundation of international law, there is some latitude for states, as well as collective security organizations, to intervene in another state's domestic and foreign affairs, thus making sovereignty and the principle less than absolute. In this paper I first sketch a reasonable foundation for sovereignty (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Evaluating ICT utilization in education administration and management during the COVID-19 outbreak in Pakistan: An empirical review.Abdul Rahim Chandio - 2021 - Journal of Research in Instructional e-Issn: 2776-222X 1 (1):81 – 94.
    Abstract: This study aims to evaluate the utilization of ICT in education administration and management in a Pakistan context during the pandemic outbreak. Adoption of information and communication technologies (ICTs) has digitalized the learning process where education organizations were administrated by means of wireless-based instructions, electronic pedagogy, and online assessment in order to continue the educational activities while the government halted the physical appearance in education institutions. Data collection has been carried by three public universities in which teachers and general (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  67
    Safety and Protection Practices in the Early Childhood Education Centres.Ibiwari Caroline Dike & Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):294-305.
    A safe and secure environment is an essential part of the early childhood development of any child. This study aims to investigate the safety and protection practices of early childhood centers in the Anambra state, Nigeria, and to determine if any improvements can be made to them. This study analyzed data collected from 60 Early Childhood Care Centers (ECCE Centers) and 60 Pre-Primary Schools (Preprimary School) in Anambra State using the Evaluation of ECCE Implementation Kit (KEIEP), direct observation, and unstructured (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  79
    Stakeholders’ Evaluation of a Farmer-Herder Conflict Research Project in the Ashanti Region of Ghana.Suhiyini Alhassan - 2024 - Sustainable Agriculture Research 13 (2):84-100.
    There has been growing interest in the evaluation of research projects in Africa because of the quantum of funding devoted to research by governmental and non-governmental organizations. One area that has received a lot of research funding is farmer-herder conflicts due to its high impact on peace, security and development on the continent. This paper evaluates a Danida-funded research project in the Ashanti Region of Ghana dubbed “Access-Authority Nexus in Farmer-Herder Conflicts (AAN Project)”. Primary data was collected from 46 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Family and community inputs as predictors of students’ overall, cognitive, affective and psychomotor learning outcomes in secondary schools.John Asuquo Ekpenyong, Valentine Joseph Owan, Usen Friday Mbon & Stephen Bepeh Undie - 2023 - Journal of Pedagogical Research 7 (1):103-127.
    There are contradictory results regarding how students' learning outcomes can be predicted by various family and community inputs among previous studies, creating an evidence gap. Furthermore, previous studies have mostly concentrated on the cognitive aspect of students' learning outcomes, ignoring the affective and psychomotor dimensions, creating key knowledge gaps. Bridging these gaps, this predictive correlational study was conducted to understand how cultural capital, parental involvement (family inputs), support for schools, security network and school reforms (community inputs) jointly and partially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  94
    Nomophobia (no-mobile-phone phobia) among the undergraduate medical students.Suleman Lazarus, Abdul Rahim Ghafari, Richard Kapend, Khalid Jan Rezayee, Hasibullah Aminpoor, Mohammad Yasir Essar & Arash Nemat - 2024 - Heliyon 10 (16):1-13.
    Nomophobia (no-mobile-phone phobia) is the fear and anxiety of being without a mobile phone. This study pioneers the investigation of nomophobia in Afghanistan using the Nomophobia Questionnaire (NMP-Q), addressing a crucial gap in the field. We collected statistical data from 754 undergraduate medical students, comprising men (56.50 %) and women (43.50 %), and analyzed the dimensions of nomophobia. While results revealed that all but two participants were nomophobic, they identified three significant dimensions affecting the level of nomophobia among participants: (a) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Why the NSA didn’t diminish your privacy but might have violated your right to privacy.Lauritz Munch - forthcoming - Analysis.
    According to a popular view, privacy is a function of people not knowing or rationally believing some fact about you. But intuitively it seems possible for a perpetrator to violate your right to privacy without learning any facts about you. For example, it seems plausible to say that the US National Security Agency’s PRISM program violated, or could have violated, the privacy rights of the people whose information was collected, despite the fact that the NSA, for the most part, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Politics of Evasion: A post-globalization dialogue along the edge of the state.Robert Latham - 2016 - Routledge.
    Burgeoning national security programs; thickening borders; Wikileaks and Anonymous; immigrant rights rallies; Occupy movements; student protests; neoliberal austerity; global financial crises – these developments underscore how much the fable of a hope-filled post-cold war globalization has faded. In its place looms the prospect of states and corporations transforming a permanent war on terror into a permanent war on society. How, at this juncture, might policymakers and power-holders in leading states and corporations of the Global North be reframing their pursuit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. What Is Antinatalism? And Other Essays: Philosophy of Life in Contemporary Society.Masahiro Morioka - 2021 - Tokyo Philosophy Project.
    This book is a collection of essays on the philosophy of life’s meaning in contemporary society. Topics range from antinatalism, meaning of life, the trolley problem, to painless civilization. I am now writing a comprehensive philosophy book on those topics, but it will take several years to complete; hence, I decided to make a handy book to provide readers with an outline of the philosophical approaches to the meaning of life that I have in mind. -/- Chapter One discusses the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. ‘Liberal Democracy’ in the ‘Post-Corona World’.Shirzad Peik - 2020 - Journal of Philosophical Investigations at University of Tabriz 14 (31):1-29.
    ABSTRACT A new ‘political philosophy’ is indispensable to the ‘post-Corona world,’ and this paper tries to analyze the future of ‘liberal democracy’ in it. It shows that ‘liberal democracy’ faces a ‘global crisis’ that has begun before, but the ‘novel Coronavirus pandemic,’ as a setback for it, strongly encourages that crisis. ‘Liberalism’ and ‘democracy,’ which had long been assumed by ‘political philosophers’ to go together, are now becoming decoupled, and the ‘liberal values’ of ‘democracy’ are eroding. To find why and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Forgiving Grave Wrongs.Alisa L. Carse & Lynne Tirrell - 2010 - In Christopher R. Allers & Marieke Smit (eds.), Forgiveness In Perspective. Rodopi Press. pp. 66--43.
    We introduce what we call the Emergent Model of forgiving, which is a process-based relational model conceptualizing forgiving as moral and normative repair in the wake of grave wrongs. In cases of grave wrongs, which shatter the victim’s life, the Classical Model of transactional forgiveness falls short of illuminating how genuine forgiveness can be achieved. In a climate of persistent threat and distrust, expressions of remorse, rituals and gestures of apology, and acts of reparation are unable to secure the moral (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Cross-border feminism: Shifting the terms of debate for us and european feminists.Shari Stone-Mediatore - 2009 - Journal of Global Ethics 5 (1):57 – 71.
    Recent decades of women's rights advocacy have produced numerous regional and international agreements for protecting women's security, including a UN convention that affirms the state's responsibility to protect key gender-specific rights, with no exceptions on the basis of culture or religion. At the same time, however, the focus on universal women's rights has enabled influential feminists in the United States to view women's rights in opposition to culture, and most often in opposition to other people's cultures. Not surprisingly, then, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Social norms and farm animal protection.Nicolas Delon - 2018 - Palgrave Communications 4:1-6.
    Social change is slow and difficult. Social change for animals is formidably slow and difficult. Advocates and scholars alike have long tried to change attitudes and convince the public that eating animals is wrong. The topic of norms and social change for animals has been neglected, which explains in part the relative failure of the animal protection movement to secure robust support reflected in social and legal norms. Moreover, animal ethics has suffered from a disproportionate focus on individual attitudes and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Educating Future Generations of Community Gardeners.Shane J. Ralston - 2012 - Critical Education 3 (3):1-17.
    I formulate a Deweyan argument for school gardening that prepares students for a specific type of gardening activism: community gardening, or the political activity of collectively organizing, planting and tending gardens for the purposes of food security, education and community development.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Government Policy Experiments and Informed Consent.Douglas MacKay & Averi Chakrabarti - 2019 - Public Health Ethics 12 (2):188-201.
    Governments are increasingly making use of field experiments to evaluate policy interventions in the spheres of education, public health and welfare. However, the research ethics literature is largely focused on the clinical context, leaving investigators, institutional review boards and government agencies with few resources to draw on to address the ethical questions they face regarding such experiments. In this article, we aim to help address this problem, investigating the conditions under which informed consent is required for ethical policy research conducted (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  64
    A theory of Human Rights.James Mensch - manuscript
    Since the original UN Universal Declaration of Human Rights1 laid out the general principles of human rights, there has been a split between what have been regarded as civil and political rights as opposed to economic, cultural and social rights. It was, in fact, the denial that both could be considered “rights” that prevented them from being included in the same covenant.2 Essentially, the argument for distinguishing the two concerns the nature of freedom. The civil rights to the freedoms of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Open Handbook of Formal Epistemology.Richard Pettigrew & Jonathan Weisberg (eds.) - 2019 - PhilPapers Foundation.
    In formal epistemology, we use mathematical methods to explore the questions of epistemology and rational choice. What can we know? What should we believe and how strongly? How should we act based on our beliefs and values? We begin by modelling phenomena like knowledge, belief, and desire using mathematical machinery, just as a biologist might model the fluctuations of a pair of competing populations, or a physicist might model the turbulence of a fluid passing through a small aperture. Then, we (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  38. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this symposium (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Trust as a Public Virtue.Warren Von Eschenbach (ed.) - 2019 - London and New York:
    Western societies are experiencing a crisis of trust: we no longer enjoy high levels of confidence in social institutions and are increasingly skeptical of those holding positions of authority. The crisis of trust, however, seems paradoxical: at the same time we report greater feelings of mistrust or an erosion of trust in institutions and technologies we increasingly entrust our wellbeing and security to these very same technologies and institutions. Analyzing trust not only will help resolve the paradox but suggests (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Ontology and Cognitive Outcomes.David Limbaugh, Jobst Landgrebe, David Kasmier, Ronald Rudnicki, James Llinas & Barry Smith - 2020 - Journal of Knowledge Structures and Systems 1 (1): 3-22.
    The term ‘intelligence’ as used in this paper refers to items of knowledge collected for the sake of assessing and maintaining national security. The intelligence community (IC) of the United States (US) is a community of organizations that collaborate in collecting and processing intelligence for the US. The IC relies on human-machine-based analytic strategies that 1) access and integrate vast amounts of information from disparate sources, 2) continuously process this information, so that, 3) a maximally comprehensive understanding of world (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Gender Justice and Statistics.Scott Wisor - 2016 - In Kim Rubenstein & Katharine G. Young (eds.), The Public Law of Gender. Cambridge University Press.
    The last two decades have seen a welcome proliferation of the collection and dissemination of data on social progress, as well as considered public debates rethinking existing standards of measuring the progress of societies. These efforts are to be welcomed. However, they are only a nascent step on a longer road to the improved measurement of social progress. In this paper, I focus on the central role that gender should take in future efforts to measure progress in securing human rights, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Social Welfare: An approach to the concept from a multidimensional perspective.Carlos Medel-Ramírez & Hilario Medel-López - manuscript
    Winds of change, from the political perspective in Mexico, invite us to reformulate the methodological vision for the direction of public policy in the field of social development, directing their actions towards the construction of a methodological proposal that allows us to direct ourselves towards achieving higher levels of Well-being Social in our country, as a desirable objective of public policy and which is expected to be inclusive, participatory and democratic. -/- In this sense, it is important to recognize that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. THE MECHANISM OF LAW AS MEDIUM OF VIOLENCE AND THE EMERGENCE OF END SARS: TOWARDS THE ARTICULATION OF GOOD LEADERSHIP IN NIGERIA.Simon Efenji, Joseph - 2018 - Journal of Rare Ideas 1 (1).
    This work establishes that the primary justification for the state is its role as the guarantor of last resort of the personal safety, liberty and property of the citizens. The essay upholds that the state exists fundamentally for the protection of life and property and ensuring the wellbeing of the citizens and unless it performs this basic function it has no reason to exist. The essay equally establishes that no other time since the civil war era has Nigeria's state been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Collectivized Intellectualism.Julia Jael Smith & Benjamin Wald - 2019 - Res Philosophica 96 (2):199-227.
    We argue that the evolutionary function of reasoning is to allow us to secure more accurate beliefs and more effective intentions through collective deliberation. This sets our view apart both from traditional intellectualist accounts, which take the evolutionary function to be individual deliberation, and from interactionist accounts such as the one proposed by Mercier and Sperber, which agrees that the function of reasoning is collective but holds that it aims to disseminate, rather than come up with, accurate beliefs. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. URBAN INFRASTRUCTURE PREFERENCES OF TOWNSFOLK: AN EMPIRICAL SURVEY WITHIN THE FRAMEWORK OF SOCIO-ECOLOGICAL MODEL OF THE CITY.Vitalii Shymko, Daria Vystavkina & Ievgeniia Ivanova - 2020 - Technologies of Intellect Development 4 (2(27)).
    The article presents the results of an interdisciplinary (psychological, behavioral, sociological, urban) survey of residents of elite residential complexes of Odessa regarding theirs urban infrastructure preferences, as well as the degree of satisfaction with their place of residence. It was found that respondents are characterized by a high level of satisfaction with their place of residence. It was also revealed that the security criterion of the district is the main one for choosing a place of residence, which indicates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Analysis of Institutional Capacity of National Social Protection Policy Framework.Narith Por - 2018 - World Journal of Research and Review 6 (4):66-71.
    Cambodians are still vulnerable. To reverse those conditions, National Social Protection Strategy (N.S.P.S) was developed for the poor and vulnerable people to promote their livelihoods. Royal Government of Cambodia (R.G.C) has paid attention to social assistance. In strategic plans, highlights on strengthening, and collectively developing social security, consistent and effective. With these issues, the government establishes a national social protection policy framework to help all people in particular poor and vulnerable people (M.o.E.F, 2017, p.1). The research aims at reviewing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. How do medical device manufacturers' websites frame the value of health innovation? An empirical ethics analysis of five Canadian innovations.Pascale Lehoux, M. Hivon, Bryn Williams-Jones, Fiona A. Miller & David R. Urbach - 2012 - Medicine, Health Care and Philosophy 15 (1):61-77.
    While every health care system stakeholder would seem to be concerned with obtaining the greatest value from a given technology, there is often a disconnect in the perception of value between a technology’s promoters and those responsible for the ultimate decision as to whether or not to pay for it. Adopting an empirical ethics approach, this paper examines how five Canadian medical device manufacturers, via their websites, frame the corporate “value proposition” of their innovation and seek to respond to what (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. A preamble about doing research that sells.Quan-Hoang Vuong - 2022 - In Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.), The mindsponge and BMF analytics for innovative thinking in social sciences and humanities. Berlin, Germany: De Gruyter.
    Being a researcher is challenging, especially in the beginning. Early Career Researchers (ECRs) need achievements to secure and expand their careers. In today’s academic landscape, researchers are under many pressures: data collection costs, the expectation of novelty, analytical skill requirements, lengthy publishing process, and the overall competitiveness of the career. Innovative thinking and the ability to turn good ideas into good papers are the keys to success.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Doing Academia Differently: “I Needed Self-Help Less Than I Needed a Fair Society”.Laura Bisaillon, Alana Cattapan, Annelieke Driessen, Esther van Duin, Shannon Spruit, Lorena Anton & Nancy S. Jecker - 2020 - Feminist Studies 46 (1):130-157.
    In lieu of an abstract, here is a brief excerpt of the content:130 Feminist Studies 46, no. 1. © 2020 by Feminist Studies, Inc. Laura Bisaillon, Alana Cattapan, Annelieke Driessen, Esther van Duin, Shannon Spruit, Lorena Anton, and Nancy S. Jecker Doing Academia Differently: “I Needed Self-Help Less Than I Needed a Fair Society” A great deal of harm is being done by belief in the virtuousness of work. — Bertrand Russell, “In Praise of Idleness” We are committed to doing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Going Back to Normal: A Phenomenological Study on the Challenges and Coping Mechanisms of Junior High School Teachers in the Full Implementation of In-Person Classes in the Public Secondary Schools in the Division of Rizal.Jarom Anero & Eloisa Tamayo - 2023 - Psychology and Education: A Multidisciplinary Journal 12:767-808.
    The study focused on exploring and understanding the challenges junior high school teachers in the Division of Rizal faced during the full implementation of in-person classes and identifying the coping mechanisms they employed to adapt to this new educational landscape. Forty participants were purposefully selected from various public secondary school clusters in the division of Rizal. A qualitative phenomenological design was employed, and the information collected through Google Forms was imported into Microsoft Excel and Microsoft Word. After importing the data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 955