Results for 'cyber vulnerability'

791 found
Order:
  1.  55
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  2. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  59
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Vulnerability, Recognition, and the Ethics of Pregnancy: A Theological Response.Margaret Kamitsuka - 2024 - Hypatia.
    Vulnerability is a notion discussed in feminist philosophy as a basis for a morality that widens our sense of those whose deaths are grievable. Vulnerability and grievability also factor in reproductive ethics. This essay employs recognition theory to analyze critically how these notions are mobilized in conservative Christian anti-abortion writings and in feminist philosophy. This analysis exposes weaknesses and misrecognition in both sets of discourses. In response, I offer theological arguments for recognizing fetal value without implying a right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Vulnerability in Social Epistemic Networks.Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2020 - International Journal of Philosophical Studies 28 (5):1-23.
    Social epistemologists should be well-equipped to explain and evaluate the growing vulnerabilities associated with filter bubbles, echo chambers, and group polarization in social media. However, almost all social epistemology has been built for social contexts that involve merely a speaker-hearer dyad. Filter bubbles, echo chambers, and group polarization all presuppose much larger and more complex network structures. In this paper, we lay the groundwork for a properly social epistemology that gives the role and structure of networks their due. In particular, (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  15. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  17. Safeguarding Vulnerable Autonomy? Situational Vulnerability, The Inherent Jurisdiction and Insights from Feminist Philosophy.Jonathan Lewis - 2021 - Medical Law Review 29 (2):306-336.
    The High Court continues to exercise its inherent jurisdiction to make declarations about interventions into the lives of situationally vulnerable adults with mental capacity. In light of protective responses of health care providers and the courts to decision-making situations involving capacitous vulnerable adults, this paper has two aims. The first is diagnostic. The second is normative. The first aim is to identify the harms to a capacitous vulnerable adult’s autonomy that arise on the basis of the characterisation of situational (...) and autonomy as fundamentally opposed concepts or the failure to adequately acknowledge the conceptual relationship between them at common law. The second part of this aim is to draw upon developments in analytic feminist philosophy to illustrate how standard approaches to autonomy are ill-equipped to capture the autonomy issues of capacitous vulnerable adults when their decisions regarding care and treatment are at stake. The second (normative) aim is to develop an account of self-authorised, intersubjective autonomy on the basis of analytic feminist insights into the relational practices of recognition. This account not only attempts to capture the autonomy of capacitous vulnerable adults and account for the necessary harms to their autonomy that arise from standard common law responses to their situational vulnerability, it is also predicated on the distinctions between mental capacity, the satisfaction of conditions for informed consent and the exercise of autonomy, meaning that it is better placed to fulfil the primary aim of the inherent jurisdiction – to facilitate the autonomy of vulnerable adults with capacity. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Vulnerability, Insecurity and the Pathologies of Trust and Distrust.Catriona Mackenzie - 2020 - International Journal of Philosophical Studies:624-643.
    While some trust theorists have adverted to the vulnerabilities involved in trust, especially vulnerability to betrayal, the literature on trust has not engaged with recent work on the ethics of vulnerability. This paper initiates a dialogue between these literatures, and in doing so begins to explore the complex interrelations between vulnerability and trust. More specifically, it aims to show how trust can both mitigate and compound vulnerability. Through a discussion of two examples drawn from literary sources, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  65
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Vulnerable due to hope: aspiration paradox as a cross-cultural concern.Eric Palmer - 2014 - Conference Publication, International Development Ethics Association 10th Conference: Development Ethics Contributions for a Socially Sustainable Future.
    (Conference proceedings 2014) This presentation (International Development Ethics Association, July 2014) considers economic vulnerability, exploring the risk of deprivation of necessary resources due to a complex and rarely discussed vulnerability that arises from hope. Pierre Bourdieu’s sociological account of French petit-bourgeois aspiration in The Social Structures of the Economy has recently inspired Wendy Olsen to introduce the term “aspiration paradox” to characterize cases wherein “a borrower's status aspirations may contribute to a situation in which their borrowings exceed their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  42
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  23. Children's Vulnerability and Legitimate Authority Over Children.Anca Gheaus - 2018 - Journal of Applied Philosophy:60-75.
    Children's vulnerability gives rise to duties of justice towards children and determines when authority over them is legitimately exercised. I argue for two claims. First, children's general vulnerability to objectionable dependency on their caregivers entails that they have a right not to be subject to monopolies of care, and therefore determines the structure of legitimate authority over them. Second, children's vulnerability to the loss of some special goods of childhood determines the content of legitimate authority over them. (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  24. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Recognition, Vulnerability and Trust.Danielle Petherbridge - 2021 - International Journal of Philosophical Studies 29 (1):1-23.
    ABSTRACT This paper examines the question of whether recognition relations are based on trust. Theorists of recognition have acknowledged the ways in which recognition relations make us vulnerable to others but have largely neglected the underlying ‘webs of trust’ in which such relations are embedded. In this paper, I consider the ways in which the theories of recognition developed by Jürgen Habermas and Axel Honneth, not only point to our mutual vulnerability but also implicitly rely upon mutual relations of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. Expressive Vulnerabilities: Language and the Non-Human.Joe Larios - 2020 - International Journal of Philosophical Studies 28 (5):662-676.
    Emmanuel Levinas’s work seemingly places a great emphasis on language leading some commentators towards a Kantian reading of him where moral consideration would be based on the moral patient’s capacity for reason with language functioning as a proxy for this. Although this reading is possible, a closer look at Levinas’s descriptions of language reveal that its defining characteristic is not reason but the capacity to express beyond any thematized contents we would give to the Other. This expressivity (which Levinas calls (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. The role of vulnerability in Kantian ethics.Paul Formosa - 2013 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. New York: Oup Usa. pp. 88-109.
    Does the fact that humans are vulnerable, needy and dependent beings play an important role in Kantian ethics? It is sometimes claimed that it cannot and does not. I argue that it can and does. I distinguish between broad (all persons are vulnerable) and narrow (only some persons are vulnerable) senses of vulnerability, and explain the role of vulnerability in both senses in Kantian ethics. The basis of this argument is to show that the core normative focus of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  30. Bioethical Implications of Vulnerability and Politics for Healthcare in Ethiopia and The Ways Forward.Kirubel Manyazewal Mussie, Bernice Simone Elger, Mirgissa Kaba, Félix Pageau & Isabelle Wienand - 2022 - Journal of Bioethical Inquiry 19 (4):667-681.
    Vulnerability and politics are among the relevant and key topics of discussion in the Ethiopian healthcare context. Attempts by the formal bioethics structure in Ethiopia to deliberate on ethical issues relating to vulnerability and politics in healthcare have been limited, even though the informal analysis of bioethical issues has been present in traditional Ethiopian communities. This is reflected in religion, social values, and local moral underpinnings. Thus, the aim of this paper is to discuss the bioethical implications of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  44
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Epistemic vulnerability and tolerance in society.Maddox Larson - 2024 - The Philosophy, Politics, and Economics Review 3:15-28.
    The question of church-state separation has haunted America since her founding. James Madison and select founding fathers suggest that religions and states are better off when they minimize (or altogether eliminate) their interactions. Many Muslims in Iran, for instance, believe the opposite – aligning state functions with religious motives results in the most effective state. In this paper, I propose a model of thinking about church-state separation in which states and religions must maintain epistemic vulnerability to allow legal, political, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Shame, Vulnerability, and Change.Jing Iris Hu - 2022 - Journal of the American Philosophical Association 8 (2):373-390.
    Shame is frequently viewed as a destructive emotion; but it can also be understood in terms of change and growth. This essay highlights the problematic values that cause pervasive and frequent shame and the importance of resisting and changing these values. Using Confucian insights, I situate shame in an interactive process between the individual's values and that of their society, thus, being vulnerable to shame represents both one's connection to a community and an openness to others’ negative feedback. This process (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  37. Human vulnerability: A break to autonomy?Carlos Alberto Rosas Jimenez - 2015 - Revista de Bioética Latinoamericana 1 (16):1-16.
    In society, human vulnerability is associated with multiple causes such as poverty, injustice, discrimination and illnesses, among others. In the midst of this panorama of external agents that lead human beings to situations of vulnerability, some clearly see – although others not so much – a vulnerability proper to the human person, simply because they exist. This approach to vulnerability is considered to be a conditio humana that affects everyone. Precisely because it is a conditio humana, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. In defence of posthuman vulnerability.Belen Liedo Fernandez & Jon Rueda - 2021 - Scientia et Fides 9 (1):215-239.
    Transhumanism is a challenging movement that invites us to rethink what defines humanity, including what we value and regret the most about our existence. Vulnerability is a key concept that require thorough philosophical scrutiny concerning transhumanist proposals. Vulnerability can refer to a universal condition of human life or, rather, to the specific exposure to certain harms due to particular situations. Even if we are all vulnerable in the first sense, there are also different sources and levels of (...) depending on concrete social circumstances. Recently, Michael Hauskeller argued about a fundamental incompatibility between transhumanism and vulnerability. He understands vulnerability as an existential category, linked to woundability and mortality. This idea is akin to ontological vulnerability, but it does not notice some important features of social vulnerability. On the other side, transhumanism is a complex and non-homogeneous movement. Here we distinguish between a strong and a weak version of transhumanism. We will propose that the salience of vulnerability is only diminished in the radical one, while a moderate version can reconcile vulnerability with human enhancement. Thus, vulnerability, a concept that has recently gained much importance as an anthropological category in contemporary ethics, is not necessarily at odds with any transhumanist project. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  31
    Vulnerability
theory
and
transhumanism : helping
The
ontologically
vulnerable.Christophe Facal - 2024 - Société Philosophique Ithaque 34 (34):23-45.
    This paper challenges the prevailing notion in vulnerability theory that only relational vulnerability holds moral significance for aiding the vulnerable. Contrary to this stance, I contend that ontological vulnerability carries moral relevance, and thus grounds a consequentialist duty to mitigate potential harm. This duty constitutes the core ethical principle of transhumanism. My aim will therefore be to defend transhumanism’s central moral tenet from within the framework of vulnerability theory, by showing that ontological vulnerability has moral (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Reluctant Mercenary: Vulnerability and the 'Whores of War'.Ben Fraser - 2013 - Journal of Military Ethics 12 (3):235-251.
    Mercenaries are the target of moral condemnation far more often than they are subject of moral concern. One attempt at morally condemning mercenaries proceeds by analogy with prostitutes; mercenaries are ?the whores of war?. This analogy is unconvincing as a way of condemning mercenaries. However, careful comparison of mercenarism and prostitution suggests that, like many prostitutes, some mercenaries may be vulnerable individuals. If apt, this comparison imposes a consistency requirement: if one thinks certain prostitutes are appropriate subjects of moral concern (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Book Review: Vulnerable Futures, Transformative Pasts: On Vulnerability, Temporality, and Ethics by Miri Rozmarin. [REVIEW]Evelien Geerts - 2020 - Redescriptions: Political Thought, Conceptual History and Feminist Theory 23:2.
    Book review of Rozmarin's Vulnerable Futures, Transformative Pasts (2017).
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Vulnerable Self: Enabling the Recognition of Racial Inequality.Desirée H. Melton - 2009 - In Lisa Tessman (ed.), Feminist Ethics and Social and Political Philosophy: Theorizing the Non-Ideal. Springer. pp. 149--164.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. Spreading the Plague: Vulnerability, Solidarity and Autonomy in the Time of Pandemic.Noemi Magnani - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):69 - 81.
    In a series of reflections published in the wake of the Covid-19 crisis, Giorgio Agamben expresses a number of concerns related to the way the pandemic has altered the very fabric of our societies, potentially changing it forever. While maintaining a certain scepticism towards the threat represented by the virus itself, Agamben claims that the response to the contagion shows how easy it is for authorities to limit individual freedoms in the name of public health, and how readily they are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Feminist archives: narrating embodied vulnerabilities and practices of care.Valentina Moro - 2022 - Biblioteca Della Libertà 57 (235):39-71.
    The outbreak of SARS-CoV-2 has exposed a shared condition of vulnerability on a global scale. How can we use vulnerability as an effective paradigm in order to foster collective political initiatives? This essay claims that the idea of care is key to understand the vulnerability framework as being both an epistemic and a political resource to address ethical issues. The first half of the essay recollects several arguments in Adriana Cavarero’s and Judith Butler’s most recent works, insofar (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Politics of Vulnerability and Care: An Interview with Estelle Ferrarese.Liesbeth Schoonheim, Tivadar Vervoort & Estelle Ferrarese - 2022 - Krisis 42 (1):77-92.
    In this interview, Estelle Ferrarese elaborates on her account of vulnerability and care to highlight its political and social, as opposed to its ethical, dimensions. Drawing on, amongst others, Adorno, Tronto, Castell, and Laugier, she argues that vulnerability and care should not be understood ontologically, as an antropological exposure of the body, but rather socially, as the normative expectations and material conditions under which care work takes place. Situating her approach in anglophone and francophone discussions on vulnerability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Multiple Vulnerabilities of the Elderly People in Indonesia: Ethical Considerations.Yeremias Jena - 2014 - Philosophy Study 4 (4):277-286.
    Unethical behavior among university students such as cheating and plagiarism has weakened the character of honesty in education. This fact has challenged those who perceived education as a holistic process of internalizing values and norms that lead to the formation of students’ moral principles and moral behavior. Educators have played the role of ensuring the students to internalize and realized moral values and norms. A study of 360 students of the second semester who enrolled at the course of “ethical and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Nature's Relations: Ontology, Vulnerability, Agency.Didier Zúñiga - 2020 - Hypatia 35 (2):298-316.
    Political theory and philosophy need to widen their view of the space in which what matters politically takes place, and I suggest that integrating the conditions of sustainability of all affected—that is, all participants in nature's relations—is a necessary first step in this direction. New materialists and posthumanists have challenged how nature and politics have traditionally been construed. While acknowledging the significance of their contributions, I critically examine the ethical and political implications of their ontological project. I focus particularly on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. The 'Great Equalizer'? Autonomy, Vulnerability and Solidarity in Uncertain Times.Noemi Magnani - 2020 - Biblioteca Della Libertà 2 (228):1 - 22.
    In this paper I engage with the notion that Covid-19 can be seen as the ‘great equalizer’, in virtue of the widespread sense of uncertainty it has caused and the fact that it has forced us to recognize our shared human fragility. Against the view that Covid-19 is the ‘great equalizer’, I argue that, on the contrary, the pandemic reflects existing vulnerabilities and, in many cases, exacerbates them. I do so by offering first a definition of both ontological and relational (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 791