Results for 'human security risks'

999 found
Order:
  1. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Being Sure and Living Well: How Security Affects Human Flourishing.J. A. M. Daemen - 2024 - Journal of Value Inquiry 58 (1):93-110.
    This paper analyses how security affects well-being. Security is understood as someone’s sureness of enjoying some good in the future; well-being is treated as a matter of human flourishing. Security can contribute to our well-being in various ways: if we are in fact bound to enjoy a good, in principle this is positive for our flourishing in the future; if we also believe that we will enjoy this good, we can be more efficient in pursuing our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Risks of artificial general intelligence.Vincent C. Müller (ed.) - 2014 - Taylor & Francis (JETAI).
    Special Issue “Risks of artificial general intelligence”, Journal of Experimental and Theoretical Artificial Intelligence, 26/3 (2014), ed. Vincent C. Müller. http://www.tandfonline.com/toc/teta20/26/3# - Risks of general artificial intelligence, Vincent C. Müller, pages 297-301 - Autonomous technology and the greater human good - Steve Omohundro - pages 303-315 - - - The errors, insights and lessons of famous AI predictions – and what they mean for the future - Stuart Armstrong, Kaj Sotala & Seán S. Ó hÉigeartaigh - pages (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Risks of artificial intelligence.Vincent C. Müller (ed.) - 2016 - CRC Press - Chapman & Hall.
    Papers from the conference on AI Risk (published in JETAI), supplemented by additional work. --- If the intelligence of artificial systems were to surpass that of humans, humanity would face significant risks. The time has come to consider these issues, and this consideration must include progress in artificial intelligence (AI) as much as insights from AI theory. -- Featuring contributions from leading experts and thinkers in artificial intelligence, Risks of Artificial Intelligence is the first volume of collected chapters (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Some discussions on critical information security issues in the artificial intelligence era.Vuong Quan Hoang, Viet-Phuong La, Hong-Son Nguyen & Minh-Hoang Nguyen - manuscript
    The rapid advancement of Information Technology (IT) platforms and programming languages has transformed the dynamics and development of human society. The cyberspace and associated utilities are expanding, leading to a gradual shift from real-world living to virtual life (also known as cyberspace or digital space). The expansion and development of Natural Language Processing (NLP) models and Large Language Models (LLMs) demonstrate human-like characteristics in reasoning, perception, attention, and creativity, helping humans overcome operational barriers. Alongside the immense potential of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  7. Epidemics and food security: the duties of local and international communities.Angela K. Martin - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 408-413.
    Over 60% of all epidemics have a zoonotic origin, that is, they result from the transmission of infectious diseases from animals to humans. The spill-over of diseases often happens because humans exploit and use animals. In this article, I outline the four most common interfaces that favour the emergence and spread of zoonotic infectious diseases: wildlife hunting, small-scale farming, industrialised farming practices and live animal markets. I analyse which practices serve human food security – and thus have a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Justifying the risks of COVID-19 challenge trials: The analogy with organ donation.Athmeya Jayaram, Jacob Sparks & Daniel Callies - 2022 - Bioethics 36 (1):100-106.
    In the beginning of the COVID pandemic, researchers and bioethicists called for human challenge trials to hasten the development of a vaccine for COVID. However, the fact that we lacked a specific, highly effective treatment for COVID led many to argue that a COVID challenge trial would be unethical and we ought to pursue traditional phase III testing instead. These ethical objections to challenge trials may have slowed the progress of a COVID vaccine, so it is important to evaluate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the viability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the global (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Age of Genetics and the age of biotechnology on the way to editing of, human genome.Valentin Teodorovich Cheshko (ed.) - 2016 - Moscow Russia: Kurs-INFRA-M.
    The book discusses some of the stages in the development of genetics, biotechnology in terms of basic strategy of humanity towards the formation of a modern agrarian civilization. Agricultural civilization is seen as part of the biosphere and primary user of its energy flows. Consistently a steps of creation of management tools for live objects to increasing the number of food security of mankind are outlines. The elements of the biosphere degradation started in the results of human activities, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Australia's Approach to AI Governance in Security and Defence.Susannah Kate Devitt & Damian Copeland - forthcoming - In M. Raska, Z. Stanley-Lockman & R. Bitzinger (eds.), AI Governance for National Security and Defence: Assessing Military AI Strategic Perspectives. Routledge. pp. 38.
    Australia is a leading AI nation with strong allies and partnerships. Australia has prioritised the development of robotics, AI, and autonomous systems to develop sovereign capability for the military. Australia commits to Article 36 reviews of all new means and method of warfare to ensure weapons and weapons systems are operated within acceptable systems of control. Additionally, Australia has undergone significant reviews of the risks of AI to human rights and within intelligence organisations and has committed to producing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Abundance of words versus Poverty of mind: The hidden human costs of LLMs.Quan-Hoang Vuong & Manh-Tung Ho - manuscript
    This essay analyzes the rise of Large Language Models (LLMs) such as GPT-4 or Gemini, which are now incorporated in a wide range of products and services in everyday life. Importantly, it considers some of their hidden human costs. First, is the question of who is left behind by the further infusion of LLMs in society. Second, is the issue of social inequalities between lingua franca and those which are not. Third, LLMs will help disseminate scientific concepts, but their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Human Security Paradigm and Cosmopolitan Democracy.Andreea Iancu - 2014 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 1 (2): 167-174.
    This paper discusses the relation between the human security paradigm and the cosmopolitan democracy scenario as models for humanizing and changing the current international system and transforming it in a global security and development system centered on the individual rather than on the nation state. The main idea for which I argue is that the human security paradigm and the changes it determined in international relations (especially through the responsibility to protect principle) are compatible with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. European urban (counter)terrorism's spacetimematterings: More-than-human materialisations in situationscaping times.Evelien Geerts, Katharina Karcher, Yordanka Dimcheva & Mireya Toribio Medina - 2023 - In Alice Martini & Raquel Da Silva (eds.), Contemporary Reflections on Critical Terrorism Studies. Routledge. pp. 31-52.
    Infusing contemporary critical terrorism studies (CTS) with concepts and methodologies from philosophy and critical theory via a Baradian posthumanist agential realist perspective and (counter)terrorist cases and vignettes, this chapter argues for a retheorisation of (counter)terrorism. It does so, firstly, by reconceptualising terrorism and counterterrorism as complex assemblages consisting not only of discursive-material components – an entanglement now largely accepted within CTS and critical security studies (CSS) – but also of affective layers and more-than-human phenomena. Secondly, by analysing European (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Reducing social inequality: the capabilities on the maintenance of human security / Reduzindo as desigualdades sociais: as capacidades na manutenção da segurança humana.Rodrigo Cid - 2010 - Páginas de Filosofía 2 (2):107-137.
    This text is the result of academic research aimed at achieve the goal of finding viable ways to reduce social inequalities in the Brazilian context through the education. Our main focus was the pursuit of reducing violence through education and the ways in which education can promote development and security human in general. In order to achieve this goal with clarity and consistency, I address theoretical and practical issues. The part theory clarifies the essential concepts and establishes the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Physical Signals and their Thermonuclear Astrochemical Potentials: A Review on Outer Space Technologies.Yang Immanuel Pachankis - 2022 - International Journal of Innovative Science and Research Technology 7 (5):669-674.
    The article reviews on the technical attributes on current technologies deployed in outer space and those that are being developed and mass produced. The article refutes the Chinese state-controlled Xinhua News’ propaganda several years ago on objecting America’s deployment of nuclear technologies in outer space with rigorous scientific evidence. Furthermore, the article warns on the dangers of physical signals applied in outer space technologies that can threaten the solar system, especially the Mozi quantum satellite with photon beams. The article concludes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become especially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Risking Our Security, or Securing Our Risk?: Neoimperialists Play With A Stacked Deck.Leigh M. Johnson - 2005 - Contretemps 4 (1):45-57.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. All too human? Identifying and mitigating ethical risks of Social AI.Henry Shevlin - manuscript
    This paper presents an overview of the risks and benefits of Social AI, understood as conversational AI systems that cater to human social needs like romance, companionship, or entertainment. Section 1 of the paper provides a brief history of conversational AI systems and introduces conceptual distinctions to help distinguish varieties of Social AI and pathways to their deployment. Section 2 of the paper adds further context via a brief discussion of anthropomorphism and its relevance to assessment of (...)-chatbot relationships. Section 3 of the paper provides a survey of potential and in some cases demonstrated harms associated with user interactions with Social AI systems. Finally, Section 4 discusses how the benefits and harms of Social AI can best be addressed, with a primary focus on how frameworks from AI ethics can inform their development. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Mitigating emotional risks in human-social robot interactions through virtual interactive environment indication.Aorigele Bao, Yi Zeng & Enmeng lu - 2023 - Humanities and Social Sciences Communications 2023.
    Humans often unconsciously perceive social robots involved in their lives as partners rather than mere tools, imbuing them with qualities of companionship. This anthropomorphization can lead to a spectrum of emotional risks, such as deception, disappointment, and reverse manipulation, that existing approaches struggle to address effectively. In this paper, we argue that a Virtual Interactive Environment (VIE) exists between humans and social robots, which plays a crucial role and demands necessary consideration and clarification in order to mitigate potential emotional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. On Controllability of Artificial Intelligence.Roman Yampolskiy - manuscript
    Invention of artificial general intelligence is predicted to cause a shift in the trajectory of human civilization. In order to reap the benefits and avoid pitfalls of such powerful technology it is important to be able to control it. However, possibility of controlling artificial general intelligence and its more advanced version, superintelligence, has not been formally established. In this paper, we present arguments as well as supporting evidence from multiple domains indicating that advanced AI can’t be fully controlled. Consequences (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Monitoring Peace and Security Mandates for Human Rights.Deepa Kansra - 2022 - Artha: The Sri Ram Economics Journal 1 (1):188-192.
    The jurisprudence under international human rights treaties has had a considerable impact across countries. Known for addressing complex agendas, the work of expert bodies under the treaties has been credited and relied upon for filling the gaps in the realization of several objectives, including the peace and security agenda. -/- In 1982, the Human Rights Committee (ICCPR), in a General Comment observed that “states have the supreme duty to prevent wars, acts of genocide and other acts of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Pehowa (Kurukshetra). pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Selection and application of appropriate analytical methods needed to assess the risks reducing the security of the protected system.Josef Reitšpís, Martin Mašľan & Igor Britchenko - 2021 - Baltic Journal of Economic Studies 7 (3):1 – 8.
    Risk assessment is one of the prerequisites for understanding its causes and possible consequences. We base our risk assessment on the principles described in the European standard EN 31000 - Risk Management Process. This standard comprehensively describes the continuous activities that are necessary in managing risks and minimizing their possible adverse effects on the operation of the system under investigation. In this activity, it is necessary to first identify the existing risks, then analyze and evaluate the identified (...). In the analysis of existing risks, it is possible to use both qualitative and quantitative analytical methods, or combine them. We use qualitative methods in cases where we do not have a sufficient amount of input information, these are more subjective. Quantitative methods are more accurate, but also more demanding on input information and time. The choice of a suitable analytical method is a basic prerequisite for knowledge of risks and their evaluation. The values of individual risks obtained in this way are the basis for determining the measures that are ecessary to minimize them, i.e., to adjust them to an acceptable level. The draft measures are always based on the value of the individual components used to calculate the risk number, as well as on the value of the asset , which needs to be protected. Appropriately chosen analytical methods are one of the basic prerequisites for the consistent application of the principles of risk management, as a continuous process aimed at increasing the overall security of the system under study. In the article, the author describes the procedures used in risk assessment, as well as specific analytical methods that can be used in working with risks. The aim of identifying risk factors is to create a list of events that could cause undesirable disruption to ongoing processes. At this stage, we define all the risks that will be subsequently analyzed and evaluated. When identifying, we can use methods such as, e.g. SWOT, PHA (Preliminary Hazard Analysis) or CA (Checklist Analysis). Methods suitable for determining the causes and creating scenarios for the course of a risk event are ETA (Event Tree Analysis) or FTA (Fault Tree Analysis). The basic analysis of the system can be performed using the FMEA method (Failure Mode and Effect Analysis), which provides a numerical risk assessment. By comparison with the numerical value of the risk that we are willing to accept, we obtain 2 groups of risks. Acceptable, which will be given regular attention and unacceptable, which we will focus on in risk management and we will try to minimize its negative affect on the functioning of the system under study. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The prolegomens to theory of human stable evolutionarciety at age of controlled evolution techny strategy as ideology of risk soologies.V. T. Cheshko - 2016 - In Teodor N. Țîrdea (ed.), // Strategia supravietuirii din perspectiva bioeticii, filosofiei și medicinei. Culegere de articole științifice. Vol. 22–. pp. 134-139.
    Stable adaptive strategy of Homo sapiens (SESH) is a superposition of three different adaptive data arrays: biological, socio-cultural and technological modules, based on three independent processes of generation and replication of an adaptive information – genetic, socio-cultural and symbolic transmissions (inheritance). Third component SESH focused equally to the adaptive transformation of the environment and carrier of SESH. With the advent of High Hume technology, risk has reached the existential significance level. The existential level of technical risk is, by definition, an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  81
    Risk, Non-Identity, and Extinction.Kacper Kowalczyk & Nikhil Venkatesh - 2024 - The Monist 107 (2):146–156.
    This paper examines a recent argument in favour of strong precautionary action—possibly including working to hasten human extinction—on the basis of a decision-theoretic view that accommodates the risk-attitudes of all affected while giving more weight to the more risk-averse attitudes. First, we dispute the need to take into account other people’s attitudes towards risk at all. Second we argue that a version of the non-identity problem undermines the case for doing so in the context of future people. Lastly, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Moral Risk and Communicating Consent.Renée Jorgensen Bolinger - 2019 - Philosophy and Public Affairs 47 (2):179-207.
    In addition to protecting agents’ autonomy, consent plays a crucial social role: it enables agents to secure partners in valuable interactions that would be prohibitively morally risk otherwise. To do this, consent must be observable: agents must be able to track the facts about whether they have received a consent-based permission. I argue that this morally justifies a consent-practice on which communicating that one consents is sufficient for consent, but also generates robust constraints on what sorts of behaviors can be (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  36. Surviving global risks through the preservation of humanity's data on the Moon.Alexey Turchin & D. Denkenberger - 2018 - Acta Astronautica:in press.
    Many global catastrophic risks are threatening human civilization, and a number of ideas have been suggested for preventing or surviving them. However, if these interventions fail, society could preserve information about the human race and human DNA samples in the hopes that the next civilization on Earth will be able to reconstruct Homo sapiens and our culture. This requires information preservation of an order of magnitude of 100 million years, a little-explored topic thus far. It is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Could slaughterbots wipe out humanity? Assessment of the global catastrophic risk posed by autonomous weapons.Alexey Turchin - manuscript
    Recently criticisms against autonomous weapons were presented in a video in which an AI-powered drone kills a person. However, some said that this video is a distraction from the real risk of AI—the risk of unlimitedly self-improving AI systems. In this article, we analyze arguments from both sides and turn them into conditions. The following conditions are identified as leading to autonomous weapons becoming a global catastrophic risk: 1) Artificial General Intelligence (AGI) development is delayed relative to progress in narrow (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  39. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Risk, Responsibility, and Procreative Asymmetries.Rivka Weinberg - 2021 - In Stephen M. Gardiner (ed.), The Oxford Handbook of Intergenerational Ethics. Oxford University Press.
    The author argues for a theory of responsibility for outcomes of imposed risk, based on whether it was permissible to impose the risk. When one tries to apply this persuasive model of responsibility for outcomes of risk imposition to procreation, which is a risk imposing act, one finds that it doesn’t match one’s intuitions about responsibility for outcomes of procreative risk. This mismatch exposes a justificatory gap for procreativity, namely, that procreation cannot avail itself of the shared vulnerability to (...) and their constraints—to the balance one is forced to strike between one’s interest in being free to impose risks on others and one’s interest in being safe from harm resulting from the risk imposed by others—which serves to justify risk imposition, generally. Whereas most risk impositions involve trade-offs of liberty and security among people who share the vulnerabilities associated with the taking, imposing, or being constrained from imposing risks, procreation involves the introduction of people into that position of vulnerability in the first place. Thus, when one procreates, one imposes risks in the absence of the shared vulnerability that usually serves as a justification for risk imposition. Procreative risks may not be wrongfully imposed, but they aren’t permissibly imposed in a manner fully comparable to other permissibly imposed risks. This makes procreation a unique form of risk imposition, with unique implications for its justification and for one’s responsibility for its outcomes. This insight can help explain several puzzling procreative asymmetries. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Existential risk pessimism and the time of perils.David Thorstad - manuscript
    When our choice affects some other person and the outcome is unknown, it has been argued that we should defer to their risk attitude, if known, or else default to use of a risk avoidant risk function. This, in turn, has been claimed to require the use of a risk avoidant risk function when making decisions that primarily affect future people, and to decrease the desirability of efforts to prevent human extinction, owing to the significant risks associated with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. EVOLUTIONARY RISK OF HIGH HUME TECHNOLOGIES. Article 3. EVOLUTIONARY SEMANTICS AND BIOETHICS.V. T. Cheshko, L. V. Ivanitskaya & V. I. Glazko - 2016 - Integrative Annthropology (1):21-27.
    The co-evolutionary concept of three-modal stable evolutionary strategy of Homo sapiens is developed. The concept based on the principle of evolutionary complementarity of anthropogenesis: value of evolutionary risk and evolutionary path of human evolution are defined by descriptive (evolutionary efficiency) and creative-teleological (evolutionary correctness) parameters simultaneously, that cannot be instrumental reduced to other ones. Resulting volume of both parameters define the vectors of biological, social, cultural and techno-rationalistic human evolution by two gear mechanism — genetic and cultural co-evolution (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Existential risk from AI and orthogonality: Can we have it both ways?Vincent C. Müller & Michael Cannon - 2021 - Ratio 35 (1):25-36.
    The standard argument to the conclusion that artificial intelligence (AI) constitutes an existential risk for the human species uses two premises: (1) AI may reach superintelligent levels, at which point we humans lose control (the ‘singularity claim’); (2) Any level of intelligence can go along with any goal (the ‘orthogonality thesis’). We find that the singularity claim requires a notion of ‘general intelligence’, while the orthogonality thesis requires a notion of ‘instrumental intelligence’. If this interpretation is correct, they cannot (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  45. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. EVOLUTIONARY RISK OF HIGH HUME TECHNOLOGIES. Article 2. THE GENESIS AND MECHANISMS OF EVOLUTIONARY RISK.V. T. Cheshko, L. V. Ivanitskaya & V. I. Glazko - 2015 - Integrative Anthropology (1):4-15.
    Sources of evolutionary risk for stable strategy of adaptive Homo sapiens are an imbalance of: (1) the intra-genomic co-evolution (intragenomic conflicts); (2) the gene-cultural co-evolution; (3) inter-cultural co-evolution; (4) techno-humanitarian balance; (5) inter-technological conflicts (technological traps). At least phenomenologically the components of the evolutionary risk are reversible, but in the aggregate they are in potentio irreversible destructive ones for biosocial, and cultural self-identity of Homo sapiens. When the actual evolution is the subject of a rationalist control and/or manipulation, the magnitude (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Existential risks: New Zealand needs a method to agree on a value framework and how to quantify future lives at risk.Matthew Boyd & Nick Wilson - 2018 - Policy Quarterly 14 (3):58-65.
    Human civilisation faces a range of existential risks, including nuclear war, runaway climate change and superintelligent artificial intelligence run amok. As we show here with calculations for the New Zealand setting, large numbers of currently living and, especially, future people are potentially threatened by existential risks. A just process for resource allocation demands that we consider future generations but also account for solidarity with the present. Here we consider the various ethical and policy issues involved and make (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Existential Risk, Astronomical Waste, and the Reasonableness of a Pure Time Preference for Well-Being.S. J. Beard & Patrick Kaczmarek - 2024 - The Monist 107 (2):157-175.
    In this paper, we argue that our moral concern for future well-being should reduce over time due to important practical considerations about how humans interact with spacetime. After surveying several of these considerations (around equality, special duties, existential contingency, and overlapping moral concern) we develop a set of core principles that can both explain their moral significance and highlight why this is inherently bound up with our relationship with spacetime. These relate to the equitable distribution of (1) moral concern in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Risk assessment tools in criminal justice and forensic psychiatry: The need for better data.Thomas Douglas, Jonathan Pugh, Illina Singh, Julian Savulescu & Seena Fazel - 2017 - European Psychiatry 42:134-137.
    Violence risk assessment tools are increasingly used within criminal justice and forensic psychiatry, however there is little relevant, reliable and unbiased data regarding their predictive accuracy. We argue that such data are needed to (i) prevent excessive reliance on risk assessment scores, (ii) allow matching of different risk assessment tools to different contexts of application, (iii) protect against problematic forms of discrimination and stigmatisation, and (iv) ensure that contentious demographic variables are not prematurely removed from risk assessment tools.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Responses to Catastrophic AGI Risk: A Survey.Kaj Sotala & Roman V. Yampolskiy - 2015 - Physica Scripta 90.
    Many researchers have argued that humanity will create artificial general intelligence (AGI) within the next twenty to one hundred years. It has been suggested that AGI may inflict serious damage to human well-being on a global scale ('catastrophic risk'). After summarizing the arguments for why AGI may pose such a risk, we review the fieldʼs proposed responses to AGI risk. We consider societal proposals, proposals for external constraints on AGI behaviors and proposals for creating AGIs that are safe due (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 999