Results for 'national security'

998 found
Order:
  1. Misuse made plain: Evaluating concerns about neuroscience in national security.Kelly Lowenberg, Brenda M. Simon, Amy Burns, Libby Greismann, Jennifer M. Halbleib, Govind Persad, David L. M. Preston, Harker Rhodes & Emily R. Murphy - 2010 - American Journal of Bioethics Neuroscience 1 (2):15-17.
    In this open peer commentary, we categorize the possible “neuroscience in national security” definitions of misuse of science and identify which, if any, are uniquely presented by advances in neuroscience. To define misuse, we first define what we would consider appropriate use: the application of reasonably safe and effective technology, based on valid and reliable scientific research, to serve a legitimate end. This definition presents distinct opportunities for assessing misuse: misuse is the application of invalid or unreliable science, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Arrow’s impossibility theorem and the national security state.S. M. Amadae - 2005 - Studies in History and Philosophy of Science Part A 36 (4):734-743.
    This paper critically engages Philip Mirowki's essay, "The scientific dimensions of social knowledge and their distant echoes in 20th-century American philosophy of science." It argues that although the cold war context of anti-democratic elitism best suited for making decisions about engaging in nuclear war may seem to be politically and ideologically motivated, in fact we need to carefully consider the arguments underlying the new rational choice based political philosophies of the post-WWII era typified by Arrow's impossibility theorem. A distrust of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Nollywood in Diversity: New Dimensions for Behaviour Change and National Security in Nigeria.Stanislaus Iyorza - 2017 - International Journal of Communication 21.
    This paper sets out to demystify the nature of Nollywood movies existing in diversity and to propose new dimensions for using film to achieve behaviour change and a dependable national security in Nigeria. The paper views national security as the art of ensuring national safety of the government. Nollywood has naturally diversified along ethnic dimensions including the Hausa movies (Kannywood) in the North, the Yoruba movies in the West and the Ibo movies in the Eastern (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair (eds.), Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Concept of Security in Political Violence.Jessica Wolfendale - 2012 - In Marie Breen-Smyth (ed.), Ashgate Companion to Political Violence. Ashgate. pp. 99-118.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The UN Security Council, normative legitimacy and the challenge of specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human rights. Both of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Internal Instability as a Security Challenge for Vietnam.Nguyen Hoang Tien, Nguyen Van Tien, Rewel Jimenez Santural Jose, Nguyen Minh Duc & Nguyen Minh Ngoc - 2020 - Journal of Southwest Jiaotong University 55 (4):1-13.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socio-economic and political system of any country, including (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Vietnam’s Security Challenges: Priorities, Policy Implications and Prospects for Regional Cooperation.Tran Truong Thuy & Nguyen Minh Ngoc - 2013 - In The Fourth International Workshop on Asia-Pacific Security, Tokyo, Japan. Tokyo, Japan: NIDS Ministry of Defense, Japan. pp. 93-112.
    The historic end of the Cold War and the rising tide of globalization have significantly changed the nature of threats and security discourses in Asia. There is a notable shift of attention from military power as the core determinant of national security to several non-traditional sectors with a much enhanced role of economic, political, and societal forces. Non-traditional security issues—such as climate change, natural disasters, transnational crimes, and terrorism—require both policymakers and military strategists to deal with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark  
  17. TRANSPORT SECURITY AS A FACTOR OF TRANSPORT AND COMMUNICATION SYSTEM OF UKRAINE SELF-SUSTAINING DEVELOPMENT.Igor Britchenko & Tetiana Cherniavska - 2017 - Науковий Вісник Полісся 1 (9):16-24.
    In the present article, attention is focused on the existing potential to ensure national self-sufficiency, the main challenges to its achievement and future prospects. According to the authors, transportation and communication system of the country can become the dominant model for self-sufficient development, due to its geostrategic location which allows it to be an advantageous bridge for goods, and passengers transit transportation between the states of Europe, Asia and the Middle East. To date, the transport and communication system is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The Human Security Paradigm and Cosmopolitan Democracy.Andreea Iancu - 2014 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 1 (2): 167-174.
    This paper discusses the relation between the human security paradigm and the cosmopolitan democracy scenario as models for humanizing and changing the current international system and transforming it in a global security and development system centered on the individual rather than on the nation state. The main idea for which I argue is that the human security paradigm and the changes it determined in international relations (especially through the responsibility to protect principle) are compatible with the cosmopolitan (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Pehowa (Kurukshetra). pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Balancing Food Security & Ecological Resilience in the Age of the Anthropocene.Samantha Noll - 2018 - In Sarah Kenehan & Erinn Gilson (eds.), Food, Environment, and Climate Change. New York, NY, USA:
    Climate change increasingly impacts the resilience of ecosystems and agricultural production. On the one hand, changing weather patterns negatively affect crop yields and thus global food security. Indeed, we live in an age where more than one billion people are going hungry, and this number is expected to rise as climate-induced change continues to displace communities and thus separate them from their means of food production (Internal Displacement Monitoring Centre 2015). In this context, if one accepts a humancentric ethic, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the viability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Rodin on Self-Defense and the "Myth" of National Self-Defense: A Refutation.Uwe Steinhoff - 2013 - Philosophia 41 (4):1017-1036.
    David Rodin denies that defensive wars against unjust aggression can be justified if the unjust aggression limits itself, for example, to the annexation of territory, the robbery of resources or the restriction of political freedom, but would endanger the lives, bodily integrity or freedom from slavery of the citizens only if the unjustly attacked state actually resisted the aggression. I will argue that Rodin's position is not correct. First, Rodin's comments on the necessity condition and its relation to an alleged (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25. UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    Development of ideas on UN reform presented in the essay "United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century" (2017).
    Download  
     
    Export citation  
     
    Bookmark  
  26. Analysis of Institutional Capacity of National Social Protection Policy Framework.Narith Por - 2018 - World Journal of Research and Review 6 (4):66-71.
    Cambodians are still vulnerable. To reverse those conditions, National Social Protection Strategy (N.S.P.S) was developed for the poor and vulnerable people to promote their livelihoods. Royal Government of Cambodia (R.G.C) has paid attention to social assistance. In strategic plans, highlights on strengthening, and collectively developing social security, consistent and effective. With these issues, the government establishes a national social protection policy framework to help all people in particular poor and vulnerable people (M.o.E.F, 2017, p.1). The research aims (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Preventive Wars, Just War Principles, and the United Nations.John W. Lango - 2005 - The Journal of Ethics 9 (1-2):247-268.
    This paper explores the question of whether the United Nations should engage in preventive military actions. Correlatively, it asks whether UN preventive military actions could satisfy just war principles. Rather than from the standpoint of the individual nation state, the ethics of preventive war is discussed from the standpoint of the UN. For the sake of brevity, only the legitimate authority, just cause, last resort, and proportionality principles are considered. Since there has been disagreement about the specific content of these (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Prospects for sustainable development and ensuring the security of economic systems in the new geostrategic realities.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring sustainable development and security of economic systems in the new geostrategic realities requires the use of mechanisms for state protection of national economic interests, innovative outsourcing and digital technologies, and environmental protection. Basic research focuses on assessment the economic security of insurance companies, logistics processes, farms, healthcare organisations, retail and e-commerce, and tourist destinations. The research results have been implemented in the different decision-making models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. I, Spy Robot: The Ethics of Robots in National Intelligence Activities.Patrick Lin & Shannon Brandt Ford - 2016 - In Jai Galliott & Warren Reed (eds.), Ethics and the Future of Spying: Technology, National Security and Intelligence Collection. Routledge. pp. 145-157.
    In this chapter, we examine the key moral issues for the intelligence community with regard to the use of robots for intelligence collection. First, we survey the diverse range of spy robots that currently exist or are emerging, and examine their value for national security. This includes describing a number of plausible scenarios in which they have been (or could be) used, including: surveillance, attack, sentry, information collection, delivery, extraction, detention, interrogation and as Trojan horses. Second, we examine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Australia's Approach to AI Governance in Security and Defence.Susannah Kate Devitt & Damian Copeland - forthcoming - In M. Raska, Z. Stanley-Lockman & R. Bitzinger (eds.), AI Governance for National Security and Defence: Assessing Military AI Strategic Perspectives. Routledge. pp. 38.
    Australia is a leading AI nation with strong allies and partnerships. Australia has prioritised the development of robotics, AI, and autonomous systems to develop sovereign capability for the military. Australia commits to Article 36 reviews of all new means and method of warfare to ensure weapons and weapons systems are operated within acceptable systems of control. Additionally, Australia has undergone significant reviews of the risks of AI to human rights and within intelligence organisations and has committed to producing ethics guidelines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the global (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Translating the Idiom of Oppression: A Genealogical Deconstruction of FIlipinization and the 19th Century Construction of the Modern Philippine Nation.Michael Roland Hernandez - 2019 - Dissertation, Ateneo de Manila University
    This doctoral thesis examines the phenomenon of Filipinization, specifically understood as the ideological construction of a “Filipino identity” or ‘Filipino subject-consciousness” within the highly determinate context provided by the Filipino ilustrado nationalists such as José Rizal, Marcelo H. del Pilar and their fellow propagandists inasmuch as it leads to the nineteenth (19th) century construction of the modern Philippine nation. Utilizing Jacques Derrida’s deconstructive thinking, this study undertakes a genealogical critique engaged on the concrete historical examination of what is meant by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. UN75 ↔ Philosophical Basics of UN Reform ↔ Security Council Reform ↔ UN Funding System (2).Vladimir Rogozhin - manuscript
    Development of ideas on UN reform presented in the essay "United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century" (2017).
    Download  
     
    Export citation  
     
    Bookmark  
  34. Igwebuike Philosophy and the Issue of National Development.Kanu Ikechukwu Anthony & Ikechukwu Anthony Kanu - 2017 - Igwebuike: An African Journal of Arts and Humanities 6 (3):16-50.
    Right from traditional African philosophy, down to its modern and contemporary era, there has been a strong link between African philos ophy and language, underlined by the principle of complementarity. This is not disconnec ted with Placid Tempels’ employment of force to explain being, and Alexis Kagame’s NTU, as the underlying principle of reality. Pantaleon Iroegbu explained being as belon gingness. In the thoughts of Innocent Asouzu, Ibuanyidanda, was used to explain the compl ementary nature of reality. In the face (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. 内部不稳定是越南的安全挑战.Nguyen Hoang Tien - 2020 - 西南交通大学学报 55 (4):1-17.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. The article proposes a new research approach treating security and military science as interdisciplinary, but two of the branches of social science. Using empirical analysis and case study as research methods, the article is focused on internal instability as challenging security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Politics of Evasion: A post-globalization dialogue along the edge of the state.Robert Latham - 2016 - Routledge.
    Burgeoning national security programs; thickening borders; Wikileaks and Anonymous; immigrant rights rallies; Occupy movements; student protests; neoliberal austerity; global financial crises – these developments underscore how much the fable of a hope-filled post-cold war globalization has faded. In its place looms the prospect of states and corporations transforming a permanent war on terror into a permanent war on society. How, at this juncture, might policymakers and power-holders in leading states and corporations of the Global North be reframing their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The overlooked contributors to climate and biodiversity crises: Military operations and wars.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La - 2024 - Environmental Management 73:1-5.
    The military-industrial complex, military operations, and wars are major contributors to exacerbating both climate change and biodiversity crises. However, their environmental impacts are often shadowed due to national security reasons. The current paper aims to go through the devastating impacts of military operations and wars on climate change and biodiversity loss and challenges that hinder the inclusion of military-related activities into environmental crisis mitigation efforts. The information blind spot induced by concerns about national security reasons jeopardizes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Liberal democracy and nuclear despotism: two ethical foreign policy dilemmas.Thomas E. Doyle - 2013 - Ethics and Global Politics 6 (3):155-174.
    This article advances a critical analysis of John Rawls’s justification of liberal democratic nuclear deterrence in the post-Cold War era as found in The Law of Peoples. Rawls’s justification overlooked how nuclear-armed liberal democracies are ensnared in two intransigent ethical dilemmas: one in which the mandate to secure liberal constitutionalism requires both the preservation and violation of important constitutional provisions in domestic affairs, and the other in which this same mandate requires both the preservation and violation of the liberal commitment (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Ontology and Cognitive Outcomes.David Limbaugh, Jobst Landgrebe, David Kasmier, Ronald Rudnicki, James Llinas & Barry Smith - 2020 - Journal of Knowledge Structures and Systems 1 (1): 3-22.
    The term ‘intelligence’ as used in this paper refers to items of knowledge collected for the sake of assessing and maintaining national security. The intelligence community (IC) of the United States (US) is a community of organizations that collaborate in collecting and processing intelligence for the US. The IC relies on human-machine-based analytic strategies that 1) access and integrate vast amounts of information from disparate sources, 2) continuously process this information, so that, 3) a maximally comprehensive understanding of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. The Ethics of Military Influence Operations.Michael Skerker - 2023 - Conatus 8 (2):589-612.
    This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Democratic Citizenship and Denationalization.Patti Tamara Lenard - 2018 - American Political Science Review 112 (1):99-111.
    Are democratic states permitted to denationalize citizens, in particular those whom they believe pose dangers to the physical safety of others? In this article, I argue that they are not. The power to denationalize citizens—that is, to revoke citizenship—is one that many states have historically claimed for themselves, but which has largely been in disuse in the last several decades. Recent terrorist events have, however, prompted scholars and political actors to reconsider the role that denationalization can and perhaps should play (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  43. The essence of financing the space in in the post-war period as an integral part of the country’s reconstruction plan.Svitlana Koshova, Igor Britchenko & Maksym Bezpartochnyi - 2022 - Financial and Credit Activity: Problems of Theory and Practice 45 (4):405-415.
    This paper studies the issue of financing the Space Industry at the State Level in the Postwar period as part of the country’s recovery plan, as one of the foremost critical zones of technological development and to ensure space security and defence. The European Space Agency (ESA) is, identified as the main player in the European space sector. It is determined that the current structure of ESA – Space 4.0 – provides for the success of European space activities in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Should we open borders? Yes, but not in the name of global justice.Borja Niño Arnaiz - 2022 - Ethics and Global Politics 15 (2):55-68.
    Some proponents of global justice question that opening borders is an effective strategy to alleviate global poverty and reduce inequalities between countries. This article goes a step further and asks whether an open borders policy is compatible with the objectives of global distributive justice. The latter, it will be argued, entails the ordering of needs, the assignment of priorities and the preference or subordination of some interests over others. In other words, global justice requires the establishment of conditions and restrictions (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. Lanham MD: Rowman and Littlefield. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. The Truth About that Quiet Decade.Eugene Halton - 2023 - Notre Dame Magazine.
    This essay from 1999, republished in Notre Dame Magazine online in July 2023, explores how the 1950s were a time of fundamental transformations in American society, a time when the United States went fully megatechnic. The hugely increased power of military, corporate-industrial and “big science” institutions developed during the 1950s signaled the transformation to megatechnic America, with atomic bombs and nuclear testing, automobiles and televisions as key symbols of that transformation. Figures such as J. Robert Oppenheimer and Edward Teller illustrated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Tensions between ‘Criminal’ and ‘Enemy’ as Categories for Globalized Terrorism.James Griffith - 2006 - International Journal of Applied Philosophy 1 (20):107-126.
    This paper examines the tensions at play in three important documents involved in the ‘war on terror’: the “Application of Treaties” White House Legal Counsel Memo of 2001, the “National Security Strategy” document of 2002, and the 2004 Supreme Court decision Hamdi v. Rumsfeld. Reading these documents, it becomes clear that there is an overarching misunderstanding and confusion of the traditionally separate concepts of ‘criminal’ and ‘enemy’ in the struggle against globalized terrorism.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
    In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than national security. Just what more important means is its own question, though, so I will be more precise. I will argue that national security rationales cannot by themselves justify some kinds of encroachments (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 998