Results for 'pre-emptive security'

963 found
Order:
  1.  40
    The European PNR Directive as an Instance of Pre-emptive, Risk-based Algorithmic Security and Its Implications for the Regulatory Framework.Elisa Orrù - 2022 - Information Polity 27 (Special Issue “Questioning Moder):131-146.
    The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Pre-emptive Anonymous Whistleblowing.James Rocha & Edward Song - 2012 - Public Affairs Quarterly 26 (4):257-271.
    While virtually everyone recognizes the moral permissibility of whistleblowing under certain circumstances, most theorists offer relatively conservative accounts of when it is allowed, and are reluctant to offer a full recommendation of the practice as an important tool towards addressing ethical failures in the workplace. We think that accounts such as these tend to overestimate the importance of professional or personal obligations, and underestimate the moral obligation to shine light on severe professional malfeasance. Of course, a whistleblower, even an anonymous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Reflective Equilibrium is enough. Against the need for pre-selecting “considered judgments”.Tanja Rechnitzer & Michael W. Schmidt - 2022 - Ethics, Politics and Society 5 (2):59–79.
    In this paper, we focus on one controversial element of the method of reflective equilibrium, namely Rawls’s idea that the commitments that enter the justificatory procedure should be pre-selected or filtered: According to him, only considered judgements should be taken into account in moral philosophy. There are two camps of critics of this filtering process: 1) Critics of reflective equilibrium: They reject the Rawlsian filtering process as too weak and seek a more reliable one, which would actually constitute a distinct (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Legal Directives and Practical Reasons.Noam Gur - 2018 - Oxford: Oxford University Press.
    This book investigates law's interaction with practical reasons. What difference can legal requirements—e.g. traffic rules, tax laws, or work safety regulations—make to normative reasons relevant to our action? Do they give reasons for action that should be weighed among all other reasons? Or can they, instead, exclude and take the place of some other reasons? The book critically examines some of the existing answers and puts forward an alternative understanding of law's interaction with practical reasons. -/- At the outset, two (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Justice after Catastrophe: Responsibility and Security.Makoto Usami - 2015 - Ritsumeikan Studies in Language and Culture 26 (4):215-230.
    The issue of justice after catastrophe is an enormous challenge to contemporary theories of distributive justice. In the past three decades, the controversy over distributive justice has centered on the ideal of equality. One of intensely debated issues concerns what is often called the “equality of what,” on which there are three primary views: welfarism, resourcism, and the capabilities approach. Another major point of dispute can be termed the “equality or another,” about which three positions debate: egalitarianism, prioritarianism, and sufficientarianism. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Distorted Debates.Claudia Picazo - 2022 - Topoi 42 (2):561-571.
    One way to silence the powerless, Langton has taught us, is to pre-emptively disable their ability to do things with words. In this paper I argue that speakers can be silenced in a different way. You can let them speak, and obscure the meaning of their words afterwards. My aim is to investigate this form of silencing, that I call retroactive distortion. In a retroactive distortion, the meaning of the words of a speaker is distorted by the effect of a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. The Level of Promotion of Entrepreneurship in Technical Colleges in Palestine.Mazen J. Al Shobaki, Samy S. Abu-Naser, Youssef M. Abu Amuna & Suliman A. El Talla - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (1):168-189.
    The study aimed to identify the level of promotion of entrepreneurship in the technical colleges in Palestine. The analytical descriptive method was used in the study. A questionnaire of 41 items was randomly distributed to the technical colleges in the Gaza Strip. The random sample consisted of (275) employees from the mentioned colleges, and the response rate were (74.5%). The results of the study showed that the technical colleges achieved a high level of promotion of entrepreneurship with a relative weight (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Zagzebski on Authority and Preemption in the Domain of Belief.Arnon Keren - 2014 - European Journal for Philosophy of Religion 6 (4):61-76.
    The paper discusses Linda Zagzebski's account of epistemic authority. Building on Joseph Raz's account of political authority, Zagzebski argues that the basic contours of epistemic authority match those Raz ascribes to political authority. This, it is argued, is a mistake. Zagzebski is correct in identifying the pre-emptive nature of reasons provided by an authority as central to our understanding of epistemic authority. However, Zagzebski ignores important differences between practical and epistemic authority. As a result, her attempt to explain the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  9. Must We Worry About Epistemic Shirkers?Daniele Bruno - 2024 - Inquiry: An Interdisciplinary Journal of Philosophy:1-26.
    It is commonly assumed that blameworthiness is epistemically constrained. If one lacks sufficient epistemic access to the fact that some action harms another, then one cannot be blamed for harming. Acceptance of an epistemic condition for blameworthiness can give rise to a worry, however: could agents ever successfully evade blameworthiness by deliberately stunting their epistemic position? I discuss a particularly worrisome version of such epistemic shirking, in which agents pre-emptively seek to avoid access to potentially morally relevant facts. As Roy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Gorgias' defense: Plato and his opponents on rhetoric and the good.Rachel Barney - 2010 - Southern Journal of Philosophy 48 (1):95-121.
    This paper explores in detail Gorgias' defense of rhetoric in Plato 's Gorgias, noting its connections to earlier and later texts such as Aristophanes' Clouds, Gorgias' Helen, Isocrates' Nicocles and Antidosis, and Aristotle's Rhetoric. The defense as Plato presents it is transparently inadequate; it reveals a deep inconsistency in Gorgias' conception of rhetoric and functions as a satirical precursor to his refutation by Socrates. Yet Gorgias' defense is appropriated, in a streamlined form, by later defenders of rhetoric such as Isocrates (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Pro Tanto Rights and the Duty to Save the Greater Number.Benjamin Kiesewetter - 2023 - Oxford Studies in Normative Ethics 13:190-214.
    This paper has two aims. The first is to present and defend a new argument for rights contributionism – the view that the notion of a moral claim-right is a contributory (or pro tanto) rather than overall normative notion. The argument is an inference to the best explanation: it is argued that (i) there are contributory moral factors that contrast with standard moral reasons by way of having a number of formal properties that are characteristic of rights, even though they (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Kant on Evolution: A Re-evaluation.Alix Cohen - 2020 - In John J. Callanan & Lucy Allais (eds.), Kant and Animals. New York, NY, United States of America: Oxford University Press. pp. 123-135.
    Kant’s notorious remark about the impossibility of there ever being a Newton of a blade of grass has often been interpreted as a misguided pre-emptive strike against Darwin and evolutionary theories in general: 'It would be absurd for humans even to make such an attempt or to hope that there may yet arise a Newton who could make comprehensible even the generation of a blade of grass according to natural laws that no intention has ordered; rather, we must absolutely (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Kaneko Fumiko (1903-1926).Kazuki Watanabe - forthcoming - In Revolutionary Women (2nd Edition). Anarchist Federation.
    Fumiko Kaneko was a female anarchist philosopher born in Japan in 1903. With her Korean partner Pak Yol, she founded the anarchist collective “Futei-sha” which published many articles arguing for anarchism and direct action (“Futei-sha” is named after “Futei-Senjin”, a government term for malcontent Koreans). Both Fumiko and Pak were pre-emptively detained during the major earthquake in 1923. During the detention, they testified that they had plotted to bomb the emperor’s son, which resulted in a death sentence for them. Though (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. John Stuart Mill on the Suez Canal and the Limits of Self-Defence.Tim Beaumont - 2024 - International Theory.
    Michael Walzer’s use of John Stuart Mill’s A Few Words on Non-Intervention (1859) helped to inaugurate it as a canonical text of international theory. However, Walzer’s use of the text was highly selective because he viewed the first half as a historically parochial discussion of British foreign policy, and his interest in the second was restricted to the passages in which Mill proposes principles of international morality to govern foreign military interventions to protect third parties. As a result, theorists tend (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  67
    Safety and Protection Practices in the Early Childhood Education Centres.Ibiwari Caroline Dike & Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):294-305.
    A safe and secure environment is an essential part of the early childhood development of any child. This study aims to investigate the safety and protection practices of early childhood centers in the Anambra state, Nigeria, and to determine if any improvements can be made to them. This study analyzed data collected from 60 Early Childhood Care Centers (ECCE Centers) and 60 Pre-Primary Schools (Preprimary School) in Anambra State using the Evaluation of ECCE Implementation Kit (KEIEP), direct observation, and unstructured (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Simulation, self-extinction, and philosophy in the service of human civilization.Jeffrey White - 2016 - AI and Society 31 (2):171-190.
    Nick Bostrom’s recently patched ‘‘simulation argument’’ (Bostrom in Philos Q 53:243–255, 2003; Bos- trom and Kulczycki in Analysis 71:54–61, 2011) purports to demonstrate the probability that we ‘‘live’’ now in an ‘‘ancestor simulation’’—that is as a simulation of a period prior to that in which a civilization more advanced than our own—‘‘post-human’’—becomes able to simulate such a state of affairs as ours. As such simulations under consid- eration resemble ‘‘brains in vats’’ (BIVs) and may appear open to similar objections, the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  17. Heideggers Auffassung der Dichtung als hinweisendes Sehenlassen der Seinsweisen.Christian Ivanoff-Sabogal - 2023 - Horizon. Studien Zur Phänomenologie 12 (2):433-456.
    The goal of this article is to understand the concept of poetry in the broad context of Heidegger’s “early” thought, around 1919 and 1930. To that end, we seek to disclose a relation that in Heidegger remains implicit and in the secondary literature absent. This is the relation between poetry and the ways of Being (existence, ready-to-hand, present-at-hand, etc.). Since Heidegger did not explicitly thematize poetry in this broad context, the setup of this article consists of three main steps, in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Grounding procedural rights.N. P. Adams - 2019 - Legal Theory (1):3-25.
    Contrary to the widely accepted consensus, Christopher Heath Wellman argues that there are no pre-institutional judicial procedural rights. Thus commonly affirmed rights like the right to a fair trial cannot be assumed in the literature on punishment and legal philosophy as they usually are. Wellman canvasses and rejects a variety of grounds proposed for such rights. I answer his skepticism by proposing two novel grounds for procedural rights. First, a general right against unreasonable risk of punishment grounds rights to an (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Understanding of Authorship by the Post Graduate Medical Students at a Center in Bangladesh.S. P. Lasker - 2021 - Bangladesh Journal of Bioethics 12 (1):25-34.
    Education on authorship was delivered and evaluated by pre test and post test questionnairen on 30 post graduate medical students at the Department of Anestheology, Dhaka Medical College, Bangladesh between January and June 2019 to understand the knowledge, skill and attitude of post graduate medical students on authorship. Result: Before intervention, majority (60%) of the students felt that who perform the research work should be the author of the article. But 40% students were divided and felt that who advised the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Ontological Co-belonging in Peter Sloterdijk's Spherological Philosophy of Mediation.Thomas Sutherland - 2017 - Paragraph 40 (2):133-152.
    This article examines the ontology and politics of Peter Sloterdijk's Spheres trilogy, focusing in particular upon the notion of microspherical enclosure explicated in the first volume of this series. Noting Sloterdijk's unusual alignment of his philosophy with media theory, three main contentions are put forward. Firstly, that Sloterdijk's reconfiguration of Heidegger's fundamental ontology represents a largely unacknowledged renunciation of the primacy of Being-towards-death in the authentic existence of Dasein, foregrounding instead an originary co-belonging between mother and child. Secondly, that Sloterdijk (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Het primaat van de rechtspraak in de verzekering van de vrede.M. E. Notermans - 2011 - Rechtsgeleerd Magazijn Themis 2:38-47.
    In spite of his post-World War II works on international law, which seems more purely juridical, Hans Kelsen continues to put forward in his vast body of work an implicit – and sometimes even explicit – juridical objectivism and pacifism. Especially before and during the second World War he makes – by means of many moral-political writings – an effort for a more effective assurance of international peace. The fact that Kelsen regards the law as the pre-eminent means to achieve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Diachronic exploitation of landscape resources - tangible and intangible industrial heritage and their synthesis suspended step.Georgia Zacharopoulou - 2015 - Https://Ticcih-2015.Sciencesconf.Org/.
    It is expected that industrial heritage actually tells the story of the emerging capitalism highlighting the dynamic social relationship between the “workers” and the owners of the “production means”. In current times of economic crisis, it may even involve a painful past with lost social, civil, gender and/or class struggles, a depressing present with abandoned, fragmented, degraded landscapes and ravaged factories, and a hopeless future for the former workers of the local (not only) society; or just a conquerable ground for (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. On Plantation Politics: Citizenship and Antislavery Resistance in Douglass’s My Bondage and My Freedom.Philip Yaure - 2022 - Philosophical Studies 180 (3):871-891.
    In republican political philosophy, citizenship is a status that is constituted by one’s participation in the public life of the polity. In its traditional formulation, republican citizenship is an exclusionary and hierarchical way of defining a polity’s membership, because the domain of activity that qualifies as participating in the polity’s public life is highly restricted. I argue that Black American abolitionist Frederick Douglass advances a radically inclusive conception of republican citizenship by articulating a deeply capacious account of what it means (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Translating the Idiom of Oppression: A Genealogical Deconstruction of FIlipinization and the 19th Century Construction of the Modern Philippine Nation.Michael Roland Hernandez - 2019 - Dissertation, Ateneo de Manila University
    This doctoral thesis examines the phenomenon of Filipinization, specifically understood as the ideological construction of a “Filipino identity” or ‘Filipino subject-consciousness” within the highly determinate context provided by the Filipino ilustrado nationalists such as José Rizal, Marcelo H. del Pilar and their fellow propagandists inasmuch as it leads to the nineteenth (19th) century construction of the modern Philippine nation. Utilizing Jacques Derrida’s deconstructive thinking, this study undertakes a genealogical critique engaged on the concrete historical examination of what is meant by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  37
    Psychological as Temporal Proximalization of Nomologically Distal.Morteza Shahram - manuscript
    Type-identity of mental and physical events is compatible with psychological anomalism. (1) Both in action and perceiving singular causal relations, two temporally distant physical events C and E (caused by C) instantiate a COMMON mental property securing "inter-event" continuity of mental content: the mental content when the room is illuminated shows a trace of familiarity with the mental content just before flipping the switch. (2) "Inter-event" continuity is possible if there is "intra-event" continuity in individual mental content: subsets of C (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Droit de la robotique: Livre blanc.Alain Bensoussan & Renaud Champion - 2016 - SYMOP.
    Histoire et utilisation du robot Bien que la robotique soit un marché économique relativement jeune et en pleine croissance, la genèse des robots remonte à l’Antiquité. Le premier robot à être déployé sur des lignes d’assemblage est Unimate, utilisé dès 1961 par General Motors. La robotique, en se di usant dans tous les pans de notre économie, va impacter les business modèles de nombreuses industries comme l’automobile et l’aéronautique mais aussi la construction ou l’agriculture. Aujourd’hui les robots industriels et de (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Unification and the Myth of Purely Reductive Understanding.Michael J. Shaffer - 2020 - Organon F: Medzinárodný Časopis Pre Analytickú Filozofiu 27:142-168.
    In this paper significant challenges are raised with respect to the view that explanation essentially involves unification. These objections are raised specifically with respect to the well-known versions of unificationism developed and defended by Michael Friedman and Philip Kitcher. The objections involve the explanatory regress argument and the concepts of reduction and scientific understanding. Essentially, the contention made here is that these versions of unificationism wrongly assume that reduction secures understanding.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29. AMERICAN GOTHIC MAINSTREAM FICTION.Mary Strachan Scriver & Subhasis Chattopadhyay - unknown - Dissertation, Calcutta University
    This is my (Subhasis Chattopadhyay's) draft of PhD pre-submission. Dr. Scriver has (had) put it up online in her blog and I found it today, that is 1:06 pm, 28th May, 2017. I am grateful to her since intellectual ideas can otherwise be hijacked. She has done a wonderful editorial job.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  31. Pre-emption cases may support, not undermine, the counterfactual theory of causation.Robert Northcott - 2018 - Synthese 198 (1):537-555.
    Pre-emption cases have been taken by almost everyone to imply the unviability of the simple counterfactual theory of causation. Yet there is ample motivation from scientific practice to endorse a simple version of the theory if we can. There is a way in which a simple counterfactual theory, at least if understood contrastively, can be supported even while acknowledging that intuition goes firmly against it in pre-emption cases—or rather, only in some of those cases. For I present several new pre-emption (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  55
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Processes, pre-emption and further problems.Andreas Hüttemann - 2020 - Synthese 197 (4):1487-1509.
    In this paper I will argue that what makes our ordinary judgements about token causation true can be explicated in terms of interferences into quasi-inertial processes. These interferences and quasi-inertial processes can in turn be fully explicated in scientific terms. In this sense the account presented here is reductive. I will furthermore argue that this version of a process-theory of causation can deal with the traditional problems that process theories have to face, such as the problem of misconnection and the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri (eds.), Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  40.  62
    Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Pre-Reflective Self-Consciousness: A Meta-Causal Approach.John A. Barnden - 2022 - Review of Philosophy and Psychology 13 (2):397-425.
    I present considerations surrounding pre-reflective self-consciousness, arising in work I am conducting on a new physicalist, process-based account of [phenomenal] consciousness. The account is called the meta-causal account because it identifies consciousness with a certain type of arrangement of meta-causation. Meta-causation is causation where a cause or effect is itself an instance of causation. The proposed type of arrangement involves a sort of time-spanning, internal reflexivity of the overall meta-causation. I argue that, as a result of the account, any conscious (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  49.  87
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Pre-political Foundations of the Democratic Constitutional State – Europe and the Habermas-Ratzinger Debate.Pablo Cristóbal Jiménez Lobeira - manuscript
    In 2004 Jürgen Habermas and Joseph Ratzinger participated in a debate on the ‘pre-political moral foundations of the free-state’. Their contributions showed broad agreement on the role of religion in today’s Western secular state and on areas of collaboration and mutual enrichment between Modernity and Christianity in Europe and the West. They diverged regarding the need or not of a common cultural background prior to the existence of the polity. Their diverging point becomes all the more fascinating to the extent (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 963