Results for 'protected asset'

966 found
Order:
  1. Selection and application of appropriate analytical methods needed to assess the risks reducing the security of the protected system.Josef Reitšpís, Martin Mašľan & Igor Britchenko - 2021 - Baltic Journal of Economic Studies 7 (3):1 – 8.
    Risk assessment is one of the prerequisites for understanding its causes and possible consequences. We base our risk assessment on the principles described in the European standard EN 31000 - Risk Management Process. This standard comprehensively describes the continuous activities that are necessary in managing risks and minimizing their possible adverse effects on the operation of the system under investigation. In this activity, it is necessary to first identify the existing risks, then analyze and evaluate the identified risks. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe (eds.), Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a definition of informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. PERSONAL FINANCIAL MANAGEMENT PRACTICES AMONG SELECTED PERSONNEL OF THE BUREAU OF THE TREASURY – CENTRAL OFFICE.Daren D. Cortez - 2023 - Get International Research Journal 1 (2).
    The study aimed to determine the personal financial management practices among selected personnel of the Bureau of the Treasury – Central Office. It used the descriptive method of gathering data. The respondents of the study consisted of 183 personnel from 35 divisions of the Bureau and selected through simple random probability sampling technique. The study shown that most of the respondents aged 26 to 35 years old, female, single, bachelor’s degree holder, rank and file workers, permanent employees, have been in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. After the (virtual) Gold Rush : Is bitcoin more than a speculative bubble?Maxime Lambrecht & Louis Larue - 2018 - Internet Policy Review 7 (4).
    How promising is Bitcoin as a currency? This paper discusses four claims on the advantages of Bitcoin: a more stable currency than state-backed ones; a secure and efficient payment system; a credible alternative to the central management of money; and a better protection of transaction privacy. We discuss these arguments by relating them to their philosophical roots in libertarian and neoliberal theories, and assess whether Bitcoin can effectively meet these expectations. We conclude that despite its advocates’ enthusiasm, there are good (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  5. Referent tracking for digital rights management.Werner Ceusters & Barry Smith - 2007 - International Journal of Metadata, Semantics and Ontologies 2 (1):45-53.
    Digital Rights Management (DRM) covers the description, identification, trading, protection, monitoring and tracking of all forms of rights over both tangible and intangible assets. The Digital Object Identifier (DOI) system provides a framework for the persistent identification of entities involved in this domain. Although the system has been very well designed to manage object identifiers, some important questions relating to the creation and assignment of identifiers are left open. The paradigm of a Referent Tracking System (RTS) recently advanced in the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. An Introduction to Hard and Soft Data Fusion via Conceptual Spaces Modeling for Space Event Characterization.Jeremy Chapman, David Kasmier, John L. Crassidis, James L. Llinas, Barry Smith & Alex P. Cox - 2021 - In Jeremy Chapman, David Kasmier, John L. Crassidis, James L. Llinas, Barry Smith & Alex P. Cox (eds.), National Symposium on Sensor & Data Fusion (NSSDF), Military Sensing Symposia (MSS).
    This paper describes an AFOSR-supported basic research program that focuses on developing a new framework for combining hard with soft data in order to improve space situational awareness. The goal is to provide, in an automatic and near real-time fashion, a ranking of possible threats to blue assets (assets trying to be protected) from red assets (assets with hostile intentions). The approach is based on Conceptual Spaces models, which combine features from traditional associative and symbolic cognitive models. While Conceptual (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not restricted to, issues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Data management practices in Educational Research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2019 - In P. N. Ololube & G. U. Nwiyi (eds.), Encyclopedia of institutional leadership, policy, and management: A handbook of research in honour of Professor Ozo-Mekuri Ndimele. pp. 1251-1265.
    Data is very important in any research experiment because it occupies a central place in making decisions based on findings resulting from the analysis of such data. Given its central role, it follows that such an important asset as data, deserve effective management in order to protect the integrity and provide an opportunity for effective problem-solving. The main thrust of this paper was to examine data management practices that should be adopted by scholars in maintaining the quality of their (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  11. EXTENT OF FINANCIAL LITERACY AMONG PNP PERSONNEL: BASIS FOR AN EFFECTIVE FINANCIAL MANAGEMENT PROGRAM.Henry Legazpi Ligson - 2023 - Get International Research Journal 1 (2):32-44.
    Variations in people’s perceptions of investment risk and financial literacy have been linked in studies. More specifically, Diacon (2016) discovered significant differences between less financially savvy non-experts and financial professionals. Lay people therefore have a larger propensity for association bias (i.e., they give suppliers and salesmen a higher level of credibility than laypeople) and are often less risk-tolerant than financial professionals. The method of sampling that the researcher chose is known as purposeful sampling. According to Easton & McColl, it is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Coronavirus Disease (COVID-19): Socio-Economic Systems in the Post-Pandemic World: Design Thinking, Strategic Planning, Management, and Public Policy.Andrzej Klimczuk, Eva Berde, Delali A. Dovie, Magdalena Klimczuk-Kochańska & Gabriella Spinelli (eds.) - 2022 - Lausanne: Frontiers Media.
    On 11 March 2020, the World Health Organization declared a pandemic of the COVID-19 coronavirus disease that was first recognized in China in late 2019. Among the primary effects caused by the pandemic, there was the dissemination of health preventive measures such as physical distancing, travel restrictions, self-isolation, quarantines, and facility closures. This includes the global disruption of socio-economic systems including the postponement or cancellation of various public events (e.g., sporting, cultural, or religious), supply shortages and fears of the same, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and logistics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. FINANCIAL COPING MECHANISMS AND HOUSEHOLD DECISION-MAKING FOLLOWING AN INJURY-RELATED HEALTH SHOCK: IMPLICATIONS FOR THE IMPLEMENTATION OF UNIVERSAL HEALTH COVERAGE IN VIETNAM.Anna Taber Niloufer - 2021 - Dissertation, Johns Hopkins University
    In a context of imperfect risk protection, households may protect against the impact of a health shock by employing various financial and non-financial coping mechanisms, such as foregoing or reducing needed medical care, labor substitution, consumption reduction, borrowing money, dissaving, and selling assets. However, leveraging certain coping mechanisms may reduce future productivity, potentially trapping households in chronic or persistent poverty. Resources and risk are not necessarily shared equitably within a household; the ability and willingness of the household to leverage coping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. ESG and Asset Manager Capitalism.Paul Forrester - manuscript
    This paper provides an examination of some problems caused by the concentration of influence in the capital markets of developed countries. In particular, I argue that large asset managers exercise quasi-political power that is not democratically legitimate. In section two, I will examine the economic driver behind the size and power of the big asset managers: the passive investing revolution. I will discuss several respects in which this revolution has fundamentally changed capital markets, most notably by making a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. e-AIMSS (Electronic Asset Inventory and Management System in School) for Resource Optimization and Organizational Productivity.Antonio C. Ahmad - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (3):109-120.
    This capstone is centered around the development of an efficient electronic property inventory system tailored for school assets, driven by the overarching objective of resource optimization to ensure equitable access to vital materials for all learners. The methodology follows the “ISSO” framework (Ignite, Strategize, Systematize, Operationalize), complemented by a Logical Framework. The project employs a homegrown digitalized system constructed through a waterfall model approach, which undergoes alpha and beta testing. The study’s analysis utilizes a t-Test to evaluate its impact. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Protecting Future Generations by Enhancing Current Generations.Parker Crutchfield - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge.
    It is plausible that current generations owe something to future generations. One possibility is that we have a duty to not harm them. Another possibility is that we have a duty to protect them. In either case, however, to satisfy the duties to future generations from environmental or political degradation, we need to engage in widespread collective action. But, as we are, we have a limited ability to do so, in part because we lack the self-discipline necessary for successful collective (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Contradicting effects of subjective economic and cultural values on ocean protection willingness: preliminary evidence of 42 countries.Quang-Loc Nguyen, Minh-Hoang Nguyen, Tam-Tri Le, Thao-Huong Ma, Ananya Singh, Thi Minh-Phuong Duong & Quan-Hoang Vuong - manuscript
    Coastal protection is crucial to human development since the ocean has many values associated with the economy, ecosystem, and culture. However, most ocean protecting efforts are currently ineffective due to the burdens of finance, lack of appropriate management, and international cooperation regimes. For aiding bottom-up initiatives for ocean protection support, this study employed the Mindsponge Theory to examine how the public’s perceived economic and cultural values influence their willingness to support actions to protect the ocean. Analyzing the European-Union-Horizon-2020-funded dataset of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Organization of accounting of assets, liabilities and results of the enterprise activities.Maksym Bezpartochnyi - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The monograph highlights the results of research of theoretical, methodological and practical aspects of the formation of accounting information for the needs of management, regulatory regulation of the accounting system as an institutional factor in the organization and choice of forms of accounting of the enterprise, organization of accounting of assets, liabilities and results of agricultural enterprises. The problems of the methodology for organizing the accounting of individual objects and ways to solve them are revealed. The monograph is intended for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Protective measurement and the de Broglie-Bohm theory.Shan Gao - manuscript
    We investigate the implications of protective measurement for de Broglie-Bohm theory, mainly focusing on the interpretation of the wave function. It has been argued that the de Broglie-Bohm theory gives the same predictions as quantum mechanics by means of quantum equilibrium hypothesis. However, this equivalence is based on the premise that the wave function, regarded as a Ψ-field, has no mass and charge density distributions. But this premise turns out to be wrong according to protective measurement; a charged quantum system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Impact of Default Dependency and Collateralization on Asset Pricing and Credit Risk Modeling.Tim Xiao - manuscript
    This article presents a comprehensive framework for valuing financial instruments subject to credit risk. In particular, we focus on the impact of default dependence on asset pricing, as correlated default risk is one of the most pervasive threats in financial markets. We analyze how swap rates are affected by bilateral counterparty credit risk, and how CDS spreads depend on the trilateral credit risk of the buyer, seller, and reference entity in a contract. Moreover, we study the effect of collateralization (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Genetic Protection Modifications: Moving Beyond the Binary Distinction Between Therapy and Enhancement for Human Genome Editing.Rasmus Bjerregaard Mikkelsen, Henriette Reventlow S. Frederiksen, Mickey Gjerris, Bjørn Holst, Poul Hyttel, Yonglun Luo, Kristine Freude & Peter Sandøe - 2019 - CRISPR Journal 2 (6):362-369.
    Current debate and policy surrounding the use of genetic editing in humans often relies on a binary distinction between therapy and human enhancement. In this paper, we argue that this dichotomy fails to take into account perhaps the most significant potential uses of CRISPR-Cas9 gene editing in humans. We argue that genetic treatment of sporadic Alzheimer’s disease, breast- and ovarian-cancer causing BRCA1/2 mutations and the introduction of HIV resistance in humans should be considered within a new category of genetic protection (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Protecting One’s Commitments: Integrity and Self-Defense.Sylvia Burrow - 2012 - International Journal of Applied Philosophy 26 (1):49-66.
    Living in a culture of violence against women leads women to employ any number of avoidance and defensive strategies on a daily basis. Such strategies may be self protective but do little to counter women’s fear of violence. A pervasive fear of violence comes with a cost to integrity not addressed in moral philosophy. Restricting choice and action to avoid possibility of harm compromises the ability to stand for one’s commitments before others. If Calhoun is right that integrity is a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Protective Microbiota: From Localized to Long-Reaching Co-Immunity.Lynn Chiu, Thomas Bazin, Marie-Elise Truchetet, Thierry Schaeverbeke, Laurence Delhaes & Thomas Pradeu - 2017 - Frontiers Immunology 8:1678.
    Resident microbiota do not just shape host immunity, they can also contribute to host protection against pathogens and infectious diseases. Previous reviews of the protective roles of the microbiota have focused exclusively on colonization resistance localized within a microenvironment. This review shows that the protection against pathogens also involves the mitigation of pathogenic impact without eliminating the pathogens (i.e., “disease tolerance”) and the containment of microorganisms to prevent pathogenic spread. Protective microorganisms can have an impact beyond their niche, interfering with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. The Responsibility to Protect - mehr als nur 'gerechter Krieg' in einem entstehenden Paradigma des Völkerrechts.Daniel Messelken - 2012 - Militärseelsorge 49:151-159.
    Der Einfluss der Lehre vom gerechten Krieg bzw. der Idee des gerechten Friedens auf den Umgang mit heutigen Konflikten lässt sich besonders gut anhand der so genannten „humanitären Interventionen“ und dem aus dieser Praxis entwickelten neuen Ansatz der „Responsibility to Protect“ (RtoP/ R2P) bzw. Schutzverantwortung zeigen. Bei der Be- gründung als humanitär erachteter Interventionen seit den 1990er Jahren wurde und wird auf die Kriterien des gerechten Krieges bzw. gerechten Friedens zurückgegriffen. Nachfolgend spielten diese auch bei der Formulierung des Prinzips der (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Equal protection and same-sex marriage.Kory Schaff - 2006 - Journal of Social Philosophy 35 (1):133–147.
    This paper examines constitutional issues concerning same-sex marriage. Although same-sex relations concern broader ethical issues as well, I set these aside to concentrate primarily on legal questions of privacy rights and equal protection. While sexual orientation is neither a suspect classification like race, nor a quasi classification like gender, there are strong reasons why it should trigger heightened scrutiny of legislation using sexuality as a standard of classification. In what follows, I argue that equal-protection doctrine is better suited for including (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  56
    Safety and Protection Practices in the Early Childhood Education Centres.Ibiwari Caroline Dike & Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):294-305.
    A safe and secure environment is an essential part of the early childhood development of any child. This study aims to investigate the safety and protection practices of early childhood centers in the Anambra state, Nigeria, and to determine if any improvements can be made to them. This study analyzed data collected from 60 Early Childhood Care Centers (ECCE Centers) and 60 Pre-Primary Schools (Preprimary School) in Anambra State using the Evaluation of ECCE Implementation Kit (KEIEP), direct observation, and unstructured (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. (1 other version)Bayesian belief protection: A study of belief in conspiracy theories.Nina Poth & Krzysztof Dolega - 2022 - Philosophical Psychology.
    Several philosophers and psychologists have characterized belief in conspiracy theories as a product of irrational reasoning. Proponents of conspiracy theories apparently resist revising their beliefs given disconfirming evidence and tend to believe in more than one conspiracy, even when the relevant beliefs are mutually inconsistent. In this paper, we bring leading views on conspiracy theoretic beliefs closer together by exploring their rationality under a probabilistic framework. We question the claim that the irrationality of conspiracy theoretic beliefs stems from an inadequate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Comparative analysis of models for adjustment procedure in assets value independent evaluation performed by comparative approach.Yuri Pozdnyakov, Zoryana Skybinska, Tetiana Gryniv, Igor Britchenko, Peter Losonczi, Olena Magopets, Oleksandr Skybinskyi & Nataliya Hryniv - 2021 - Eastern-European Journal of Enterprise Technologies 6 (13 (114)):80–93.
    This paper addresses the field of economic measurements of the value of assets, carried out by the methods of independent expert evaluation. The mathematical principles of application, within a comparative methodical approach, of additive and multiplicative models for correcting the cost of single indicator of compared objects have been considered. The differences of mathematical basis of the compared models were analyzed. It has been shown that the ambiguity in the methodology of correction procedure requires studying the advantages and disadvantages of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Duty to Protect.Kok-Chor Tan - 2005 - In Terry Nardin & Melissa S. Williams (eds.), Humanitarian Intervention: Nomos Xlvii. New York University Press.
    Debates on humanitarian intervention have focused on the permissibility question. In this paper, I ask whether intervention can be a moral duty, and if it is a moral duty, how this duty is to be distributed and assigned. With respect to the first question, I contemplate whether an intervention that has met the "permissibility" condition is also for this reason necessary and obligatory. If so, the gap between permission and obligation closes in the case of humanitarian intervention. On the second (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  31. Philosophical Foundations for Complementary Protection.Matthew J. Lister - 2019 - In David Miller & Christine Straehle (eds.), The Political Philosophy of Refuge. Cambridge University Press. pp. 211-231.
    A Significant percentage of the people outside their country of citizenship or residence who are unable to meet their basic needs on their own, and need international protection, do not fall under the definition set out in the UN Refugee Convention. This has led many - both academic commentators and activists - to call for a new, expanded refugee definition, preferably backed up by a new, binding, international convention. In earlier work I have resisted this call, arguing that there is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Protecting Tenants Without Preemption: How State and Local Governments Can Lessen the Impact of HUD's One-Strike Rule.Rob Van Someren Greve - 2017 - Georgetown Journal on Poverty Law and Policy 25 (1):135-167.
    Under a policy first enacted in 1988 and expanded in 1996, federally funded public housing authorities (“PHAs”) and private landlords renting their properties to tenants receiving federal housing assistance have been required to include a provision in all leases under which drug-related criminal activity as well as criminal activity that in any way poses a threat to other tenants or nearby residents constitutes ground for initiating eviction proceedings. This strict liability eviction policy, which has become known as the “One-Strike Rule,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Virtues of Economic Rescue Legislation: Distributive Justice, Civil Law, and the Troubled Asset Relief Program.Henry S. Kuo - 2021 - Moral Philosophy and Politics 8 (1):305-329.
    This study constitutes an ethical analysis through the lens of distributive justice in the case of the Troubled Asset Relief Program (TARP), which was enacted in the midst of the Great Recession of 2007–2009. It begins by engaging with the visions of justice constructed by John Rawls and Robert Nozick, using their insights to locate the injustices of TARP according to their moral imaginations. However, this study argues that Rawls’ and Nozick’s theories of justice primarily envision the nature of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Impossibility of Emergent Works’ Protection in U.S. and EU Copyright Law.Matt Blaszczyk - 2023 - North Carolina Journal of Law and Technology 25 (1):1-55.
    Protection of emergent works is impossible. Without an author, there is no expression of ideas which can be original, and thus no copyrightable work. Indeed, the whole system of copyright law, its conceptual building blocks of idea-expression dichotomy, originality, authorship, and the concept of a protectable work operate in the notation of human creativity. Emergent works fall outside of copyright’s positive ontology, being akin to ideas, facts, or subject-matter predicated by technical considerations, rather than authorial creativity. In other words, they (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  27
    Protecting Intellectual Property Rights in Civil Legislation: A Comparative Study Between French Civil Law and Iraqi Civil Law.Fatima Abdul Rahim Ali Al-Musallamawi & Mona Muhammad Kazem Abbas Al-Dulaimi - 2024 - Engineering and Sciences - International Conference 8 (S2):156-176.
    This study deals with the protection of intellectual property rights in French and Iraqi civil law. This is because the literary and life creativity in Iraq is declining, it is difficult to invest money in new things, and the number of people who comply with the artificial laws made since 2003 is increasing, and secondly, another reason, people's ignorance of the existing laws in Iraq. Iraq, so it is necessary. In each legislation, legal mechanisms are used to promote media and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. In search of value: The intricate impacts of benefit perception, knowledge, and emotion about climate change on marine protection support.Minh-Hoang Nguyen, Minh-Phuong Thi Duong, Quang-Loc Nguyen, Viet-Phuong La & Quan-Hoang Vuong - manuscript
    Marine and coastal ecosystems are crucial in maintaining human livelihood, facilitating social development, and reducing climate change impacts. Studies have examined how the benefit perception of aquatic ecosystems, knowledge, and emotion about climate change affect peoples’ support for marine protection. However, their interaction effects remain understudied. The current study explores the intricate interaction effect of the benefit perception of aquatic ecosystems, knowledge, and worry about climate change on marine protection support. Bayesian Mindsponge Framework (BMF) analytics was employed on a dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Recent Philosophies of Social Protection: From Capability to Ubuntu.Thaddeus Metz - 2016 - Global Social Policy 16 (2):132-150.
    In the past decade or two, philosophies of social protection have shifted away from a nearly exclusive focus on the subjective and the individual (e.g., autonomous choices, utility) and towards values that are more objective and relational. The latter approaches, typified by the well established Capabilities Approach and the up and coming ethic of ubuntu, have been substantially inspired by engagements with the Global South, particularly India and Africa. In this article, part of a special issue titled ‘The Principles and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  38. DDoS Protection With IPtables.Constantin Oesterling - 2016 - InfoSec:15.
    Research on the most effective Linux iptables rules to mitigate Distributed Denial of Service (DDoS) attacks.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Provocation, Self‐Defense, and Protective Duties.Jonas Haeg - 2024 - Philosophy and Public Affairs 52 (4):465-499.
    This paper explores why victims who provoke their aggressors seem to compromise their right to self-defence. First, it argues that one proposed answer – the victims are partially responsible for the threats they face – fails. It faces counterexamples that it cannot adequately address. Second, the paper develops the Protective Duty View according to which we incur protective duties towards others when we interfere with their reasonable opportunities to avoid suffering harm. Since provokers wrongfully interfere with prospective aggressors’ opportunities to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to the (...)
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  41. The Responsibility to Protect from Terror: The Ethics of Foreign Counter-terrorist Interventions.Isaac Taylor - 2022 - Global Responsibility to Protect 14 (2):155-177.
    The use of military force abroad is a significant part of some states’ counter-terrorist efforts. Can these operations be ethically justified? This paper considers whether the underlying principles that philosophers have put forward to justify humanitarian interventions (which may underlie the international norm of the responsibility to protect (R2P)) can also give support for foreign counter-terrorist interventions of this sort. While it finds that the limits to international action that are imposed by the need to respect state sovereignty do not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. De la protection de la nature au développement durable : Genèse d'un oxymore éthique et politique.Donato Bergandi & Patrick Blandin - 2012 - Revue d'Histoire des Sciences 65 (1):103-142.
    Le concept de développement durable s’enracine dans l’histoire des mouvements de préservation de la nature et de conservation des ressources naturelles et de leurs relations avec les sciences de la nature, en particulier l’écologie. En tant que paradigme sociétal, à la fois écologique, politique et économique, il se présente comme un projet politique idéal applicable à l’ensemble des sociétés, qui prétend dépasser l’opposition entre ces deux visions profondément divergentes des relations homme‑nature. L’analyse des textes internationaux pertinents permet de dégager les (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. The Duty to Protect, Abortion, and Organ Donation.Emily Carroll & Parker Crutchfield - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (3):333-343.
    Some people oppose abortion on the grounds that fetuses have full moral status and thus a right to not be killed. We argue that special obligations that hold between mother and fetus also hold between parents and their children. We argue that if these special obligations necessitate the sacrifice of bodily autonomy in the case of abortion, then they also necessitate the sacrifice of bodily autonomy in the case of organ donation. If we accept the argument that it is obligatory (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. PROTECTIVE BEHAVIOR AGAINST COVID-19 AMONG VIETNAMESE PEOPLE IN THE SOCIAL DISTANCING CAMPAIGN: A CROSS-SECTIONAL STUDY.Tu Phung Tran, Vu Dinh Phi Le & Thanh Hoa Diep - 2022 - DALAT UNIVERSITY JOURNAL OF SCIENCE 12 (1):20-38.
    In the global fight against the rapid spread of COVID-19, a variety of unprecedented preventive measures have been implemented across the globe, as well as in Vietnam. How Vietnamese people respond to threats to their health and life remains unclear. For this reason, the current study aims to examine Vietnamese people’s protective behavior and its factors. Based on 1,798 online survey respondents’ data collected on the last three days of the nationwide social distancing campaign in mid-April, it is found that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Kenneth Arrow on Rawls’s “asset egalitarian” assumption about justice.Terence Rajivan Edward - manuscript
    Kenneth Arrow presents Rawls as making a controversial assumption, which he terms “asset egalitarianism”: that all the assets of society, including personal skills, are available for distribution. I distinguish two versions of the assumption and draw attention to difficulties in determining what Arrow’s concern over the assumption is.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Protecting Australia against Cyberterrorism.Marcia Ricci Pinheiro - 2017 - IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 22 (9):1-6.
    We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but also any attack that has not yet happened, as for our official records, so say hacking of satellite and use of its allowances to burn people alive to death. We talk about the basics, which could be the advice of FireEye, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The axiological dimension of planetary protection.Erik Persson - 2021 - In Octavio Alfonso Chon Torres, Ted Peters, Joseph Seckbach & Richard Gordon (eds.), _Astrobiology_: Science, _Ethics_, and _Public Policy_. pp. 293-312.
    Planetary protection is not just a matter of science. It is also a matter of value. This is so independently of whether we only include the protection of science or if we also include other goals. Excluding other values than the protection of science is thus a value statement, not a scientific statement and it does not make planetary protection value neutral. It just makes the axiological basis (that is, the value basis) for planetary protection more limited in a way (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Soft ethics: its application to the General Data Protection Regulation and its dual advantage.Luciano Floridi - 2018 - Philosophy and Technology 31 (1):163-167.
    In previous works (Floridi 2018) I introduced the distinction between hard ethics (which may broadly be described as what is morally right and wrong independently of whether something is legal or illegal), and soft or post-compliance ethics (which focuses on what ought to be done over and above existing legislation). This paper analyses the applicability of soft ethics to the General Data Protection Regulation and advances the theory that soft ethics has a dual advantage—as both an opportunity strategy and a (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  49. Safeguard Mechanism in Jordan: Protection of the Domestic Industry.Bashar H. Malkawi - manuscript
    The WTO Agreement on Safeguards prescribes each member to adopt appropriate domestic legislation before it imposes safeguard measures. Historically, Jordan enacted its first WTO-compatible safeguard law, known as the National Production Protection Law No.4 of 1998 (“NPP Law”), in 1998 on the eve of Jordan’s accession to the WTO. Afterward, it amended its NPP Law of 1998. So now, Jordan’s safeguard system is based on the amended NPP Law No. 50 of 2002 and Regulation on Safeguard of National Production. -/- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Transnational Standards of Social Protection: Contrasting European and International Governance.Poul F. Kjaer & Christian Joerges (eds.) - 2008 - Oslo: ARENA.
    The Report presents insights which illuminates the intertwinements of European regulatory policies and global governance arrangements. By pinning down the exact nature of the interaction between these two levels, the EU’s dilemma becomes obvious: On the one hand, stronger global governance can be a chance, through which the EU can clarify its own raison d’être of increased integration to the wider world. On the other hand, the design of the European project is being challenged by more assertive global structures. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 966