Results for 'protected zone'

1000+ found
Order:
  1. The duty to bring children living in conflict zones to a safe haven.Gottfried Schweiger - 2016 - Journal of Global Ethics 12 (3):380-397.
    In this paper, I will discuss a children’s rights-based argument for the duty of states, as a joint effort, to establish an effective program to help bring children out of conflict zones, such as parts of Syria, and to a safe haven. Children are among the most vulnerable subjects in violent conflicts who suffer greatly and have their human rights brutally violated as a consequence. Furthermore, children are also a group whose capacities to protect themselves are very limited, while their (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Evaluating Land Use/Land Cover Change and Its Socioeconomic Implications in Agarfa District of Bale Zone, Southeastern Ethiopia.Teha Turi, Hussien Hayicho & Haji Kedir - manuscript
    A systematic analysis of land use/cover change is so decisive to exactly understand the extent of change and take essential measures to curb down the rate of changes and protect the land cover resources sustainably. This land use/land cover change study was conducted in Agarfa district of Bale zone, Oromia Regional State, Southeastern Ethiopia. The objectives of this study were to evaluate the trends, drivers and its socio-economic and environmental implication in study area. A descriptive research method was employed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  74
    Rethinking freedom from the perspective of refugees: Lived experiences of (un)freedom in Europe’s border zones.Nasiri Shahin - 2023 - Dissertation, University of Amsterdam
    In mainstream political discourse, refugeehood is increasingly being associated with victimhood, powerlessness, abnormality, and political crises. On the one hand, refugees are, often, viewed as voiceless victims who should be offered protection and assistance on humanitarian grounds under exceptional circumstances. On the other hand, they are, increasingly, being portrayed as enemy-like strangers who pose a threat to the borders, stability of receiving states, and the well-being of their citizens. This prevailing framework fundamentally disregards refugees’ political subjectivity and ignores emancipatory phenomena (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Requirements for comprehensive management of industrial heritage sites and landscapes.Hassan Bazazzadeh, Mohammadjavad Mahdavinejad, Mohsen Ghomeshi & Seyedeh Sara Hashemi Safaei - 2018 - In Dr Somayeh Fadaei Nejad Bahramjerdi (ed.), The proceeding of the International Conference on Conservation of 20th Century Heritage from Architecture to Landscape. pp. 167-180.
    Industrial heritage has become a very matter of debate among experts as the most significant reminder of the industrial era, it also is of great examples of 20th-century heritage. Nowadays, industrial heritage sites are suffering from intense physical conditions and are being intruded by massive economic projects since they are located in favorable places of towns and possess vast spaces. Conservation methods have mostly been limited to the surroundings of industrial heritage sites and have not considered the extended areas connected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Environmental and Ecological Damage as "Collateral Damage": The Case of SpaceX's Starship Launch.Son Nhan - manuscript
    This study examines the concept of "collateral damage" in the context of environmental and ecological impact. It focuses on the SpaceX Starship launch, a significant event in space exploration, and its repercussions on the local environment. While the launch was deemed a success in advancing space exploration, reports from U.S. wildlife officials highlight the severe damage inflicted on the local ecosystem. The analysis reveals the existence of a notion termed "protected zones," which diverges from the conservationist perspective, emphasizing the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Can we quarantine the quantum blight?Craig Callender - 2020 - In Steven French & Juha Saatsi (eds.), Scientific Realism and the Quantum. Oxford: Oxford University Press.
    No shield can protect scientific realism from dealing with the quantum measurement problem. One may be able to erect barriers around the observable or classical, preserving a realism about tables, chairs and the like, but there is no safety zone within the quantum realm, the domain of our best physical theory. The upshot is not necessarily that scientific realism is in trouble. That conclusion demands further arguments. The lesson instead may be that scientific realists ought to stake their case (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  8. Flora naczyniowa doliny Olszowki [Kotlina Sandomierska] - walory i zagadnienia ochrony.Adam P. Kubiak - 2009 - Chrońmy Przyrodę Ojczystą 4 (65):303-310.
    The study area was a small lowland river valley within a range of 4750 m length and approx. 150 m width (about 62 ha), situated in the south-east of Poland, in the middle of Sandomierz Basin (Fig. 1). Flora and the chosen most valuable plant communities of the river bed with adjacent ecotone zone were investigated in 2007. During the study 291 species of vascular plants were found. Among them 10 are protected: Batrachium peltatum, Convallaria majalis, Dactylorhiza majalis, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  35
    Climate Change and Our Moral Obligations to Future Generations: A Critical Analysis (8th edition).Shamim Ara Pia - 2018 - Jibon Doshon 8 (ISSN 2312-7848):141-160.
    Climate is a fundamental element of the environment. Human beings' sound living depends on a healthy and sustainable climate. However, our climate is losing its natural balance day by day. As a result, it is posing harmful effects on us through different types of natural calamities. Apart from several natural processes, anthropocentric (human-caused) activities are the main cause of it. Different types of natural disasters that are occurring in the environment—for instance, hurricanes, cyclones, earthquakes, mudslides, floods, wildfires, volcanic eruptions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Developing a Trusted Human-AI Network for Humanitarian Benefit.Susannah Kate Devitt, Jason Scholz, Timo Schless & Larry Lewis - forthcoming - Journal of Digital War:TBD.
    Humans and artificial intelligences (AI) will increasingly participate digitally and physically in conflicts yet there is a lack of trusted communications across agents and platforms. For example, humans in disasters and conflict already use messaging and social media to share information, however, international humanitarian relief organisations treat this information as unverifiable and untrustworthy. AI may reduce the ‘fog-of-war’ and improve outcomes, however current AI implementations are often brittle, have a narrow scope of application and wide ethical risks. Meanwhile, human error (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Protecting Future Generations by Enhancing Current Generations.Parker Crutchfield - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge.
    It is plausible that current generations owe something to future generations. One possibility is that we have a duty to not harm them. Another possibility is that we have a duty to protect them. In either case, however, to satisfy the duties to future generations from environmental or political degradation, we need to engage in widespread collective action. But, as we are, we have a limited ability to do so, in part because we lack the self-discipline necessary for successful collective (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  15
    Using Zone-Disjoint Multi-Path Routing Algorithm for Video Transmission over Ah-Hoc Networks.Nastooh Taheri Javan - 2009 - 4Th International Conference on Computer Sciences and Convergence Information Technology 1 (1):877-882.
    Finding multi-path routes in ad hoc networks due to their grid topology seems to be a trivial task, but because of CSMA/CA effects in these networks found paths are not completely disjoint unless an appropriate algorithm have taken into account. If such an algorithm provided and designed carefully it could improve multi-path video transmission over these kinds of networks. By using node-disjoint paths, it is expected that the end-to-end delay and BER in each case should be independent of each other. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Buffer zone.Massimo Pigliucci - 2002 - Nature 417 (598):599.
    Living organisms are caught between a hammer and an anvil, evolutionarily speaking. On the one hand, they need to buffer the influences of genetic mutations and environmental stresses if they are to develop normally and maintain a coherent and functional form. On the other, stabiliz- ing one’s development too much may mean not being able to respond at all to changes in the environment and starting down the primrose path to extinction. On page 618 of this issue, Queitsch et al.1 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Sega’s Comix Zone and Miguel de Unamuno on the Ontological Status of Fictional Characters.Alberto Oya - 2022 - Andphilosophy.Com—The Blackwell Philosophy and Pop Culture Series.
    Comix Zone (Sega Technical Institute, 1995) is a two-dimensional scrolling beat ‘em up videogame released in 1995 for the Sega Mega Drive (known as Sega Genesis in North America). Comix Zone has two peculiarities which makes it even today an easily distinguishable videogame. These peculiarities are interrelated. First, Comix Zone imitates the aesthetics and visual settings peculiar to comic books, the aim of which is to join the experience of playing a videogame with that of reading a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Protective Measurement and the Meaning of the Wave Function.Shan Gao - 2011
    This article analyzes the implications of protective measurement for the meaning of the wave function. According to protective measurement, a charged quantum system has mass and charge density proportional to the modulus square of its wave function. It is shown that the mass and charge density is not real but effective, formed by the ergodic motion of a localized particle with the total mass and charge of the system. Moreover, it is argued that the ergodic motion is not continuous but (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  34
    IZM-DSR: A New Zone-Disjoint Multi-path Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Third Uksim European Symposium on Computer Modeling and Simulation 1 (1):511-516.
    Some of multi-path routing algorithms in MANETs use multiple paths simultaneously. These algorithms can attempt to find node-disjoint to achieve higher fault tolerance. By using node-disjoint paths, it is expected that the end-to-end delay in each case should be independent of each other. However, because of natural properties and medium access mechanisms in ad hoc networks, such as CSMA/CA, the endto-end delay between any source and destination depends on the pattern of communication in the neighborhood region. In this case some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Does Libertarian Self-Ownership Protect Freedom?Jesper Ahlin Marceta - 2022 - De Ethica 1 (7):19-30.
    Many libertarians assume that there is a close relation between an individual’s self-ownership and her freedom. That relation needs questioning. In this article it is argued that, even in a pre-property state, self-ownership is insufficient to protect freedom. Therefore, libertarians who believe in self-ownership should either offer a defense of freedom that is independent from their defense of self-ownership, make it explicit that they hold freedom as second to self-ownership (and defend that position), or reconsider the moral basis of their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Protective measurement and the de Broglie-Bohm theory.Shan Gao - manuscript
    We investigate the implications of protective measurement for de Broglie-Bohm theory, mainly focusing on the interpretation of the wave function. It has been argued that the de Broglie-Bohm theory gives the same predictions as quantum mechanics by means of quantum equilibrium hypothesis. However, this equivalence is based on the premise that the wave function, regarded as a Ψ-field, has no mass and charge density distributions. But this premise turns out to be wrong according to protective measurement; a charged quantum system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Philosophical Zombies and the zone phenomenon.David B. Macintosh - manuscript
    The philosophical zombie is an imaginary being that is just like us in every way, except that philosophical zombies don't have experience. Elite athletes who are 'in the zone' also lack experience, therefore, while in a zone state they are similar to philosophical zombies.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Genetic Protection Modifications: Moving Beyond the Binary Distinction Between Therapy and Enhancement for Human Genome Editing.Rasmus Bjerregaard Mikkelsen, Henriette Reventlow S. Frederiksen, Mickey Gjerris, Bjørn Holst, Poul Hyttel, Yonglun Luo, Kristine Freude & Peter Sandøe - 2019 - CRISPR Journal 2 (6):362-369.
    Current debate and policy surrounding the use of genetic editing in humans often relies on a binary distinction between therapy and human enhancement. In this paper, we argue that this dichotomy fails to take into account perhaps the most significant potential uses of CRISPR-Cas9 gene editing in humans. We argue that genetic treatment of sporadic Alzheimer’s disease, breast- and ovarian-cancer causing BRCA1/2 mutations and the introduction of HIV resistance in humans should be considered within a new category of genetic protection (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Protecting One’s Commitments: Integrity and Self-Defense.Sylvia Burrow - 2012 - International Journal of Applied Philosophy 26 (1):49-66.
    Living in a culture of violence against women leads women to employ any number of avoidance and defensive strategies on a daily basis. Such strategies may be self protective but do little to counter women’s fear of violence. A pervasive fear of violence comes with a cost to integrity not addressed in moral philosophy. Restricting choice and action to avoid possibility of harm compromises the ability to stand for one’s commitments before others. If Calhoun is right that integrity is a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  20
    We Have Met the Grey Zone and He is Us: How Grey Zone Warfare Exploits Our Undecidedness about What Matters to Us.Duncan MacIntosh - 2024 - In Mitt Regan & Aurel Sari (eds.), Hybrid Threats and Grey Zone Conflict: The Challenge to Liberal Democracies. New York, NY: Oxford University Press. pp. 61-85.
    Grey zone attacks tend to paralyze response for two reasons. First, they present us with choice scenarios of inherently dilemmatic structure, e.g., Prisoners’ Dilemmas and games of chicken, complicated by difficult conditions of choice, such as choice under risk or amid vagueness. Second, they exploit our uncertainty about how much we do or should care about the things under attack¬—each attack is small in effect, but their effects accumulate: how should we decide whether to treat a given attack as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Contradicting effects of subjective economic and cultural values on ocean protection willingness: preliminary evidence of 42 countries.Quang-Loc Nguyen, Minh-Hoang Nguyen, Tam-Tri Le, Thao-Huong Ma, Ananya Singh, Thi Minh-Phuong Duong & Quan-Hoang Vuong - manuscript
    Coastal protection is crucial to human development since the ocean has many values associated with the economy, ecosystem, and culture. However, most ocean protecting efforts are currently ineffective due to the burdens of finance, lack of appropriate management, and international cooperation regimes. For aiding bottom-up initiatives for ocean protection support, this study employed the Mindsponge Theory to examine how the public’s perceived economic and cultural values influence their willingness to support actions to protect the ocean. Analyzing the European-Union-Horizon-2020-funded dataset of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Equal protection and same-sex marriage.Kory Schaff - 2006 - Journal of Social Philosophy 35 (1):133–147.
    This paper examines constitutional issues concerning same-sex marriage. Although same-sex relations concern broader ethical issues as well, I set these aside to concentrate primarily on legal questions of privacy rights and equal protection. While sexual orientation is neither a suspect classification like race, nor a quasi classification like gender, there are strong reasons why it should trigger heightened scrutiny of legislation using sexuality as a standard of classification. In what follows, I argue that equal-protection doctrine is better suited for including (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Protective Microbiota: From Localized to Long-Reaching Co-Immunity.Lynn Chiu, Thomas Bazin, Marie-Elise Truchetet, Thierry Schaeverbeke, Laurence Delhaes & Thomas Pradeu - 2017 - Frontiers Immunology 8:1678.
    Resident microbiota do not just shape host immunity, they can also contribute to host protection against pathogens and infectious diseases. Previous reviews of the protective roles of the microbiota have focused exclusively on colonization resistance localized within a microenvironment. This review shows that the protection against pathogens also involves the mitigation of pathogenic impact without eliminating the pathogens (i.e., “disease tolerance”) and the containment of microorganisms to prevent pathogenic spread. Protective microorganisms can have an impact beyond their niche, interfering with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Protecting Tenants Without Preemption: How State and Local Governments Can Lessen the Impact of HUD's One-Strike Rule.Rob Van Someren Greve - 2017 - Georgetown Journal on Poverty Law and Policy 25 (1):135-167.
    Under a policy first enacted in 1988 and expanded in 1996, federally funded public housing authorities (“PHAs”) and private landlords renting their properties to tenants receiving federal housing assistance have been required to include a provision in all leases under which drug-related criminal activity as well as criminal activity that in any way poses a threat to other tenants or nearby residents constitutes ground for initiating eviction proceedings. This strict liability eviction policy, which has become known as the “One-Strike Rule,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. In the Neutral Zone, A Libertarian's Home Is Their Castle.M. Blake Wilson - 2017 - In Bruce Krajewski & Joshua Heter (eds.), The Man In The High Castle And Philosophy. Chicago: Open Court. pp. 47-58.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Agent Intellect and Black Zones.Gavin Keeney - 2018 - P2p Foundation.
    This essay addresses arguments regarding the “place” or “non-place” in which ideas originate and whether they are wholly transcendental, wholly contingent, or a combination of transcendental and contingent. Far from a resuscitation or recitation of Medieval scholastic disputations, the essay seeks to situate these untimely concerns in the context of spent discursive and ideological systems that support capitalist exploitation of the knowledge commons, exploitation only made possible because of a decisive and historically determined reduction of knowledge to fully contingent status (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Bayesian belief protection: A study of belief in conspiracy theories.Nina Poth & Krzysztof Dolega - 2022 - Philosophical Psychology.
    Several philosophers and psychologists have characterized belief in conspiracy theories as a product of irrational reasoning. Proponents of conspiracy theories apparently resist revising their beliefs given disconfirming evidence and tend to believe in more than one conspiracy, even when the relevant beliefs are mutually inconsistent. In this paper, we bring leading views on conspiracy theoretic beliefs closer together by exploring their rationality under a probabilistic framework. We question the claim that the irrationality of conspiracy theoretic beliefs stems from an inadequate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Protecting Democracy by Commingling Polities: The Case for Accepting Foreign Influence and Interference in Democratic Processes.Duncan MacIntosh - 2021 - In Duncan B. Hollis & Jens David Ohlin (eds.), Defending Democracies: Combating Foreign Election Interference in a Digital Age. Oxford University Press. pp. 93-114.
    This chapter criticizes several methods of responding to the techniques foreign powers are widely acknowledged to be using to subvert U.S. elections. It suggests that countries do this when they have a legitimate stake in each other’s political deliberations, but no formal voice in them. It also suggests that if they accord each other such a voice, they will engage as co-deliberators with arguments, rather than trying to undermine each other’s deliberative processes; and that this will be salutary for all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Duty to Protect, Abortion, and Organ Donation.Emily Carroll & Parker Crutchfield - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (3):333-343.
    Some people oppose abortion on the grounds that fetuses have full moral status and thus a right to not be killed. We argue that special obligations that hold between mother and fetus also hold between parents and their children. We argue that if these special obligations necessitate the sacrifice of bodily autonomy in the case of abortion, then they also necessitate the sacrifice of bodily autonomy in the case of organ donation. If we accept the argument that it is obligatory (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Philosophical Foundations for Complementary Protection.Matthew J. Lister - 2019 - In David Miller & Christine Straehle (eds.), The Political Philosophy of Refuge. Cambridge University Press. pp. 211-231.
    A Significant percentage of the people outside their country of citizenship or residence who are unable to meet their basic needs on their own, and need international protection, do not fall under the definition set out in the UN Refugee Convention. This has led many - both academic commentators and activists - to call for a new, expanded refugee definition, preferably backed up by a new, binding, international convention. In earlier work I have resisted this call, arguing that there is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. The Duty to Protect.Kok-Chor Tan - 2006 - In Terry Nardin & Melissa Williams (eds.), Humanitarian Intervention. New York University Press.
    Debates on humanitarian intervention have focused on the permissibility question. In this paper, I ask whether intervention can be a moral duty, and if it is a moral duty, how this duty is to be distributed and assigned. With respect to the first question, I contemplate whether an intervention that has met the "permissibility" condition is also for this reason necessary and obligatory. If so, the gap between permission and obligation closes in the case of humanitarian intervention. On the second (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  35. DDoS Protection With IPtables.Constantin Oesterling - 2016 - InfoSec:15.
    Research on the most effective Linux iptables rules to mitigate Distributed Denial of Service (DDoS) attacks.
    Download  
     
    Export citation  
     
    Bookmark  
  36. PROTECTIVE BEHAVIOR AGAINST COVID-19 AMONG VIETNAMESE PEOPLE IN THE SOCIAL DISTANCING CAMPAIGN: A CROSS-SECTIONAL STUDY.Tu Phung Tran, Vu Dinh Phi Le & Thanh Hoa Diep - 2022 - DALAT UNIVERSITY JOURNAL OF SCIENCE 12 (1):20-38.
    In the global fight against the rapid spread of COVID-19, a variety of unprecedented preventive measures have been implemented across the globe, as well as in Vietnam. How Vietnamese people respond to threats to their health and life remains unclear. For this reason, the current study aims to examine Vietnamese people’s protective behavior and its factors. Based on 1,798 online survey respondents’ data collected on the last three days of the nationwide social distancing campaign in mid-April, it is found that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Responsibility to Protect - mehr als nur 'gerechter Krieg' in einem entstehenden Paradigma des Völkerrechts.Daniel Messelken - 2012 - Militärseelsorge 49:151-159.
    Der Einfluss der Lehre vom gerechten Krieg bzw. der Idee des gerechten Friedens auf den Umgang mit heutigen Konflikten lässt sich besonders gut anhand der so genannten „humanitären Interventionen“ und dem aus dieser Praxis entwickelten neuen Ansatz der „Responsibility to Protect“ (RtoP/ R2P) bzw. Schutzverantwortung zeigen. Bei der Be- gründung als humanitär erachteter Interventionen seit den 1990er Jahren wurde und wird auf die Kriterien des gerechten Krieges bzw. gerechten Friedens zurückgegriffen. Nachfolgend spielten diese auch bei der Formulierung des Prinzips der (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  39. Protecting Australia against Cyberterrorism.Marcia Ricci Pinheiro - 2017 - IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 22 (9):1-6.
    We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but also any attack that has not yet happened, as for our official records, so say hacking of satellite and use of its allowances to burn people alive to death. We talk about the basics, which could be the advice of FireEye, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Recent Philosophies of Social Protection: From Capability to Ubuntu.Thaddeus Metz - 2016 - Global Social Policy 16 (2):132-150.
    In the past decade or two, philosophies of social protection have shifted away from a nearly exclusive focus on the subjective and the individual (e.g., autonomous choices, utility) and towards values that are more objective and relational. The latter approaches, typified by the well established Capabilities Approach and the up and coming ethic of ubuntu, have been substantially inspired by engagements with the Global South, particularly India and Africa. In this article, part of a special issue titled ‘The Principles and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. In search of value: The intricate impacts of benefit perception, knowledge, and emotion about climate change on marine protection support.Minh-Hoang Nguyen, Minh-Phuong Thi Duong, Quang-Loc Nguyen, Viet-Phuong La & Quan-Hoang Vuong - manuscript
    Marine and coastal ecosystems are crucial in maintaining human livelihood, facilitating social development, and reducing climate change impacts. Studies have examined how the benefit perception of aquatic ecosystems, knowledge, and emotion about climate change affect peoples’ support for marine protection. However, their interaction effects remain understudied. The current study explores the intricate interaction effect of the benefit perception of aquatic ecosystems, knowledge, and worry about climate change on marine protection support. Bayesian Mindsponge Framework (BMF) analytics was employed on a dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to the (...)
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  43. Science Fiction and the Boundaries of Philosophy: Exploring the Neutral Zone with Plato, Kant, and H.G. Wells.Andrew Fiala - 2023 - Journal of Science Fiction and Philosophy 6.
    In this paper, I consider the difficulty of distinguishing between science fiction and philosophy. The boundary between these genres is somewhat vague. There is a “neutral zone” separating the genres. But this neutral zone is often transgressed. One key distinction considered here is that between entertainment and edification. Another crucial element is found in the importance of the author’s apparent self-consciousness of these distinctions. Philosophy seeks to edify, and philosophers are often deliberately focused on thinking about the question (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. De la protection de la nature au développement durable : Genèse d'un oxymore éthique et politique.Donato Bergandi & Patrick Blandin - 2012 - Revue d'Histoire des Sciences 65 (1):103-142.
    Le concept de développement durable s’enracine dans l’histoire des mouvements de préservation de la nature et de conservation des ressources naturelles et de leurs relations avec les sciences de la nature, en particulier l’écologie. En tant que paradigme sociétal, à la fois écologique, politique et économique, il se présente comme un projet politique idéal applicable à l’ensemble des sociétés, qui prétend dépasser l’opposition entre ces deux visions profondément divergentes des relations homme‑nature. L’analyse des textes internationaux pertinents permet de dégager les (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Building eco-surplus culture among urban inhabitants as a novel strategy to improve finance for conservation in protected areas.Minh-Hoang Nguyen & Thomas E. Jones - 2022 - Humanities and Social Sciences Communications 9:426.
    The rapidly declining biosphere integrity, representing one of the core planetary boundaries, is alarming. One of the most widely accepted measures to halt the rate of biodiversity loss is to maintain and expand protected areas that are effectively managed. However, it requires substantial finance derived from nature-based tourism, specifically visitors from urban areas. Using the Bayesian Mindsponge Framework (BMF) on 535 Vietnamese urban residents, the current study examined how their biodiversity loss perceptions can affect their willingness to pay for (...)
    Download  
     
    Export citation  
     
    Bookmark   161 citations  
  46. Counseling Services as Determinants of Senior Secondary 2 Anti-Social Behaviour in Calabar Education Zone of Cross River State, Nigeria.J. Juan - 2022 - Behaviour and Health 3 (1):183-202.
    This study aims to examine counseling services as determinants of senior secondary 2 students’ anti-social behaviour in Calabar Education Zone of Cross River State, Nigeria. The main independent variable of the study was counseling services which includes informative counseling services, rehabilitation while the dependent variable is anti-social behaviours. Two hypotheses were formulated to direct the study. Ex-post facto research design was adopted for the study. The population of the study consisted of 2686 senior secondary 2 students in 90 public (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Protects innovative technologies into educational system introduction.Igor Britchenko & Paweł Machashtchik - 2018 - In Igor Britchenko & Ye Polishchuk (eds.), Development of small and medium enterprises: the EU and East-partnership countries experience: monograph. Wydawnictwo Państwowej Wyższej Szkoły Zawodowej im. prof. Stanisława Tarnowskiego w Tarnobrzegu. pp. 161 - 173.
    Educational system innovative development, innovation management and marketing technologies and tools active improvement, learning technologies improvement and multiplication have become an integral attributes of educational technology of the majority countries in the world. Innovations in educational system development is the basis of a state’s innovative and technological policy. The need to improve educational system and introduce innovative technologies is an essential prerequisite able to ensure countries into the world economic community untrammeled integration. In this context it should be noted that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Alternative Protection of Intellectual Property Rights in Vaccine Production and Use under Covid-19.Ling Jin - 2022 - Journal of Education, Humanities and Social Sciences 1 (1):147-153.
    For the past three years, Coronavirus-19 (Covid-19) has become one of the major global health problems. Unlike any previous virus in the past decades, Covid-19 has shown its unprecedented spreading speed, infection rate, fatality rate, etc. Under this urgent disease outbursting event, scientists around the globe, through the myriad of research and experiments, successfully developed effective vaccines. However, like many other medical innovations, Covid-19 vaccines are categorized as intellectual properties and a scarce resource. As a consequence, the citizens of developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  76
    The Responsibility to Protect from Terror: The Ethics of Foreign Counter-terrorist Interventions.Isaac Taylor - 2022 - Global Responsibility to Protect 14 (2):155-177.
    The use of military force abroad is a significant part of some states’ counter-terrorist efforts. Can these operations be ethically justified? This paper considers whether the underlying principles that philosophers have put forward to justify humanitarian interventions (which may underlie the international norm of the responsibility to protect (R2P)) can also give support for foreign counter-terrorist interventions of this sort. While it finds that the limits to international action that are imposed by the need to respect state sovereignty do not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Safeguard Mechanism in Jordan: Protection of the Domestic Industry.Bashar H. Malkawi - manuscript
    The WTO Agreement on Safeguards prescribes each member to adopt appropriate domestic legislation before it imposes safeguard measures. Historically, Jordan enacted its first WTO-compatible safeguard law, known as the National Production Protection Law No.4 of 1998 (“NPP Law”), in 1998 on the eve of Jordan’s accession to the WTO. Afterward, it amended its NPP Law of 1998. So now, Jordan’s safeguard system is based on the amended NPP Law No. 50 of 2002 and Regulation on Safeguard of National Production. -/- (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000