Results for 'protected zone'

968 found
Order:
  1. The duty to bring children living in conflict zones to a safe haven.Gottfried Schweiger - 2016 - Journal of Global Ethics 12 (3):380-397.
    In this paper, I will discuss a children’s rights-based argument for the duty of states, as a joint effort, to establish an effective program to help bring children out of conflict zones, such as parts of Syria, and to a safe haven. Children are among the most vulnerable subjects in violent conflicts who suffer greatly and have their human rights brutally violated as a consequence. Furthermore, children are also a group whose capacities to protect themselves are very limited, while their (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Evaluating Land Use/Land Cover Change and Its Socioeconomic Implications in Agarfa District of Bale Zone, Southeastern Ethiopia.Teha Turi, Hussien Hayicho & Haji Kedir - manuscript
    A systematic analysis of land use/cover change is so decisive to exactly understand the extent of change and take essential measures to curb down the rate of changes and protect the land cover resources sustainably. This land use/land cover change study was conducted in Agarfa district of Bale zone, Oromia Regional State, Southeastern Ethiopia. The objectives of this study were to evaluate the trends, drivers and its socio-economic and environmental implication in study area. A descriptive research method was employed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Rethinking freedom from the perspective of refugees: Lived experiences of (un)freedom in Europe’s border zones.Nasiri Shahin - 2023 - Dissertation, University of Amsterdam
    In mainstream political discourse, refugeehood is increasingly being associated with victimhood, powerlessness, abnormality, and political crises. On the one hand, refugees are, often, viewed as voiceless victims who should be offered protection and assistance on humanitarian grounds under exceptional circumstances. On the other hand, they are, increasingly, being portrayed as enemy-like strangers who pose a threat to the borders, stability of receiving states, and the well-being of their citizens. This prevailing framework fundamentally disregards refugees’ political subjectivity and ignores emancipatory phenomena (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Requirements for comprehensive management of industrial heritage sites and landscapes.Hassan Bazazzadeh, Mohammadjavad Mahdavinejad, Mohsen Ghomeshi & Seyedeh Sara Hashemi Safaei - 2018 - In Dr Somayeh Fadaei Nejad Bahramjerdi (ed.), The proceeding of the International Conference on Conservation of 20th Century Heritage from Architecture to Landscape. pp. 167-180.
    Industrial heritage has become a very matter of debate among experts as the most significant reminder of the industrial era, it also is of great examples of 20th-century heritage. Nowadays, industrial heritage sites are suffering from intense physical conditions and are being intruded by massive economic projects since they are located in favorable places of towns and possess vast spaces. Conservation methods have mostly been limited to the surroundings of industrial heritage sites and have not considered the extended areas connected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Environmental and Ecological Damage as "Collateral Damage": The Case of SpaceX's Starship Launch.Son Nhan - manuscript
    This study examines the concept of "collateral damage" in the context of environmental and ecological impact. It focuses on the SpaceX Starship launch, a significant event in space exploration, and its repercussions on the local environment. While the launch was deemed a success in advancing space exploration, reports from U.S. wildlife officials highlight the severe damage inflicted on the local ecosystem. The analysis reveals the existence of a notion termed "protected zones," which diverges from the conservationist perspective, emphasizing the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. (1 other version)Can we quarantine the quantum blight?Craig Callender - 2020 - In Juha Saatsi & Steven French (eds.), Scientific Realism and the Quantum. Oxford: Oxford University Press.
    No shield can protect scientific realism from dealing with the quantum measurement problem. One may be able to erect barriers around the observable or classical, preserving a realism about tables, chairs and the like, but there is no safety zone within the quantum realm, the domain of our best physical theory. The upshot is not necessarily that scientific realism is in trouble. That conclusion demands further arguments. The lesson instead may be that scientific realists ought to stake their case (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  8. Climate Change and Our Moral Obligations to Future Generations: A Critical Analysis (8th edition).Shamim Ara Pia - 2018 - Jibon Doshon 8 (ISSN 2312-7848):141-160.
    Climate is a fundamental element of the environment. Human beings' sound living depends on a healthy and sustainable climate. However, our climate is losing its natural balance day by day. As a result, it is posing harmful effects on us through different types of natural calamities. Apart from several natural processes, anthropocentric (human-caused) activities are the main cause of it. Different types of natural disasters that are occurring in the environment—for instance, hurricanes, cyclones, earthquakes, mudslides, floods, wildfires, volcanic eruptions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Developing a Trusted Human-AI Network for Humanitarian Benefit.Susannah Kate Devitt, Jason Scholz, Timo Schless & Larry Lewis - forthcoming - Journal of Digital War:TBD.
    Humans and artificial intelligences (AI) will increasingly participate digitally and physically in conflicts yet there is a lack of trusted communications across agents and platforms. For example, humans in disasters and conflict already use messaging and social media to share information, however, international humanitarian relief organisations treat this information as unverifiable and untrustworthy. AI may reduce the ‘fog-of-war’ and improve outcomes, however current AI implementations are often brittle, have a narrow scope of application and wide ethical risks. Meanwhile, human error (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Flora naczyniowa doliny Olszowki [Kotlina Sandomierska] - walory i zagadnienia ochrony.Adam P. Kubiak - 2009 - Chrońmy Przyrodę Ojczystą 4 (65):303-310.
    The study area was a small lowland river valley within a range of 4750 m length and approx. 150 m width (about 62 ha), situated in the south-east of Poland, in the middle of Sandomierz Basin (Fig. 1). Flora and the chosen most valuable plant communities of the river bed with adjacent ecotone zone were investigated in 2007. During the study 291 species of vascular plants were found. Among them 10 are protected: Batrachium peltatum, Convallaria majalis, Dactylorhiza majalis, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Sega’s Comix Zone and Miguel de Unamuno on the Ontological Status of Fictional Characters.Alberto Oya - 2022 - Andphilosophy.Com—The Blackwell Philosophy and Pop Culture Series.
    Comix Zone (Sega Technical Institute, 1995) is a two-dimensional scrolling beat ‘em up videogame released in 1995 for the Sega Mega Drive (known as Sega Genesis in North America). Comix Zone has two peculiarities which makes it even today an easily distinguishable videogame. These peculiarities are interrelated. First, Comix Zone imitates the aesthetics and visual settings peculiar to comic books, the aim of which is to join the experience of playing a videogame with that of reading a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  64
    New Trading Zones in Contemporary Universities.Svetlana Shibarshina - 2019 - Philosophy of the Social Sciences 49 (6):510-527.
    This article aims to distinguish and depict the features of communications and collaborations in contemporary universities through the concept of trading zones. The author also considers the role that the idea of a digital university might play in shaping interactions in transforming local context where different actors can find a common ground of exchange. The new contexts, including the pragmatic orientation of contemporary society and new technologies and environments, contribute to reconsidering the idea of the classical university, in which interactions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. We Have Met the Grey Zone and He is Us: How Grey Zone Warfare Exploits Our Undecidedness about What Matters to Us.Duncan MacIntosh - 2024 - In Mitt Regan & Aurel Sari (eds.), Hybrid Threats and Grey Zone Conflict: The Challenge to Liberal Democracies. New York, NY: Oxford University Press. pp. 61-85.
    Grey zone attacks tend to paralyze response for two reasons. First, they present us with choice scenarios of inherently dilemmatic structure, e.g., Prisoners’ Dilemmas and games of chicken, complicated by difficult conditions of choice, such as choice under risk or amid vagueness. Second, they exploit our uncertainty about how much we do or should care about the things under attack¬—each attack is small in effect, but their effects accumulate: how should we decide whether to treat a given attack as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Protecting Tenants Without Preemption: How State and Local Governments Can Lessen the Impact of HUD's One-Strike Rule.Rob Van Someren Greve - 2017 - Georgetown Journal on Poverty Law and Policy 25 (1):135-167.
    Under a policy first enacted in 1988 and expanded in 1996, federally funded public housing authorities (“PHAs”) and private landlords renting their properties to tenants receiving federal housing assistance have been required to include a provision in all leases under which drug-related criminal activity as well as criminal activity that in any way poses a threat to other tenants or nearby residents constitutes ground for initiating eviction proceedings. This strict liability eviction policy, which has become known as the “One-Strike Rule,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Protecting Future Generations by Enhancing Current Generations.Parker Crutchfield - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge.
    It is plausible that current generations owe something to future generations. One possibility is that we have a duty to not harm them. Another possibility is that we have a duty to protect them. In either case, however, to satisfy the duties to future generations from environmental or political degradation, we need to engage in widespread collective action. But, as we are, we have a limited ability to do so, in part because we lack the self-discipline necessary for successful collective (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Buffer zone.Massimo Pigliucci - 2002 - Nature 417 (598):599.
    Living organisms are caught between a hammer and an anvil, evolutionarily speaking. On the one hand, they need to buffer the influences of genetic mutations and environmental stresses if they are to develop normally and maintain a coherent and functional form. On the other, stabiliz- ing one’s development too much may mean not being able to respond at all to changes in the environment and starting down the primrose path to extinction. On page 618 of this issue, Queitsch et al.1 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  72
    Using Zone-Disjoint Multi-Path Routing Algorithm for Video Transmission over Ah-Hoc Networks.Nastooh Taheri Javan - 2009 - 4Th International Conference on Computer Sciences and Convergence Information Technology 1 (1):877-882.
    Finding multi-path routes in ad hoc networks due to their grid topology seems to be a trivial task, but because of CSMA/CA effects in these networks found paths are not completely disjoint unless an appropriate algorithm have taken into account. If such an algorithm provided and designed carefully it could improve multi-path video transmission over these kinds of networks. By using node-disjoint paths, it is expected that the end-to-end delay and BER in each case should be independent of each other. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Protective measurement and the de Broglie-Bohm theory.Shan Gao - manuscript
    We investigate the implications of protective measurement for de Broglie-Bohm theory, mainly focusing on the interpretation of the wave function. It has been argued that the de Broglie-Bohm theory gives the same predictions as quantum mechanics by means of quantum equilibrium hypothesis. However, this equivalence is based on the premise that the wave function, regarded as a Ψ-field, has no mass and charge density distributions. But this premise turns out to be wrong according to protective measurement; a charged quantum system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Contradicting effects of subjective economic and cultural values on ocean protection willingness: preliminary evidence of 42 countries.Quang-Loc Nguyen, Minh-Hoang Nguyen, Tam-Tri Le, Thao-Huong Ma, Ananya Singh, Thi Minh-Phuong Duong & Quan-Hoang Vuong - manuscript
    Coastal protection is crucial to human development since the ocean has many values associated with the economy, ecosystem, and culture. However, most ocean protecting efforts are currently ineffective due to the burdens of finance, lack of appropriate management, and international cooperation regimes. For aiding bottom-up initiatives for ocean protection support, this study employed the Mindsponge Theory to examine how the public’s perceived economic and cultural values influence their willingness to support actions to protect the ocean. Analyzing the European-Union-Horizon-2020-funded dataset of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. The Responsibility to Protect - mehr als nur 'gerechter Krieg' in einem entstehenden Paradigma des Völkerrechts.Daniel Messelken - 2012 - Militärseelsorge 49:151-159.
    Der Einfluss der Lehre vom gerechten Krieg bzw. der Idee des gerechten Friedens auf den Umgang mit heutigen Konflikten lässt sich besonders gut anhand der so genannten „humanitären Interventionen“ und dem aus dieser Praxis entwickelten neuen Ansatz der „Responsibility to Protect“ (RtoP/ R2P) bzw. Schutzverantwortung zeigen. Bei der Be- gründung als humanitär erachteter Interventionen seit den 1990er Jahren wurde und wird auf die Kriterien des gerechten Krieges bzw. gerechten Friedens zurückgegriffen. Nachfolgend spielten diese auch bei der Formulierung des Prinzips der (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Protecting One’s Commitments: Integrity and Self-Defense.Sylvia Burrow - 2012 - International Journal of Applied Philosophy 26 (1):49-66.
    Living in a culture of violence against women leads women to employ any number of avoidance and defensive strategies on a daily basis. Such strategies may be self protective but do little to counter women’s fear of violence. A pervasive fear of violence comes with a cost to integrity not addressed in moral philosophy. Restricting choice and action to avoid possibility of harm compromises the ability to stand for one’s commitments before others. If Calhoun is right that integrity is a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Protective Microbiota: From Localized to Long-Reaching Co-Immunity.Lynn Chiu, Thomas Bazin, Marie-Elise Truchetet, Thierry Schaeverbeke, Laurence Delhaes & Thomas Pradeu - 2017 - Frontiers Immunology 8:1678.
    Resident microbiota do not just shape host immunity, they can also contribute to host protection against pathogens and infectious diseases. Previous reviews of the protective roles of the microbiota have focused exclusively on colonization resistance localized within a microenvironment. This review shows that the protection against pathogens also involves the mitigation of pathogenic impact without eliminating the pathogens (i.e., “disease tolerance”) and the containment of microorganisms to prevent pathogenic spread. Protective microorganisms can have an impact beyond their niche, interfering with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Secularism protects religions.John S. Wilkins - 2010 - In Warren Bonett (ed.), The Australian Book of Atheism. Scribe Publications.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Equal protection and same-sex marriage.Kory Schaff - 2006 - Journal of Social Philosophy 35 (1):133–147.
    This paper examines constitutional issues concerning same-sex marriage. Although same-sex relations concern broader ethical issues as well, I set these aside to concentrate primarily on legal questions of privacy rights and equal protection. While sexual orientation is neither a suspect classification like race, nor a quasi classification like gender, there are strong reasons why it should trigger heightened scrutiny of legislation using sexuality as a standard of classification. In what follows, I argue that equal-protection doctrine is better suited for including (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Philosophical Zombies and the zone phenomenon.David B. Macintosh - manuscript
    The philosophical zombie is an imaginary being that is just like us in every way, except that philosophical zombies don't have experience. Elite athletes who are 'in the zone' also lack experience, therefore, while in a zone state they are similar to philosophical zombies.
    Download  
     
    Export citation  
     
    Bookmark  
  27. Genetic Protection Modifications: Moving Beyond the Binary Distinction Between Therapy and Enhancement for Human Genome Editing.Rasmus Bjerregaard Mikkelsen, Henriette Reventlow S. Frederiksen, Mickey Gjerris, Bjørn Holst, Poul Hyttel, Yonglun Luo, Kristine Freude & Peter Sandøe - 2019 - CRISPR Journal 2 (6):362-369.
    Current debate and policy surrounding the use of genetic editing in humans often relies on a binary distinction between therapy and human enhancement. In this paper, we argue that this dichotomy fails to take into account perhaps the most significant potential uses of CRISPR-Cas9 gene editing in humans. We argue that genetic treatment of sporadic Alzheimer’s disease, breast- and ovarian-cancer causing BRCA1/2 mutations and the introduction of HIV resistance in humans should be considered within a new category of genetic protection (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. DDoS Protection With IPtables.Constantin Oesterling - 2016 - InfoSec:15.
    Research on the most effective Linux iptables rules to mitigate Distributed Denial of Service (DDoS) attacks.
    Download  
     
    Export citation  
     
    Bookmark  
  29. IZM-DSR: A New Zone-Disjoint Multi-path Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Third Uksim European Symposium on Computer Modeling and Simulation 1 (1):511-516.
    Some of multi-path routing algorithms in MANETs use multiple paths simultaneously. These algorithms can attempt to find node-disjoint to achieve higher fault tolerance. By using node-disjoint paths, it is expected that the end-to-end delay in each case should be independent of each other. However, because of natural properties and medium access mechanisms in ad hoc networks, such as CSMA/CA, the endto-end delay between any source and destination depends on the pattern of communication in the neighborhood region. In this case some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  62
    Safety and Protection Practices in the Early Childhood Education Centres.Ibiwari Caroline Dike & Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):294-305.
    A safe and secure environment is an essential part of the early childhood development of any child. This study aims to investigate the safety and protection practices of early childhood centers in the Anambra state, Nigeria, and to determine if any improvements can be made to them. This study analyzed data collected from 60 Early Childhood Care Centers (ECCE Centers) and 60 Pre-Primary Schools (Preprimary School) in Anambra State using the Evaluation of ECCE Implementation Kit (KEIEP), direct observation, and unstructured (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. (1 other version)Bayesian belief protection: A study of belief in conspiracy theories.Nina Poth & Krzysztof Dolega - 2022 - Philosophical Psychology.
    Several philosophers and psychologists have characterized belief in conspiracy theories as a product of irrational reasoning. Proponents of conspiracy theories apparently resist revising their beliefs given disconfirming evidence and tend to believe in more than one conspiracy, even when the relevant beliefs are mutually inconsistent. In this paper, we bring leading views on conspiracy theoretic beliefs closer together by exploring their rationality under a probabilistic framework. We question the claim that the irrationality of conspiracy theoretic beliefs stems from an inadequate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. The Duty to Protect.Kok-Chor Tan - 2005 - In Terry Nardin & Melissa S. Williams (eds.), Humanitarian Intervention: Nomos Xlvii. New York University Press.
    Debates on humanitarian intervention have focused on the permissibility question. In this paper, I ask whether intervention can be a moral duty, and if it is a moral duty, how this duty is to be distributed and assigned. With respect to the first question, I contemplate whether an intervention that has met the "permissibility" condition is also for this reason necessary and obligatory. If so, the gap between permission and obligation closes in the case of humanitarian intervention. On the second (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  33. Media tourism in the Chernobyl Exclusion Zone as a new tourist phenomenon.Oleksandr Krupskyi & Karina Temchur - 2018 - Journal of Geology, Geography and Geoecology 2 (27):261-273.
    Every year, the number of tourists in the Chernobyl Exclusion Zone is increasing. The most numerous visitors are journalists who come to perform theirofficial duties. At the same time, researchers have not yet shown interest in such an interesting and important tourist phenomenon. The purpose of this article is to de- scribe a new phenomenon of media tourism in the Chernobyl Exclusion Zone and its features. The study was conducted with a help of a qualitative case study analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Building eco-surplus culture among urban inhabitants as a novel strategy to improve finance for conservation in protected areas.Minh-Hoang Nguyen & Thomas E. Jones - 2022 - Humanities and Social Sciences Communications 9:426.
    The rapidly declining biosphere integrity, representing one of the core planetary boundaries, is alarming. One of the most widely accepted measures to halt the rate of biodiversity loss is to maintain and expand protected areas that are effectively managed. However, it requires substantial finance derived from nature-based tourism, specifically visitors from urban areas. Using the Bayesian Mindsponge Framework (BMF) on 535 Vietnamese urban residents, the current study examined how their biodiversity loss perceptions can affect their willingness to pay for (...)
    Download  
     
    Export citation  
     
    Bookmark   165 citations  
  35. Philosophical Foundations for Complementary Protection.Matthew J. Lister - 2019 - In David Miller & Christine Straehle (eds.), The Political Philosophy of Refuge. Cambridge University Press. pp. 211-231.
    A Significant percentage of the people outside their country of citizenship or residence who are unable to meet their basic needs on their own, and need international protection, do not fall under the definition set out in the UN Refugee Convention. This has led many - both academic commentators and activists - to call for a new, expanded refugee definition, preferably backed up by a new, binding, international convention. In earlier work I have resisted this call, arguing that there is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Provocation, Self‐Defense, and Protective Duties.Jonas Haeg - 2024 - Philosophy and Public Affairs 52 (4):465-499.
    This paper explores why victims who provoke their aggressors seem to compromise their right to self-defence. First, it argues that one proposed answer – the victims are partially responsible for the threats they face – fails. It faces counterexamples that it cannot adequately address. Second, the paper develops the Protective Duty View according to which we incur protective duties towards others when we interfere with their reasonable opportunities to avoid suffering harm. Since provokers wrongfully interfere with prospective aggressors’ opportunities to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Science Fiction and the Boundaries of Philosophy: Exploring the Neutral Zone with Plato, Kant, and H.G. Wells.Andrew Fiala - 2023 - Journal of Science Fiction and Philosophy 6.
    In this paper, I consider the difficulty of distinguishing between science fiction and philosophy. The boundary between these genres is somewhat vague. There is a “neutral zone” separating the genres. But this neutral zone is often transgressed. One key distinction considered here is that between entertainment and edification. Another crucial element is found in the importance of the author’s apparent self-consciousness of these distinctions. Philosophy seeks to edify, and philosophers are often deliberately focused on thinking about the question (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. PROTECTIVE BEHAVIOR AGAINST COVID-19 AMONG VIETNAMESE PEOPLE IN THE SOCIAL DISTANCING CAMPAIGN: A CROSS-SECTIONAL STUDY.Tu Phung Tran, Vu Dinh Phi Le & Thanh Hoa Diep - 2022 - DALAT UNIVERSITY JOURNAL OF SCIENCE 12 (1):20-38.
    In the global fight against the rapid spread of COVID-19, a variety of unprecedented preventive measures have been implemented across the globe, as well as in Vietnam. How Vietnamese people respond to threats to their health and life remains unclear. For this reason, the current study aims to examine Vietnamese people’s protective behavior and its factors. Based on 1,798 online survey respondents’ data collected on the last three days of the nationwide social distancing campaign in mid-April, it is found that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to the (...)
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  40. The Duty to Protect, Abortion, and Organ Donation.Emily Carroll & Parker Crutchfield - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (3):333-343.
    Some people oppose abortion on the grounds that fetuses have full moral status and thus a right to not be killed. We argue that special obligations that hold between mother and fetus also hold between parents and their children. We argue that if these special obligations necessitate the sacrifice of bodily autonomy in the case of abortion, then they also necessitate the sacrifice of bodily autonomy in the case of organ donation. If we accept the argument that it is obligatory (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. In search of value: The intricate impacts of benefit perception, knowledge, and emotion about climate change on marine protection support.Minh-Hoang Nguyen, Minh-Phuong Thi Duong, Quang-Loc Nguyen, Viet-Phuong La & Quan-Hoang Vuong - manuscript
    Marine and coastal ecosystems are crucial in maintaining human livelihood, facilitating social development, and reducing climate change impacts. Studies have examined how the benefit perception of aquatic ecosystems, knowledge, and emotion about climate change affect peoples’ support for marine protection. However, their interaction effects remain understudied. The current study explores the intricate interaction effect of the benefit perception of aquatic ecosystems, knowledge, and worry about climate change on marine protection support. Bayesian Mindsponge Framework (BMF) analytics was employed on a dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. What drives people’s protective behaviors during the early stage of the COVID-19 pandemic in China.Zhenjing Pang, Ce Zhao & Lan Xue - 2022 - Frontiers in Psychology 13:781279.
    This study systematically examined people’s protective behaviors against COVID-19 in China, and particular attention was given to people’s perceived threat and information-processing strategies. This study constructed a conceptual model and used structural equation modeling to explore this issue, and a questionnaire survey was conducted to collect data involving 4,605 participants during the early stage of the COVID-19 pandemic in China. The results showed that people’s initial information acquisition played an essential role in their behavioral responses; acquiring more initial information about (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Recent Philosophies of Social Protection: From Capability to Ubuntu.Thaddeus Metz - 2016 - Global Social Policy 16 (2):132-150.
    In the past decade or two, philosophies of social protection have shifted away from a nearly exclusive focus on the subjective and the individual (e.g., autonomous choices, utility) and towards values that are more objective and relational. The latter approaches, typified by the well established Capabilities Approach and the up and coming ethic of ubuntu, have been substantially inspired by engagements with the Global South, particularly India and Africa. In this article, part of a special issue titled ‘The Principles and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. Agent Intellect and Black Zones.Gavin Keeney - 2018 - P2p Foundation.
    This essay addresses arguments regarding the “place” or “non-place” in which ideas originate and whether they are wholly transcendental, wholly contingent, or a combination of transcendental and contingent. Far from a resuscitation or recitation of Medieval scholastic disputations, the essay seeks to situate these untimely concerns in the context of spent discursive and ideological systems that support capitalist exploitation of the knowledge commons, exploitation only made possible because of a decisive and historically determined reduction of knowledge to fully contingent status (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Impossibility of Emergent Works’ Protection in U.S. and EU Copyright Law.Matt Blaszczyk - 2023 - North Carolina Journal of Law and Technology 25 (1):1-55.
    Protection of emergent works is impossible. Without an author, there is no expression of ideas which can be original, and thus no copyrightable work. Indeed, the whole system of copyright law, its conceptual building blocks of idea-expression dichotomy, originality, authorship, and the concept of a protectable work operate in the notation of human creativity. Emergent works fall outside of copyright’s positive ontology, being akin to ideas, facts, or subject-matter predicated by technical considerations, rather than authorial creativity. In other words, they (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. De la protection de la nature au développement durable : Genèse d'un oxymore éthique et politique.Donato Bergandi & Patrick Blandin - 2012 - Revue d'Histoire des Sciences 65 (1):103-142.
    Le concept de développement durable s’enracine dans l’histoire des mouvements de préservation de la nature et de conservation des ressources naturelles et de leurs relations avec les sciences de la nature, en particulier l’écologie. En tant que paradigme sociétal, à la fois écologique, politique et économique, il se présente comme un projet politique idéal applicable à l’ensemble des sociétés, qui prétend dépasser l’opposition entre ces deux visions profondément divergentes des relations homme‑nature. L’analyse des textes internationaux pertinents permet de dégager les (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Problems of school management and students' academic performance in secondary schools in Calabar education zone, Cross River State, Nigeria.Valentine Joseph Owan, Blessing Iheoma Nwannunu & Esther Chijioke Madukwe - 2018 - International Journal of Research and Innovation in Social Science (IJRISS) 2 (10):120-127.
    This study investigated problems of school management and secondary school students' academic performance in Calabar Education Zone of Cross River State. Two null hypotheses were formulated to guide the study. The study adopted an ex-post facto research design. Proportionate stratified sampling technique was employed in selecting a sample of 3616 students out of the population of 18, 078 students. "Problems of School Management Questionnaire (PSMQ)," and Senior Secondary Mathematics Achievement Test (SSMAT) were the instruments designed by the researcher, were (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. Actualized and protected descriptivism: an answer to Celia Teixeira / Descritivismo atualizado e protegido: uma resposta à Célia Teixeira.Rodrigo Cid - 2010 - Revista Aproximação 2:9-ss.
    It was argued by Célia Teixeira (2003) that the actualized descriptivist theory of names have the problem of generating undesired epistemic necessities. In this paper I want to argue for a descriptivis theory that does not suffer from such problem. For this I will explain Teixeira's objections and later present my own conception of an actualized descriptivist theory of names; it is, protected against the problem of undesired necessities.
    Download  
     
    Export citation  
     
    Bookmark  
  49. In the Neutral Zone, A Libertarian's Home Is Their Castle.M. Blake Wilson - 2017 - In Bruce Krajewski & Joshua Heter (eds.), The Man In The High Castle And Philosophy: Subversive Reports from another Reality. Open Court. pp. 47-58.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 968