Results for 'public security'

969 found
Order:
  1. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Institutional variables and the supervision of security in public secondary schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  3. How to Not Secure Public Trust in Science: Representative Values v. Polarization and Marginalization.Soazig Le Bihan - 2023 - Philosophy of Science (Online First):pp. 1 - 16.
    The demise of the value-free ideal constitutes a threat to public trust in science. One proposal is that whenever making value judgments, scientists rely only on democratic values. Since the influence of democratic values on scientific claims and recommendations is legitimate, public trust in science is warranted. I challenge this proposal. Appealing to democratic values will not suffice to secure trust because of at least two obstacles: polarization and marginalization.
    Download  
     
    Export citation  
     
    Bookmark  
  4.  83
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Public interest in health data research: laying out the conceptual groundwork.Angela Ballantyne & G. Owen Schaefer - 2020 - Journal of Medical Ethics 46 (9):610-616.
    The future of health research will be characterised by three continuing trends: rising demand for health data; increasing impracticability of obtaining specific consent for secondary research; and decreasing capacity to effectively anonymise data. In this context, governments, clinicians and the research community must demonstrate that they can be responsible stewards of health data. IRBs and RECs sit at heart of this process because in many jurisdictions they have the capacity to grant consent waivers when research is judged to be of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Deepfakes, Public Announcements, and Political Mobilization.Megan Hyska - forthcoming - In Tamar Szabó Gendler, John Hawthorne, Julianne Chung & Alex Worsnip (eds.), Oxford Studies in Epistemology, Vol. 8. Oxford University Press.
    This paper takes up the question of how videographic public announcements (VPAs)---i.e. videos that a wide swath of the public sees and knows that everyone else can see too--- have functioned to mobilize people politically, and how the presence of deepfakes in our information environment stands to change the dynamics of this mobilization. Existing work by Regina Rini, Don Fallis and others has focused on the ways that deepfakes might interrupt our acquisition of first-order knowledge through videos. But (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Effectiveness of Public Distribution System in Jammu & Kashmir.Ramandeep Kour - 2014 - SOCRATES 2 (JUNE 2014):166-178.
    Effectiveness of Public Distribution System in Jammu & Kashmir -/- Author / Authors :Ms. Ramandeep Kour Page no.166-178 Discipline : Applied Economics/ Management/ Commerce Script/language : Roman/English Category : Research paper Key words: PDS (Public Distribution System), Fair Price Shop, Social Security, Essential Commodities.
    Download  
     
    Export citation  
     
    Bookmark  
  14.  31
    On Public Teachers’ Intention to Stay in the Profession and its Profile Determinants.Leomarich Casinillo, Jessica Cortes, Analita Salabao & Melbert Hungo - 2024 - Jpi (Jurnal Pendidikan Indonesia) 13 (2):210-218.
    Teachers are considered committed to their job if they remain in their profession and accept professional responsibilities. This article aimed to investigate the public teachers' willingness to remain in their jobs and identify some determinants that causally affect it. The study employed a developed research instrument based on an existing research paper in the literature to gather primary data from cross-sectional public teachers. This study used random sampling to select the required participants of the survey and utilized appropriate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Motivational Strategies and Security Service Delive ry in Universities in Cross River State, Nigeria.Comfort Robert Etor & Michael Ekpenyong Asuquo - 2021 - International Journal of Educational Administrati on, Planning, and Research 13 (1):55-65.
    This study assessed two motivational strategies and their respective ties to the service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study. The entire population of 440 security personnel in two public universities was studied, based on the census approach and following the ex-post facto research design. Three sets of expert-validated questionnaires, with Cronbach reliability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. How Propaganda Became Public Relations: Foucault and the Corporate Government of the Public.Cory Wimberly - 2019 - New York, NY, USA: Routledge.
    How Propaganda Became Public Relations pulls back the curtain on propaganda: how it was born, how it works, and how it has masked the bulk of its operations by rebranding itself as public relations. Cory Wimberly uses archival materials and wide variety of sources — Foucault’s work on governmentality, political economy, liberalism, mass psychology, and history — to mount a genealogical challenge to two commonplaces about propaganda. First, modern propaganda did not originate in the state and was never (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Epidemics and food security: the duties of local and international communities.Angela K. Martin - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 408-413.
    Over 60% of all epidemics have a zoonotic origin, that is, they result from the transmission of infectious diseases from animals to humans. The spill-over of diseases often happens because humans exploit and use animals. In this article, I outline the four most common interfaces that favour the emergence and spread of zoonotic infectious diseases: wildlife hunting, small-scale farming, industrialised farming practices and live animal markets. I analyse which practices serve human food security – and thus have a non-trivial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Trust as a Public Virtue.Warren Von Eschenbach (ed.) - 2019 - London and New York:
    Western societies are experiencing a crisis of trust: we no longer enjoy high levels of confidence in social institutions and are increasingly skeptical of those holding positions of authority. The crisis of trust, however, seems paradoxical: at the same time we report greater feelings of mistrust or an erosion of trust in institutions and technologies we increasingly entrust our wellbeing and security to these very same technologies and institutions. Analyzing trust not only will help resolve the paradox but suggests (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  56
    Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual rights and privacy. This method involves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Artificial intelligence as a public service: learning from Amsterdam and Helsinki.Luciano Floridi - 2020 - Philosophy and Technology 33 (4):541–⁠546.
    In September 2020, Helsinki and Amsterdam announced the launch of their open AI registers—the first cities in the world to offer such a service. The AI registers describe what, where, and how AI applications are being used in the two municipalities; how algorithms were assessed for potential bias or risks; and how humans use the AI services. Examining issues of security and transparency, this paper discusses the potential for implementing AI in an urban public service setting and how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Prospects for sustainable development and ensuring the security of economic systems in the new geostrategic realities.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring sustainable development and security of economic systems in the new geostrategic realities requires the use of mechanisms for state protection of national economic interests, innovative outsourcing and digital technologies, and environmental protection. Basic research focuses on assessment the economic security of insurance companies, logistics processes, farms, healthcare organisations, retail and e-commerce, and tourist destinations. The research results have been implemented in the different decision-making models in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Effects of Fake News on Consumers’ Brand Trust: An Exploratory Study in the Food Security Context.Farte Gheorghe-Ilie & Obadă Rareș - 2021 - Romanian Journal of Communication and Public Relations 23 (3):47-61.
    The aim of this study is to explore the effects of fake news on consumers’ brand trust in the food security context. The starting point of our research is the finding that issues related to food security cannot be addressed without the contribution of multinational food corporations. The efficiency of their intervention depends on their capacity to build and preserve their brand trust despite the multifarious fake news stories that contaminate the information flow. Is brand trust sensitive to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Editorial: Coronavirus Disease (COVID-19): Socio-Economic Systems in the Post-Pandemic World: Design Thinking, Strategic Planning, Management, and Public Policy.Andrzej Klimczuk, Eva Berde, Delali Dovie, Magdalena Klimczuk-Kochańska & Gabriella Spinelli - 2022 - Frontiers in Communication 7:1–5.
    The declaration of the COVID-19 pandemic by the World Health Organization on March 11, 2020, led to unprecedented events. All regions of the world participated in implementing preventive health measures such as physical distancing, travel restrictions, self-isolation, quarantines, and facility closures. The pandemic started global disruption of socio-economic systems, covering the postponement or cancellation of public events, supply shortages, schools and universities’ closure, evacuation of foreign citizens, a rise in unemployment and inflation, misinformation, the anti-vaccine movement, and incidents of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Justice after Catastrophe: Responsibility and Security.Makoto Usami - 2015 - Ritsumeikan Studies in Language and Culture 26 (4):215-230.
    The issue of justice after catastrophe is an enormous challenge to contemporary theories of distributive justice. In the past three decades, the controversy over distributive justice has centered on the ideal of equality. One of intensely debated issues concerns what is often called the “equality of what,” on which there are three primary views: welfarism, resourcism, and the capabilities approach. Another major point of dispute can be termed the “equality or another,” about which three positions debate: egalitarianism, prioritarianism, and sufficientarianism. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  81
    “Giving something back”: a systematic review and ethical enquiry into public views on the use of patient data for research in the United Kingdom and the Republic of Ireland.Jessica Stockdale, Jackie Cassell & Elizabeth Ford - 2019 - Wellcome Open Research 3 (6).
    Background: Use of patients’ medical data for secondary purposes such as health research, audit, and service planning is well established in the UK. However, the governance environment, as well as public understanding about this work, have lagged behind. We aimed to systematically review the literature on UK and Irish public views of patient data used in research, critically analysing such views though an established biomedical ethics framework, to draw out potential strategies for future good practice guidance and inform (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Web-based School Information and Publication System: A Developmental Study.Kevin Caratiquit - 2021 - Global Education and Social Sciences Journal 1 (3):45-55.
    The study aimed to promote the school online, provide timely, engaging, and current information of the school to employees, learners, parents, and community, share updates of school activities online, supply downloadable instructional materials and resources for both employees and students. Also, it evaluated the assessment of teaching and non-teaching staff, learners, parents and IT specialists to the ISO 25010:2011 software quality standards of the developed Web-based School Information and Publication System along functional and suitability, maintainability, usability, security, reliability, performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Going Back to Normal: A Phenomenological Study on the Challenges and Coping Mechanisms of Junior High School Teachers in the Full Implementation of In-Person Classes in the Public Secondary Schools in the Division of Rizal.Jarom Anero & Eloisa Tamayo - 2023 - Psychology and Education: A Multidisciplinary Journal 12:767-808.
    The study focused on exploring and understanding the challenges junior high school teachers in the Division of Rizal faced during the full implementation of in-person classes and identifying the coping mechanisms they employed to adapt to this new educational landscape. Forty participants were purposefully selected from various public secondary school clusters in the division of Rizal. A qualitative phenomenological design was employed, and the information collected through Google Forms was imported into Microsoft Excel and Microsoft Word. After importing the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Transhumanism (dot) Mil: A Bibliometric Analysis of Technoprogressive Terms in Military Publications.Woody Evans - 2020 - Library Philosophy and Practice 1:1-10.
    Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Role of Urban Morphology Design on Enhancing Physical Activities and Public Health.Sadeq Fathi, Hassan Sajadzadeh, Faezeh Mohammadi Sheshkal, Farshid Aram, Gergo Pinter, Imre Felde & Amir Mosavi - manuscript
    Along with environmental pollutions, urban planning has been connected to public health. The research indicates that the quality of built environments plays an important role in reducing mental disorders and overall health. The structure and shape of the city are considered as one of the factors influencing happiness and health in urban communities and the type of the daily activities of citizens. The aim of this study was to promote physical activity in the main structure of the city via (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Parasitic Resilience: The Next Phase of Public Health Preparedness Must Address Disparities Between Communities.Jordan Pascoe & Mitch Stripling - 2023 - Health Securities 21 (6).
    Community resilience, a system’s ability to maintain its essential functions despite disturbance, is a cornerstone of public health preparedness. However, as currently practiced, community resilience generally focuses on defined neighborhood characteristics to describe factors such as vulnerability or social capital. This ignores the way that residents of some neighborhoods (as ‘essential workers’’) were required during the COVID-19 pandemic to sacrifice their wellbeing for the sake of others staying at home in more affluent neighborhoods. Using the global care chain theory, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. An Empirical Evaluation of Job Satisfaction in Private Sector and Public Sector Bank Employees.Prof Madhurima - 2014 - SOCRATES 2 (1):89-103.
    Job satisfaction cannot be defined by a single measurement alone. In fact, there is substantial evidence to support a relationship between satisfaction and performance of a job. For such a relationship there has been tremendous interest among managers and economists as it helps in increasing the quality as well as quantity of the production. However, some argue contrarily, that rather it is the performance that leads to satisfaction. Whatever be the direction of relationship, one thing is clear that productivity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Scrutinizing Landbank of the Philippines as a Depository Bank of the Barangays in Makati City: Input Towards Public Service.Romulo Navarra, Aristeo Razon, Roberto Tampil & Cynic Tenedero - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (4):74-84.
    This study deals primarily with the effectiveness of the Land Bank of Philippines as a Depository Bank of Makati Branch in specific organization and bank operations management. This paper provides baseline data in aid of policy formulation to enhance the bank operations management that offers new motivation towards a policy that effectively addresses and solves the bank operations management. This study used the quantitative descriptive method. Thirteen (13) bank personnel and 64 barangays elected chairman, including the appointed treasurer with direct (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Nightlife on New York Subway.Yang Immanuel Pachankis - manuscript
    The article reports on some societal observations conducted in 2019 on New York subways. With comparison to the subway management cases observed in Milan and mainland China, the article contends that the phenomenon in the New York public-funded transportation system reflects the spirit of equality in human with efficacy on the utility of the public-funded infrastructure. The message in the letter concludes that public & private fundings need to be drawn for the human development of the homeless (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Food Sovereignty, Health Sovereignty, and Self-Organized Community Viability.Ian Werkheiser - 2014 - Interdisciplinary Environmental Review 15 (2/3):134-146.
    Food Sovereignty is a vibrant discourse in academic and activist circles, yet despite the many shared characteristics between issues surrounding food and public health, the two are often analysed in separate frameworks and the insights from Food Sovereignty are not sufficiently brought to bear on the problems in the public health discourse. In this paper, I will introduce the concept of 'self-organised community viability' as a way to link food and health, and to argue that what I call (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  38. Epistemic ignorance, poverty and the COVID-19 pandemic.Cristian Timmermann - 2020 - Asian Bioethics Review 12 (4):519-527.
    In various responses to the COVID-19 pandemic, we can observe insufficient sensitivity towards the needs and circumstances of poorer citizens. Particularly in a context of high inequality, policy makers need to engage with the wider public in debates and consultations to gain better insights in the realities of the worst-off within their jurisdiction. When consultations involve members of traditionally underrepresented groups, these are not only more inclusive, which is in itself an ethical aim, but pool ideas and observations from (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. The perception movement economy of Ukraine to business/Igor Britchenko, Volodymyr Saienko//Списание «Икономически изследвания (Economic Studies)». – Институт за икономически изследвания при БАН, София (България). – № 4. – 2017. – P. 163 - 181. ISSN 02053292.Igor Britchenko & Volodymyr Saienko - 2017 - Списание «Икономически Изследвания (Economic Studies)» 4 (4):163 - 181.
    The article provides the analysis of the entrance into the innovative activity and organized regulation of interaction which is based on the scientific and technological changes, concentration of production and the feasibility study of administrative decisions, which are dominated by a conglomerate of technical, technological and engineering management decisions. The research formulates the provisions for the productive use of business as the form of economic relations which is based on the entrepreneur function. These provisions are formulated basing on the conditions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash (ed.), Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  91
    Consensus, Convergence, and Covid-19: The Role of Religion in Leaders’ Responses to Covid-19.Marilie Coetsee - 2023 - Leadership 13 (3):446-64.
    Focusing on current efforts to persuade the public to comply with Covid-19 best practices, this essay examines what role appeals to religious reasons should (or should not) play in leaders’ attempts to secure followers’ acceptance of group policies in contexts of religious and moral pluralism. While appeals to followers’ religious commitments can be helpful in promoting desirable public health outcomes, they also raise moral concerns when made in the contexts of secular institutions with religiously diverse participants. In these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Evaluating ICT utilization in education administration and management during the COVID-19 outbreak in Pakistan: An empirical review.Abdul Rahim Chandio - 2021 - Journal of Research in Instructional e-Issn: 2776-222X 1 (1):81 – 94.
    Abstract: This study aims to evaluate the utilization of ICT in education administration and management in a Pakistan context during the pandemic outbreak. Adoption of information and communication technologies (ICTs) has digitalized the learning process where education organizations were administrated by means of wireless-based instructions, electronic pedagogy, and online assessment in order to continue the educational activities while the government halted the physical appearance in education institutions. Data collection has been carried by three public universities in which teachers and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. May a Government Mandate More Comprehensive Health Insurance than Citizens Want for Themselves?Alex Voorhoeve - 2018 - In David Sobel, Peter Vallentyne & Steven Wall (eds.), Oxford Studies in Political Philosophy Volume 4. Oxford University Press. pp. 167-191.
    I critically examine a common liberal egalitarian view about the justification for, and proper content of, mandatory health insurance. This view holds that a mandate is justified because it is the best way to ensure that those in poor health gain health insurance on equitable terms. It also holds that a government should mandate what a representative prudent individual would purchase for themselves if they were placed in fair conditions of choice. I argue that this common justification for a mandate (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Reason's freedom and the dialectic of ordered liberty.Edward C. Lyons - 2007 - Cleveland State Law Review 55 (2):157-232.
    The project of “public reason” claims to offer an epistemological resolution to the civic dilemma created by the clash of incompatible options for the rational exercise of freedom adopted by citizens in a diverse community. The present Article proposes, via consideration of a contrast between two classical accounts of dialectical reasoning, that the employment of “public reason,” in substantive due process analysis, is unworkable in theory and contrary to more reflective Supreme Court precedent. Although logical commonalities might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  59
    Safety and Protection Practices in the Early Childhood Education Centres.Ibiwari Caroline Dike & Mkpoikanke Sunday Otu - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):294-305.
    A safe and secure environment is an essential part of the early childhood development of any child. This study aims to investigate the safety and protection practices of early childhood centers in the Anambra state, Nigeria, and to determine if any improvements can be made to them. This study analyzed data collected from 60 Early Childhood Care Centers (ECCE Centers) and 60 Pre-Primary Schools (Preprimary School) in Anambra State using the Evaluation of ECCE Implementation Kit (KEIEP), direct observation, and unstructured (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Military Intervention in Interstate Armed Conflicts.Cécile Fabre - 2023 - Social Philosophy and Policy 40 (2):431-454.
    Suppose that state A attacks state D without warrant. The ensuing military conflict threatens international peace and security. State D (I assume) has a justification for defending itself by means of military force. Do third parties have a justification for intervening in that conflict by such means? To international public lawyers, the well-rehearsed and obvious answer is “yes.” Threats to international peace and security provide one of two exceptions to the legal and moral prohibition (as set out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Strategies for Healthcare Disaster Management in the Context of Technology Innovation: the Case of Bulgaria.Radostin Vazov, R. Kanazireva, T. Grynko & Oleksandr P. Krupskyi - 2024 - Medicni Perspektivi 29 (2):215-228.
    In Bulgaria, integrating technology and innovation is crucial for advancing sustainable healthcare disaster management, enhancing disaster response and recovery, and minimizing long-term environmental and social impacts. The purpose of the study is to assess the impact of modern technological innovations on the effectiveness of disaster management in health care in Bulgaria with a focus on Health Information Systems (HIS), Telemedicine, Telehealth, e-Health, Electronic Health Records, Artificial Intelligence (AI), Public Communication Platforms, and Data Security and Privacy. These innovations, when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  65
    Knowledge-First Theories of Justification.Paul Silva Jr - 2024 - Internet Encyclopedia of Philosophy.
    Knowledge-first theories of justification are theories of justification that give knowledge priority when it comes to explaining when and why someone has justification for an attitude or an action. The emphasis of this article is on knowledge-first theories of justification for belief. As it turns out, there are a number of ways of giving knowledge priority when theorizing about justification, and what follows is a survey of more than a dozen existing options that have emerged in the early 21st century (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Understanding of Authorship by the Post Graduate Medical Students at a Center in Bangladesh.S. P. Lasker - 2021 - Bangladesh Journal of Bioethics 12 (1):25-34.
    Education on authorship was delivered and evaluated by pre test and post test questionnairen on 30 post graduate medical students at the Department of Anestheology, Dhaka Medical College, Bangladesh between January and June 2019 to understand the knowledge, skill and attitude of post graduate medical students on authorship. Result: Before intervention, majority (60%) of the students felt that who perform the research work should be the author of the article. But 40% students were divided and felt that who advised the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. The mindsponge and BMF analytics for innovative thinking in social sciences and humanities.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.) - 2022 - Berlin, Germany: De Gruyter.
    Academia is a competitive environment. Early Career Researchers (ECRs) are limited in experience and resources and especially need achievements to secure and expand their careers. To help with these issues, this book offers a new approach for conducting research using the combination of mindsponge innovative thinking and Bayesian analytics. This is not just another analytics book. 1. A new perspective on psychological processes: Mindsponge is a novel approach for examining the human mind’s information processing mechanism. This conceptual framework is used (...)
    Download  
     
    Export citation  
     
    Bookmark   93 citations  
1 — 50 / 969