Results for 'security'

989 found
Order:
  1. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  73
    Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - 2025 - Critical Review of International Social and Political Philosophy 28 (2):286-306.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Perceptually Secured Knowledge.Elijah Chudnoff - 2025 - In Ori Beck & Farid Masrour, The Relational View of Perception: New Philosophical Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  35
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  13. Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  76
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  16. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  18.  21
    AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  31
    SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by researchers, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  23. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei, Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Cloud Security Unlocked: Safeguarding the Digital Frontier.Godse Rahul Vishwakarma Prem, Sanjay Kumar - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (2):613-618.
    As businesses and individuals increasingly rely on cloud computing for a vast array of services, the need for robust cloud security becomes ever more critical. Cloud environments offer unparalleled flexibility, scalability, and cost-effectiveness but simultaneously introduce a complex security landscape that poses significant challenges. The importance of safeguarding data, applications, and systems from cyber threats in the cloud is paramount to maintaining the confidentiality, integrity, and availability of digital assets. This paper explores the evolving landscape of cloud (...), identifying the risks and vulnerabilities inherent in cloud computing and the key strategies and technologies used to mitigate them. We introduce a comprehensive framework for cloud security that incorporates encryption, access management, threat detection, and compliance adherence. Emerging technologies like Artificial Intelligence (AI), Machine Learning (ML), and blockchain are also discussed, showcasing their role in transforming cloud security practices. By analyzing best practices and future trends, this paper provides a roadmap for securing the digital frontier in an era increasingly defined by cloud computing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri, Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  33. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi, 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  24
    Application Security in the OSI Model: Protecting the Application Layer from Emerging Threats.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (5):8120-8126.
    The application layer of the Open Systems Interconnection (OSI) model plays a critical role in enabling end-user interaction with network services, making it a primary target for cybersecurity threats. This paper reviews contemporary research on securing the application layer, addressing emerging threats such as injection attacks, malware, phishing, and zero-day vulnerabilities. Key strategies, including secure development practices, application firewalls, cryptographic protocols, and user education, are explored to mitigate these risks. The challenges of an evolving threat landscape and resource constraints are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  54
    A Proficient Two Level Security Contrivances for Storing Data in Cloud.R. Sugumar K. Anbazhagan - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  38. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan, Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  31
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  42.  28
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Robust evidence and secure evidence claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  44. The Human Security Paradigm and Cosmopolitan Democracy.Andreea Iancu - 2014 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 1 (2): 167-174.
    This paper discusses the relation between the human security paradigm and the cosmopolitan democracy scenario as models for humanizing and changing the current international system and transforming it in a global security and development system centered on the individual rather than on the nation state. The main idea for which I argue is that the human security paradigm and the changes it determined in international relations (especially through the responsibility to protect principle) are compatible with the cosmopolitan (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Peter Sloterdijk and the ‘Security Architecture of Existence’: Immunity, Autochthony, and Ontological Nativism.Thomas Sutherland - 2019 - Theory, Culture and Society 36 (7-8):193-214.
    Centred on 'Foams', the third volume of his Spheres trilogy, this article questions the privilege granted by Peter Sloterdijk to motifs of inclusion and exclusion, contending that whilst his prioritization of dwelling as a central aspect of human existence provides a promising counterpoint to the dislocative and isolative effects of post-industrial capitalism, it is compromised by its dependence upon an anti-cosmopolitan outlook that views cultural distantiation as a natural and preferable state of human affairs, and valorizes a purported ontological (...) attained through defensive postures with respect to perceived foreigners or externalities. Sloterdijk’s conceptualization of culture as a kind of immune system, it is argued, although posited as a rebuke to models of essentialism and ethno-nationalism, provides ontological support to the xenophobic critiques of immigration that are today finding increasing currency. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  48. Security, Local Community, and the Democratic Political Culture in Africa.Krzysztof Trzcinski - 2021 - In Olajumoke Yacob-Haliso Adeshina Afolayan, Pathways to Alternative Epistemologies in Africa. Springer Verlag. pp. 111-122.
    In this study, the idea of the local African community as a social structure ensuring the security of its members is presented. An understanding of the concept of security is first briefly discussed, followed by the meaning of the concept of the local African community. The chapter also makes an a priori distinction between what one can call “moderate” and “radical” types of communal life and two case studies exemplifying them are presented. The chapter aims to analyze the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  12
    Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2022 - International Journal of Advanced Research in Education and Technology 9 (2):594-602.
    COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure that (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 989