Results for 'security'

680 found
Order:
  1. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  2. Energy Security Issues in Contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Robust Evidence and Secure Evidence Claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness (...)
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  4. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  53
    Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. New York, NY, USA: pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Food Security as a Global Public Good.Cristian Timmermann - 2018 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. London: Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Security and the Shaping of Identity for Nuclear Specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  9.  46
    Security Through Mutual Understanding and Co-Existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri (eds.), Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Trenton, New Jersey, USA: Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  11.  5
    Monitoring Peace and Security Mandates for Human Rights.Deepa Kansra - 2022 - Artha: The Sri Ram Economics Journal 1 (1):188-192.
    The jurisprudence under international human rights treaties has had a considerable impact across countries. Known for addressing complex agendas, the work of expert bodies under the treaties has been credited and relied upon for filling the gaps in the realization of several objectives, including the peace and security agenda. -/- In 1982, the Human Rights Committee (ICCPR), in a General Comment observed that “states have the supreme duty to prevent wars, acts of genocide and other acts of mass violence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  29
    Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  38
    Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  94
    Security, Local Community, and the Democratic Political Culture in Africa.Krzysztof Trzcinski - 2021 - In Adeshina Afolayan (ed.), Pathways to Alternative Epistemologies in Africa. Palgrave Macmillan. pp. 111-122.
    In this study, the idea of the local African community as a social structure ensuring the security of its members is presented. An understanding of the concept of security is first briefly discussed, followed by the meaning of the concept of the local African community. The chapter also makes an a priori distinction between what one can call “moderate” and “radical” types of communal life and two case studies exemplifying them are presented. The chapter aims to analyze the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. An Intelligent Tutoring System for Teaching Advanced Topics in Information Security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  16. Perpetual Anarchy : From Economic Security to Financial Insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  18. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Security and the 'War on Terror': A Roundtable.Julian Baggini, Alex Voorhoeve, Catherine Audard, Saladin Meckled-Garcia & Tony McWalter - 2007 - In Julian Baggini & Jeremy Strangroom (eds.), What More Philosophers Think. Continuum. pp. 19-32.
    What is the appropriate legal response to terrorist threats? This question is discussed by politician Tony McWalter, The Philosophers' Magazine editor Julian Baggini, and philosophers Catherine Audard, Saladin Meckled-Garcia, and Alex Voorhoeve.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Philosophy of Global Security.Vihren Bouzov - 2015 - In Ioan-Alexandru Tofan Mihai-Dan Chiţoiu (ed.), Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Global Security and Economic Asymmetry: A Comparison of Developed and Developing Countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. The Human Security Paradigm and Cosmopolitan Democracy.Andreea Iancu - 2014 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 1 (2): 167-174.
    This paper discusses the relation between the human security paradigm and the cosmopolitan democracy scenario as models for humanizing and changing the current international system and transforming it in a global security and development system centered on the individual rather than on the nation state. The main idea for which I argue is that the human security paradigm and the changes it determined in international relations (especially through the responsibility to protect principle) are compatible with the cosmopolitan (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Pehowa (Kurukshetra). pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  45
    Epidemics and Food Security: The Duties of Local and International Communities.Angela K. Martin - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen, Niederlande: Wageningen Academic Publishers. pp. 408-413.
    Over 60% of all epidemics have a zoonotic origin, that is, they result from the transmission of infectious diseases from animals to humans. The spill-over of diseases often happens because humans exploit and use animals. In this article, I outline the four most common interfaces that favour the emergence and spread of zoonotic infectious diseases: wildlife hunting, small-scale farming, industrialised farming practices and live animal markets. I analyse which practices serve human food security – and thus have a non-trivial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Matters of Trust as Matters of Attachment Security.Andrew Kirton - 2020 - International Journal of Philosophical Studies 28 (5):583-602.
    I argue for an account of the vulnerability of trust, as a product of our need for secure social attachments to individuals and to a group. This account seeks to explain why it is true that, when we trust or distrust someone, we are susceptible to being betrayed by them, rather than merely disappointed or frustrated in our goals. What we are concerned about in matters of trust is, at the basic level, whether we matter, in a non-instrumental way, to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  29. Evaluating Energy Security of the European Union and Overcoming Current Challenges.Bezpartochnyi Maksym, Igor Britchenko & Bezpartochna Olesia - 2021 - In Actual issues of modern development of socioeconomic systems in terms of the COVID-19 pandemic. pp. 419 – 441.
    The European Union (EU) has been experiencing an unprecedented energy crisis for the last 50 years, with severe economic, social and political consequences. Rising energy demand, extreme weather events (unprecedented heat and long winters), disruptions in supply chain and poor regional and global reserves have all contributed to the current energy crisis in the EU. Prices on natural gas in the EU are rising as demand around the world increases. Prices on the gas rose by more than 800 percent year-on-year (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Debunking Arguments: Mathematics, Logic, and Modal Security.Justin Clarke-Doane - forthcoming - In Robert Richards and Michael Ruse (ed.), The Cambridge Handbook of Evolutionary Ethics. Cambridge University Press.
    I discuss the structure of genealogical debunking arguments. I argue that they undermine our mathematical beliefs if they undermine our moral beliefs. The contrary appearance stems from a confusion of arithmetic truths with (first-order) logical truths, or from a confusion of reliability with justification. I conclude with a discussion of the cogency of debunking arguments, in light of the above. Their cogency depends on whether information can undermine all of our beliefs of a kind, F, without giving us direct reason (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. The UN Security Council, Normative Legitimacy and the Challenge of Specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human rights. Both of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Privacy, Democracy, and Security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Action-Directed Pragmatics Secures Semantically Autonomous Knowledge.Igal Kvart - manuscript
    In the past couple of decades, there were a few major attempts to establish the thesis of pragmatic infringement – that a significant pragmatic ingredient figures significantly in the truth-conditions for knowledge-ascriptions. As candidates, epistemic contextualism and Relativism flaunted conversational standards, and Stanley's SSI promoted stakes. These conceptions were propelled first and foremost by obviously pragmatic examples of knowledge ascriptions that seem to require a pragmatic component in the truth-conditions of knowledge ascriptions in order to be accounted for. However, if (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Democracy and Security.Annabelle Lever - 2016 - In Adam Moore (ed.), Privacy, Security, and Accountability: Ethics, Law, and Policy. rowman & littlefield.
    Download  
     
    Export citation  
     
    Bookmark  
  35.  49
    White Supremacy as an Existential Threat: A Response to Rita Floyd’s 'The Morality of Security: A Theory of Just Securitization'.Jessica Wolfendale - 2022 - European Journal of International Security 1:9-18.
    Rita Floyd’s "The Morality of Security: A Theory of Just Securitization" is an important and insightful book that delineates a theory of just securitization (modified from the jus ad bellum and jus in bello criteria in just war theory) involving three sets of principles governing the just initiation of securitization, just conduct of securitization, and just desecuritization. This book is a much-needed addition to the security studies and just war scholarship. -/- Here, I explore the potential of Floyd’s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Torture Pornopticon: (In)Security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  66
    The Concept of Security in Political Violence.Jessica Wolfendale - 2012 - In Marie Breen-Smyth (ed.), The Ashgate Research Companion to Political Violence. Abingdon, UK: Ashgate. pp. 99-118.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  38. TRANSPORT SECURITY AS A FACTOR OF TRANSPORT AND COMMUNICATION SYSTEM OF UKRAINE SELF-SUSTAINING DEVELOPMENT.Igor Britchenko & Tetiana Cherniavska - 2017 - Науковий Вісник Полісся 1 (9):16-24.
    In the present article, attention is focused on the existing potential to ensure national self-sufficiency, the main challenges to its achievement and future prospects. According to the authors, transportation and communication system of the country can become the dominant model for self-sufficient development, due to its geostrategic location which allows it to be an advantageous bridge for goods, and passengers transit transportation between the states of Europe, Asia and the Middle East. To date, the transport and communication system is hardly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  20
    ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Democracy and Security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-110.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  42.  13
    Research of the Intelligent Resource Security of the Nanoeconomic Development Innovation Paradigm.Tetiana Ostapenko, Igor Britchenko & Peter Lošonczi - 2021 - Baltic Journal of Economic Studies 7 (5):159-168.
    The resources and resource potential of the innovative component of nanoeconomics are analyzed. The factors of production – classical types of resources such as land, labor, capital and technology – are described. Ways of influencing the security resources of nanoeconomics within the innovation paradigm are evaluated. The purpose of the study is to identify the factor of nanoeconomics in the formation of resource security potential in the innovation paradigm. To achieve this goal, the following tasks were set: to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Misuse Made Plain: Evaluating Concerns About Neuroscience in National Security.Kelly Lowenberg, Brenda M. Simon, Amy Burns, Libby Greismann, Jennifer M. Halbleib, Govind Persad, David L. M. Preston, Harker Rhodes & Emily R. Murphy - 2010 - American Journal of Bioethics Neuroscience 1 (2):15-17.
    In this open peer commentary, we categorize the possible “neuroscience in national security” definitions of misuse of science and identify which, if any, are uniquely presented by advances in neuroscience. To define misuse, we first define what we would consider appropriate use: the application of reasonably safe and effective technology, based on valid and reliable scientific research, to serve a legitimate end. This definition presents distinct opportunities for assessing misuse: misuse is the application of invalid or unreliable science, or (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Institutional Variables and the Supervision of Security in Public Secondary Schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47.  8
    Motivational Strategies and Security Service Delive Ry in Universities in Cross River State, Nigeria.Comfort Robert Etor & Michael Ekpenyong Asuquo - 2021 - International Journal of Educational Administrati on, Planning, and Research 13 (1):55-65.
    This study assessed two motivational strategies and their respective ties to the service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study. The entire population of 440 security personnel in two public universities was studied, based on the census approach and following the ex-post facto research design. Three sets of expert-validated questionnaires, with Cronbach reliability estimates of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Internal Instability as a Security Challenge for Vietnam.Nguyen Hoang Tien, Nguyen Van Tien, Rewel Jimenez Santural Jose, Nguyen Minh Duc & Nguyen Minh Ngoc - 2020 - Journal of Southwest Jiaotong University 55 (4):1-13.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socio-economic and political system of any country, including Vietnam. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Vietnam’s Security Challenges: Priorities, Policy Implications and Prospects for Regional Cooperation.Tran Truong Thuy & Nguyen Minh Ngoc - 2013 - In The Fourth International Workshop on Asia-Pacific Security, Tokyo, Japan. Tokyo, Japan: NIDS Ministry of Defense, Japan. pp. 93-112.
    The historic end of the Cold War and the rising tide of globalization have significantly changed the nature of threats and security discourses in Asia. There is a notable shift of attention from military power as the core determinant of national security to several non-traditional sectors with a much enhanced role of economic, political, and societal forces. Non-traditional security issues—such as climate change, natural disasters, transnational crimes, and terrorism—require both policymakers and military strategists to deal with (...) threats in a more comprehensive manner. Increasing interdependence among states also magnifies the impacts of these threats, urging Asian countries to forge regional cooperation in multilateral forums such as ASEAN, EAS, APEC, and ARF. Though these efforts are commendable, their effectiveness in tackling such a wide canvass of threats is still open to question. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 680