Results for 'threats'

989 found
Order:
  1. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant threat (...)
    Download  
     
    Export citation  
     
    Bookmark   67 citations  
  2. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent (...) (APTs), Automated Threat Response and Artificial Intelligence. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  3. Is that a Threat?Henry Ian Schiller - 2021 - Erkenntnis 86 (5):1161-1183.
    I introduce game-theoretic models for threats to the discussion of threats in speech act theory. I first distinguish three categories of verbal threats: conditional threats, categorical threats, and covert threats. I establish that all categories of threats can be characterized in terms of an underlying conditional structure. I argue that the aim—or illocutionary point—of a threat is to change the conditions under which an agent makes decisions in a game. Threats are moves (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4. The Threat from Manipulation Arguments.Benjamin Matheson - 2018 - American Philosophical Quarterly 55 (1):37-50.
    Most seem to presume that what is threatening about manipulation arguments is the ‘no difference’ premise – that is, the claim that there are no responsibility-relevant differences between a manipulated agent and her merely causally determined counterpart. This presumption underlies three recent replies to manipulation arguments from Kearns (2012), King (2013), and Schlosser (2015). But these replies fail to appreciate the true threat from manipulation arguments – namely, the manipulation cases that are allegedly counterexamples to the leading compatibilist conditions on (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Advanced Threat Detection Using AI-Driven Anomaly Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. IMPLICIT BIAS, STEREOTYPE THREAT, AND POLITICAL CORRECTNESS IN PHILOSOPHY.Sean Allen-Hermanson - 2017 - Philosophies 2 (2).
    This paper offers an unorthodox appraisal of empirical research bearing on the question of the low representation of women in philosophy. It contends that fashionable views in the profession concerning implicit bias and stereotype threat are weakly supported, that philosophers often fail to report the empirical work responsibly, and that the standards for evidence are set very low—so long as you take a certain viewpoint.
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Fallaciousness of Threats: Character and Ad Baculum .F. Macagno & D. Walton - 2007 - Argumentation 28 (3):203-228.
    Robert Kimball, in “What’s Wrong with Argumentum Ad Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  8. Standard Threats: How to Violate Basic Human Rights.Anthony R. Reeves - 2015 - Social Theory and Practice 41 (3):403-434.
    The paper addresses the nature of duties grounded in human rights. Rather than being protections against harm, per se, I contend that human rights largely shield against risk impositions to protected interests. “Risk imposition” is a normative idea requiring explication, but understanding dutiful action in its terms enables human rights to provide prospective policy guidance, hold institutions accountable, operate in non-ideal circumstances, embody impartiality among persons, and define the moral status of agencies in international relations. Slightly differently, I indicate a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Emerging viral threats and the simultaneity of the non-simultaneous: zooming out in times of Corona.Hub Zwart - 2020 - Medicine, Health Care and Philosophy 23 (4):589-602.
    This paper addresses global bioethical challenges entailed in emerging viral diseases, focussing on their socio-cultural dimension and seeing them as symptomatic of the current era of globalisation. Emerging viral threats exemplify the extent to which humans evolved into a global species, with a pervasive and irreversible impact on the planetary ecosystem. To effectively address these disruptive threats, an attitude of preparedness seems called for, not only on the viroscientific, but also on bioethical, regulatory and governance levels. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  36
    The Threat of Nuclear War Without Population Regulation.Angelito Malicse - manuscript
    The Threat of Nuclear War Without Population Regulation -/- Introduction -/- The risk of nuclear war is one of the most pressing concerns of modern civilization. While many factors contribute to this threat—geopolitical rivalries, economic inequalities, and military expansion—one of the most overlooked yet critical factors is overpopulation. Without proper population regulation, resource scarcity, social unrest, and international conflicts may escalate to the point where nuclear war becomes not just possible, but inevitable. This essay explores how overpopulation intensifies global tensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Threat of COVID-19 and Job Insecurity Impact on Depression and Anxiety: An Empirical Study in the USA.Obrenovic Bojan, Jianguo Du, Danijela Godinić, Mohammed Majdy M. Baslom & Diana Tsoy - 2021 - Frontiers in Psychology 12:648572.
    In this study, we conceptualized a framework capturing recurring troublesome elements of mental states such as depression and general anxiety, assessing them by applying standard clinical inventory. The study explores the extent to which danger control and fear control under the Extended Parallel Processing Model (EPPM) threat impact job insecurity, with uncertainty phenomenon causing afflicting effect on the experiential nature of depression heightened by anxiety. With the aim to explore the job insecurity relationship with anxiety and depression, and measure the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Threats, Coercion, and Willingness to Damn: Three More Objections against the Unpopulated Hell View.Alex R. Gillham - 2020 - Forum Philosophicum: International Journal for Philosophy 25 (2):235-254.
    In this paper, I develop and evaluate three new objections to the Unpopulated Hell View (UHV). First, I consider whether UHV is false because it presupposes that God makes threats, which a perfect being would not do. Second, I evaluate the argument that UHV is false because it entails that God coerces us and therefore limits our freedom to an objectionable degree. Third, I consider whether UHV is false because it implies that God is willing to damn some individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  80
    Threat Zone of An Explosion Particularly in Oil and Gas Industries or Refineries.Sahoo Prasantha Kumar - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-10.
    The project aims to address the critical need for a robust explosion risk assessment tool in the oil and gas industry, particularly in oil and gas refinery environments where safety is paramount. Traditional methods of threat assessment are often manual, subjective, and limited in their capacity to provide real-time insights, which poses significant challenges for industry professionals in managing potential hazards. Our project leverages real-time weather data and machine learning algorithms to develop an advanced web application designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Mental Action and the Threat of Automaticity.Wayne Wu - 2013 - In Andy Clark, Julian Kiverstein & Tillmann Vierkant, Decomposing the Will. , US: Oxford University Press USA. pp. 244-61.
    This paper considers the connection between automaticity, control and agency. Indeed, recent philosophical and psychological works play up the incompatibility of automaticity and agency. Specifically, there is a threat of automaticity, for automaticity eliminates agency. Such conclusions stem from a tension between two thoughts: that automaticity pervades agency and yet automaticity rules out control. I provide an analysis of the notions of automaticity and control that maintains a simple connection: automaticity entails the absence of control. An appropriate analysis, however, shows (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  15. Threat Forecasting - Machine Learning Applications in Next-Generation Identity Protection.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4769-4776.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Killing Minimally Responsible Threats.Saba Bazargan - 2014 - Ethics 125 (1):114-136.
    Minimal responsibility threateners are epistemically justified but mistaken in thinking that imposing a nonnegligible risk on others is permissible. On standard accounts, an MRT forfeits her right not to be defensively killed. I propose an alternative account: an MRT is liable only to the degree of harm equivalent to what she risks causing multiplied by her degree of responsibility. Harm imposed on the MRT above that amount is justified as a lesser evil, relative to allowing the MRT to kill her (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  17. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, case (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  18. Doing and allowing, threats and sequences.Fiona Woollard - 2008 - Pacific Philosophical Quarterly 89 (2):261–277.
    The distinction between doing and allowing appears to have moral significance, but the very nature of the distinction is as yet unclear. Philippa Foot's ‘pre-existing threats’ account of the doing/allowing distinction is highly influential. According to the best version of Foot's account an agent brings about an outcome if and only if his behaviour is part of the sequence leading to that outcome. When understood in this way, Foot's account escapes objections by Warren Quinn and Jonathan Bennett. However, more (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  19. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  20. Epistemic selectivity, historical threats, and the non-epistemic tenets of scientific realism.Timothy D. Lyons - 2017 - Synthese 194 (9):3203-3219.
    The scientific realism debate has now reached an entirely new level of sophistication. Faced with increasingly focused challenges, epistemic scientific realists have appropriately revised their basic meta-hypothesis that successful scientific theories are approximately true: they have emphasized criteria that render realism far more selective and, so, plausible. As a framework for discussion, I use what I take to be the most influential current variant of selective epistemic realism, deployment realism. Toward the identification of new case studies that challenge this form (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  21. Climate Change and the Threat of Disaster: The Moral Case for Taking Out Insurance at Our Grandchildren's Expense.Matthew Rendall - 2011 - Political Studies 59 (4):884-99.
    Is drastic action against global warming essential to avoid impoverishing our descendants? Or does it mean robbing the poor to give to the rich? We do not yet know. Yet most of us can agree on the importance of minimising expected deprivation. Because of the vast number of future generations, if there is any significant risk of catastrophe, this implies drastic and expensive carbon abatement unless we discount the future. I argue that we should not discount. Instead, the rich countries (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  22. AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities.Tripathi Praveen - 2024 - International Journal of Computer Trends and Technology 72 (8):26-32.
    In 2024, the intersection of artificial intelligence (AI) and cybersecurity presents both unprecedented challenges and significant opportunities. This article explores the evolving landscape of AI-driven cyber threats, the advancements in AI-enabled security measures, and the strategic responses required to navigate these new realities. Leveraging statistics, trends, and expert insights, we delve into how organizations can enhance their cybersecurity posture in the face of sophisticated AI threats.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  23. Defusing Existential and Universal Threats to Compatibilism: A Strawsonian Dilemma for Manipulation Arguments.Andrew J. Latham & Hannah Tierney - 2022 - Journal of Philosophy 119 (3):144-161.
    Many manipulation arguments against compatibilism rely on the claim that manipulation is relevantly similar to determinism. But we argue that manipulation is nothing like determinism in one relevant respect. Determinism is a "universal" phenomenon: its scope includes every feature of the universe. But manipulation arguments feature cases where an agent is the only manipulated individual in her universe. Call manipulation whose scope includes at least one but not all agents "existential manipulation." Our responsibility practices are impacted in different ways by (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  24. (1 other version)The threat of thinking things into existence.Kathrin Koslicki - 2020 - In Luis R. G. Oliveira & Kevin Corcoran, Common Sense Metaphysics: Essays in Honor of Lynne Rudder Baker. New York, NY: Routledge. pp. 113-136.
    According to the account of artifacts developed by Lynne Rudder Baker, artifacts have a certain “proper function” essentially. The proper function of an artifact is the purpose or use intended for the artifact by its “author(s)”, viz., the artifact’s designer(s) and/or producer(s). Baker’s account therefore traces the essences of artifacts back indirectly to the intentions of an artifact’s original author (e.g., its inventor, maker, producer or designer). Like other “author-intention-based” accounts (e.g., those defended by Amie Thomasson, Simon Evnine, and others), (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. The Threats of Land Resources Management Due to Increasing Rapid Population Growth in Zanzibar.Muhamad Hamdu Haji - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (4):1-7.
    Abstract: This paper talks about the threats of land Resources management due to the problem of rapid increase of population growth in Zanzibar Island. Actual there are many threats that are investigated and proved by this study. The land environmental degradation, cutting down the forest for formation of charcoal as their income sources as well as drilling the minerals includes sand and stone are the ones of the threats of land resources management due to the highly increasing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  23
    Top 10 Cloud Security Threats and How to Mitigate Them.Akhila Sahiti Racherla Yogesh Bavale - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):851-853.
    As organizations migrate to the cloud, they face a growing number of cybersecurity threats that pose significant risks to their data, applications, and overall IT infrastructure. This paper highlights the top 10 cloud security threats that enterprises must be aware of, including data breaches, misconfigurations, account hijacking, and insider threats. In addition, we explore the best practices and mitigation strategies to minimize these risks, such as encryption, multi-factor authentication, regular audits, and adopting a Zero Trust architecture. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Dimensions of the Threat to the Self Posed by Deep Brain Stimulation: Personal Identity, Authenticity, and Autonomy.Przemysław Zawadzki - 2020 - Diametros 18 (69):71-98.
    Deep Brain Stimulation (DBS) is an invasive therapeutic method involving the implantation of electrodes and the electrical stimulation of specific areas of the brain to modulate their activity. DBS brings therapeutic benefits, but can also have adverse side effects. Recently, neuroethicists have recognized that DBS poses a threat to the very fabric of human existence, namely, to the selves of patients. This article provides a review of the neuroethical literature examining this issue, and identifies the crucial dimensions related to the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Autonomous agency and the threat of social psychology.Eddy Nahmias - 2007 - In M. Marraffa, M. Caro & F. Ferretti, Cartographies of the Mind: Philosophy and Psychology in Intersection. Springer.
    This chapter discusses how research in situationist social psychology may pose largely undiscussed threats to autonomous agency, free will, and moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  29. Moral grandstanding as a threat to free expression.Justin Tosi & Brandon Warmke - 2020 - Social Philosophy and Policy 37 (2):170-189.
    Moral grandstanding, or the use of moral talk for self-promotion, is a threat to free expression. When grandstanding is introduced in a public forum, several ideals of free expression are less likely to be realized. Popular views are less likely to be challenged, people are less free to entertain heterodox ideas, and the cost of changing one’s mind goes up.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Sentientism Still Under Threat: Reply to Dung.François Kammerer - 2024 - Journal of Consciousness Studies 31 (3):103-119.
    In 'Ethics Without Sentience: Facing Up to the Probable Insignificance of Phenomenal Consciousness' (Kammerer, 2022), I argued that phenomenal consciousness is probably normatively insignificant, and does not play a significant normative role. In 'Preserving the Normative Significance of Sentience' (Dung, 2024), Leonard Dung challenges my reasoning and defends sentientism about value and moral status against my arguments. Here I respond to Dung's criticism, pointing out three flaws in his reply. My conclusion is that the view that phenomenal consciousness is distinctively (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  31
    Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  44
    Adaptive Interventions Reducing Social Identity Threat to Increase Equity in Higher Distance Education: A Use Case and Ethical Considerations on Algorithmic Fairness.Laura Froehlich & Sebastian Weydner-Volkmann - 2024 - Journal of Learning Analytics 11 (2):112-122.
    Educational disparities between traditional and non-traditional student groups in higher distance education can potentially be reduced by alleviating social identity threat and strengthening students’ sense of belonging in the academic context. We present a use case of how Learning Analytics and Machine Learning can be applied to develop and implement an algorithm to classify students as at-risk of experiencing social identity threat. These students would be presented with an intervention fostering a sense of belonging. We systematically analyze the intervention’s intended (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Knowledge Under Threat.Tomas Bogardus - 2014 - Philosophy and Phenomenological Research 88 (2):289-313.
    Many contemporary epistemologists hold that a subject S’s true belief that p counts as knowledge only if S’s belief that p is also, in some important sense, safe. I describe accounts of this safety condition from John Hawthorne, Duncan Pritchard, and Ernest Sosa. There have been three counterexamples to safety proposed in the recent literature, from Comesaña, Neta and Rohrbaugh, and Kelp. I explain why all three proposals fail: each moves fallaciously from the fact that S was at epistemic risk (...)
    Download  
     
    Export citation  
     
    Bookmark   77 citations  
  34. AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  35. Peers and Performance: How In-Group and Out-Group Comparisons Moderate Stereotype Threat Effects.Keith Markman & Ronald Elizaga - 2008 - Current Psychology 27:290-300.
    The present study examined how exposure to the performance of in-group and out-group members can both exacerbate and minimize the negative effects of stereotype threat. Female participants learned that they would be taking a math test that was either diagnostic or nondiagnostic of their math ability. Prior to taking the test, participants interacted with either an in-group peer (a female college student) or an out-group peer (a male college student) who had just taken the test and learned that the student (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  59
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  79
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Neuroscientific threats to free will.Joshua Shepherd - 2016 - In Kevin Timpe, Meghan Griffith & Neil Levy, Routledge Companion to Free Will. New York: Routledge.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair, Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Cognitive Enhancement and the Threat of Inequality.Walter Veit - 2018 - Journal of Cognitive Enhancement 2 (4):1-7.
    As scientific progress approaches the point where significant human enhancements could become reality, debates arise whether such technologies should be made available. This paper evaluates the widespread concern that human enhancements will inevitably accentuate existing inequality and analyzes whether prohibition is the optimal public policy to avoid this outcome. Beyond these empirical questions, this paper considers whether the inequality objection is a sound argument against the set of enhancements most threatening to equality, i.e., cognitive enhancements. In doing so, I shall (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  41. The Fallaciousness of Threats: Character and Ad Baculum.Fabrizio Macagno & Douglas Walton - 2007 - Argumentation 21 (1):63-81.
    Robert Kimball, in “What’s Wrong with ArgumentumAd Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark  
  42.  29
    Invisible Threats: Tools for Detecting Environmental Pollutants in Farm Animals.Sẻ Đồng - 2025 - The Bird Village.
    Everyday, meat, milk, eggs, and fish serve as vital components of our diet. Yet, hidden within these familiar foods may reside chemical contaminants that threaten human health. In their recent review, Mi and Lin [2] explore how cutting-edge science—specifically, physiologically based pharmacokinetic (PBPK) modeling—is helping to unravel and manage these hidden risks. PBPK is a computational modeling and simulation tool that integrates physiological and chemicalspecific parameters to predict the absorption, distribution, metabolism, and excretion of substances in human and animal bodies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Justifying Defense Against Non-Responsible Threats and Justified Aggressors: the Liability vs. the Rights-Infringement Account.Uwe Steinhoff - 2016 - Philosophia 44 (1):247-265.
    Even among those who find lethal defense against non-responsible threats, innocent aggressors, or justified aggressors justified even in one to one cases, there is a debate as to what the best explanation of this permissibility is. The contenders in this debate are the liability account, which holds that the non-responsible or justified human targets of the defensive measures are liable to attack, and the justified infringement account, which claims that the targets retain their right not to be attacked but (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Gene Editing, the Mystic Threat to Human Dignity.Vera Lúcia Raposo - 2019 - Journal of Bioethical Inquiry 16 (2):249-257.
    Many arguments have been made against gene editing. This paper addresses the commonly invoked argument that gene editing violates human dignity and is ultimately a subversion of human nature. There are several drawbacks to this argument. Above all, the concept of what human dignity means is unclear. It is not possible to condemn a practice that violates human dignity if we do not know exactly what is being violated. The argument’s entire reasoning is thus undermined. Analyses of the arguments involved (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  46. Meaning under the Threat of Paradox on Two Fronts.Olga Ramirez Calle - 2020 - Analiza I Egzystencja 50:5-17.
    The paper defends the argument that the Resemblance Paradox (RP), or the problem of the ‘under-determination of meaning’, and the Rule-Following Paradox (RFP) are two sides of the same paradox threatening meaning from opposite extremes. After presenting the case, the paradox is reconsidered anew and the supposition that the threat is a pervasive one is challenged.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. The Site of Initiative. Towards a Hermeneutic Framework for Analysing the Imagination of Future Threats [On Paul Ricoeur].Martijn Boven - 2015 - In Susana Araújo, Sandra Bettencourt & Marta Pacheco Pinto, Fear and Fantasy in a Global World. Boston: Brill Rodopi. pp. 101-121.
    This article develops a hermeneutic framework for analyzing the representation of imminent future threats. The framework will be derived from the later works of Paul Ricoeur, in which he employs the concept of 'imagination' rather than 'fantasy' (both originating from the Greek term phantasia). Ricoeur posits the significance of what shall be referred to as 'the site of initiative'. It is within this site of initiative that two types of events converge: events that happen to us and events that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham, Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. An Idle Threat: Epiphenomenalism Exposed.Paul Raymont - 1999 - Dissertation, University of Toronto
    In this doctoral dissertation I consider, and reject, the claim that recent varieties of non-reductive physicalism, particularly Donald Davidson's anomalous monism, are committed to a new kind of epiphenomenalism. Non-reductive physicalists identify each mental event with a physical event, and are thus entitled to the belief that mental events are causes, since the physical events with which they are held to be identical are causes. However, Jaegwon Kim, Ernest Sosa and others have argued that if we follow the non-reductive physicalist (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Rebellious youth and ineffective advice: A study of Vietnamese adolescents’ capability to deal with digital threats.Quan-Hoang Vuong, Quang-Loc Nguyen, Trung Tran, Hoang Phuoc-Hien Le, Viet-Phuong La, Tam-Tri Le & Minh-Hoang Nguyen - manuscript
    The digital era brings various benefits to adolescents. However, operating on the digital environment without sufficient knowledge and skills will expose them to multiple types of risks, especially in the country with low digital safety education rate like Vietnam. The current study examines factors that can contribute to cultivating adolescents’ digital resilience using the information-processing reasoning of the Mindsponge Theory. A UNESCO dataset of 1061 Vietnamese high school students was analyzed using the Bayesian Mindsponge Framework analytics. It is found that (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 989