Results for 'transport security'

976 found
Order:
  1. TRANSPORT SECURITY AS A FACTOR OF TRANSPORT AND COMMUNICATION SYSTEM OF UKRAINE SELF-SUSTAINING DEVELOPMENT.Igor Britchenko & Tetiana Cherniavska - 2017 - Науковий Вісник Полісся 1 (9):16-24.
    In the present article, attention is focused on the existing potential to ensure national self-sufficiency, the main challenges to its achievement and future prospects. According to the authors, transportation and communication system of the country can become the dominant model for self-sufficient development, due to its geostrategic location which allows it to be an advantageous bridge for goods, and passengers transit transportation between the states of Europe, Asia and the Middle East. To date, the transport and communication system is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. (1 other version)Neutrosophic Transport and Assignment Issues.Florentin Smarandache - 2023 - Infinite Study.
    We all know that problems of transportation and allocation appear frequently in practical life. We need to transfer materials from production centers to consumption centers to secure the areas’ need for the transported material or allocate machines or people to do a specific job at the lowest cost, or in the shortest time. We know that the cost factors Time is one of the most important factors that decision-makers care about because it plays an “important” role in many of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that the decline in its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Export logistics of agricultural products of Ukraine in the context of ensuring food security during martial law.Maksym Bezpartochnyi & Igor Britchenko - 2022 - In Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.), Current issues of security management during martial law. Vysoká škola bezpečnostného manažérstva v Košiciach. pp. 163-184.
    The study determined the dynamics of growing grain crops in Ukraine and the geography of their export. The problems of ensuring export logistics as a result of military aggression by russia in the context of ensuring food security are pointed out. The main directions of export logistics of grain crops from Ukraine and the peculiarities of transportation by railway, river and road transport were studied. The directions of diversification of export logistics of grain crops from Ukraine during martial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Areas and Means of Formation of Transport Regional Complexes and Mechanisms for Managing their Competitiveness in Ukraine.Igor Britchenko, Liliya Savchenko, Inna Naida & Oleksandr Tregubov - 2020 - Списание «Икономически Изследвания (Economic Studies)» 32 (3):61 - 82.
    The entry of Ukraine into the European Union significantly expands the boundaries of cooperation with different countries of the world. Compliance with the European requirements in the marketing sector will greatly increase the efficiency of its operation in the regions of Ukraine. The method of estimating the development of social infrastructure in the resource support of the management mechanism aimed at increasing the competitiveness of the transport system of the region by the integral indicator, which characterizes the level of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Forecasting of the number of air passengers in the United States in terms of the maintenance of economic security during the impact of COVID-19.Bartosz Kozicki, Igor Britchenko, Arsen Ovsepyan & Sabina Grabowska - 2021 - Studies in Politics and Society 19 (3):29-40.
    The purpose of the study is to forecast the number of passengers transported by air in the United States for 2021-2022. The forecast is preceded by a multidimensional comparative analysis of the number of passengers transported by air in the United States from 1 January 2019 to 2 November 2021. To achieve this goal, the data were grouped as dependent variables: years, months-years. The observed similarities, the analysis and evaluation of the literature as well as the own experience made it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Nightlife on New York Subway.Yang Immanuel Pachankis - manuscript
    The article reports on some societal observations conducted in 2019 on New York subways. With comparison to the subway management cases observed in Milan and mainland China, the article contends that the phenomenon in the New York public-funded transportation system reflects the spirit of equality in human with efficacy on the utility of the public-funded infrastructure. The message in the letter concludes that public & private fundings need to be drawn for the human development of the homeless population in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Eksperci i narcyzm kulturowy - próba analizy wzajemnych relacji.Andrzej Klimczuk - 2011 - In Narcyzm: Jednostka--Społeczeństwo--Kultura. Uwb. pp. 218--255.
    At the beginning of the XXI century, human societies are entering a period of "late modernity" characterized by new forms of trust and risk, untransparent social situations and economic, political and cultural globalization. These processes are associated with the presence of abstract systems that surround people and which require support of people with expertise in the fields which include transport, telecommunications, finance, security, media, energy. At the same time, it is noted that the expertise cult is born and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Experts and Cultural Narcissism. Relations in the Early 21st Century.Andrzej Klimczuk - 2012 - Lap Lambert Academic Publishing.
    Local and global dependencies and interactions between individuals, groups and institutions are becoming increasingly opaque and risky. This is due to increased importance of highly complex abstract systems created and supported in order to maintain of transport, communications, finance, energy, media, security infrastructure, as well as social and cultural institutions. These systems require the knowledge and skills of experts. Professionals that not only satisfy identified needs, but also create new thereby contribute the development of cultural narcissism phenomenon. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Peacebuilding in South Asia – A Perspective from Sri Guru Granth Sahib.Devinder Pal Singh - 2022 - The Sikh Bulletin, USA 24 (4):32-34.
    South Asia, home to one-third of the world population, is a diverse region with distinct conflicts and politico-economic subtleties. It has large sections of an impoverished population due to a lack of adequate health, education, water, sewerage, and transportation facilities. Natural disasters, as well as the lack of access to basic facilities, increase the probability of conflict. Peacebuilding is the practice of developing policies that consolidate peace and restore order through political, economic, and social reforms. Primarily, it depends on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Sustaining Native Entrepreneurship in South African Townships: the Start-up Agenda.Josephat Mukwarami & Robertson K. Tengeh - 2017 - ACTA UNIVERSITATIS DANUBIUS Economica 4 (13):331-345.
    Faced with enormous unemployment, the South African government enacted pro-SMME policies. It was assumed that such policies would ignite broad-based growth within the SMMEs cluster, regardless of the sector. However, the current evidence suggests that these laudable efforts have not benefited the poorest of the poor nor have they aroused and sustained entrepreneurship in certain quarters. Using the spaza shop as the focus and two prominent townships as the locus, this paper sought to understand the factors that under mind the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Igwebuike Philosophy and the Issue of National Development.Kanu Ikechukwu Anthony & Ikechukwu Anthony Kanu - 2017 - Igwebuike: An African Journal of Arts and Humanities 6 (3):16-50.
    Right from traditional African philosophy, down to its modern and contemporary era, there has been a strong link between African philos ophy and language, underlined by the principle of complementarity. This is not disconnec ted with Placid Tempels’ employment of force to explain being, and Alexis Kagame’s NTU, as the underlying principle of reality. Pantaleon Iroegbu explained being as belon gingness. In the thoughts of Innocent Asouzu, Ibuanyidanda, was used to explain the compl ementary nature of reality. In the face (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Problems and prospects of Ukraine’s energy supply in the aspects of international trade.Nataliya Krasnikova & A. A. Redchenkov - 2017 - Visnyk of Dniprop’Etrovsk University. Ser. World Economy and International Economic Relations 9 (25):70-79.
    The article studies the energy efficiency of the economy and determines the need to reform the energy sector of Ukraine and conditions of its adaptation to EU requirements. Annual energy consumption in the world is about 14 billion tons of fuel. This is mainly organic origin resources – coal, oil, natural gas – 82 %, nuclear power – 7 %, hydroelectric energy – 3%, wood – 7 % renewable energy and – 1 %. The economic development of any country in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small applications and resources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Imaginative Transportation.Samuel Kampa - 2018 - Australasian Journal of Philosophy 96 (4):683-696.
    Actors, undercover investigators, and readers of fiction sometimes report “losing themselves” in the characters they imitate or read about. They speak of “taking on” or “assuming” the beliefs, thoughts, and feelings of someone else. I offer an account of this strange but familiar phenomenon—what I call imaginative transportation.
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  19. Road transport system in Southeast Asia; problems and economic solutions.Maynard Clark, Sara Kaffashi & Mad Nasir Shamsudin - 2016 - Current World Environment 11 (1):10-19.
    In Southeast Asian countries (SEA), road transport accounts for the main energy consumption and CO2 emission. Air pollution is a major concern in densely populated cities such as Bangkok, Manila, and Kuala Lumpur. The main objective of this paper is to give insights on trends of transport development, car ownership, and CO2 emissions in Southeast Asia. This study also attempts to review the successful transportation policies around the globe and to introduce the possible instruments that can help reduce (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  65
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  22. Transporte de Gametas, Fertilização e Segmentação.Emanuel Isaque Cordeiro da Silva - manuscript
    TRANSPORTE DE GAMETAS, FERTILIZAÇÃO E SEGMENTAÇÃO -/- • _____OBJETIVO -/- O entendimento do desenvolvimento embrionário nos estágios iniciais, desde a deposição dos espermatozoides na fêmea, passando pela fertilização deste no ovócito e na formação do zigoto, é de suma importância para diferenciar especialistas em reprodução e manejo reprodutivo no mercado de trabalho e, também, durante a vida acadêmica. Compreender os processos que levam à formação do zigoto na fêmea é essencial para avaliar a capacidade reprodutiva dos animais e, mediante técnicas, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Quantum transport and utilization of free energy in protein α-helices.Danko D. Georgiev & James F. Glazebrook - 2020 - Advances in Quantum Chemistry 82:253-300.
    The essential biological processes that sustain life are catalyzed by protein nano-engines, which maintain living systems in far-from-equilibrium ordered states. To investigate energetic processes in proteins, we have analyzed the system of generalized Davydov equations that govern the quantum dynamics of multiple amide I exciton quanta propagating along the hydrogen-bonded peptide groups in α-helices. Computational simulations have confirmed the generation of moving Davydov solitons by applied pulses of amide I energy for protein α-helices of varying length. The stability and mobility (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  25.  87
    Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  47
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  37
    Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  70
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Peter Sloterdijk and the ‘Security Architecture of Existence’: Immunity, Autochthony, and Ontological Nativism.Thomas Sutherland - 2019 - Theory, Culture and Society 36 (7-8):193-214.
    Centred on 'Foams', the third volume of his Spheres trilogy, this article questions the privilege granted by Peter Sloterdijk to motifs of inclusion and exclusion, contending that whilst his prioritization of dwelling as a central aspect of human existence provides a promising counterpoint to the dislocative and isolative effects of post-industrial capitalism, it is compromised by its dependence upon an anti-cosmopolitan outlook that views cultural distantiation as a natural and preferable state of human affairs, and valorizes a purported ontological (...) attained through defensive postures with respect to perceived foreigners or externalities. Sloterdijk’s conceptualization of culture as a kind of immune system, it is argued, although posited as a rebuke to models of essentialism and ethno-nationalism, provides ontological support to the xenophobic critiques of immigration that are today finding increasing currency. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  42.  77
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Formation of principles of a customer-oriented approach by transport enterprises in conditions of sustainable development.Serhii Smerichevskyi, Zarina Poberezhna, Igor Kryvovyazyuk, Larysa Ivanenko & Dmytro Malnov - 2024 - E3S Web Conf 534:01022.
    The article examines the content and process of forming the principles of a customer-oriented approach to the management of transport enterprises in the context of sustainable development. The author's definition of the concept of “principles of a customer-oriented approach to the management of transport enterprises” is given on the basis of its understanding as strategic and tactical areas of activity aimed at maximizing the satisfaction of customers' needs and expectations through the use of digital technologies and innovative approaches. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  48. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  49. Robust evidence and secure evidence claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  50. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan (ed.), Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976