Results for 'transport security'

999 found
Order:
  1. TRANSPORT SECURITY AS A FACTOR OF TRANSPORT AND COMMUNICATION SYSTEM OF UKRAINE SELF-SUSTAINING DEVELOPMENT.Igor Britchenko & Tetiana Cherniavska - 2017 - Науковий Вісник Полісся 1 (9):16-24.
    In the present article, attention is focused on the existing potential to ensure national self-sufficiency, the main challenges to its achievement and future prospects. According to the authors, transportation and communication system of the country can become the dominant model for self-sufficient development, due to its geostrategic location which allows it to be an advantageous bridge for goods, and passengers transit transportation between the states of Europe, Asia and the Middle East. To date, the transport and communication system is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  87
    Neutrosophic Transport and Assignment Issues. Arabic version.Florentin Smarandache & Maissam Ahmad Jdid - 2023 - Infinite Study.
    We all know that problems of transportation and allocation appear frequently in practical life. We need to transfer materials from production centers to consumption centers to secure the areas’ need for the transported material or allocate machines or people to do a specific job at the lowest cost, or in the shortest time. We know that the cost factors Time is one of the most important factors that decision-makers care about because it plays an “important” role in many of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  53
    Neutrosophic Transport and Assignment Issues.Florentin Smarandache - 2023 - Infinite Study.
    We all know that problems of transportation and allocation appear frequently in practical life. We need to transfer materials from production centers to consumption centers to secure the areas’ need for the transported material or allocate machines or people to do a specific job at the lowest cost, or in the shortest time. We know that the cost factors Time is one of the most important factors that decision-makers care about because it plays an “important” role in many of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Areas and Means of Formation of Transport Regional Complexes and Mechanisms for Managing their Competitiveness in Ukraine.Igor Britchenko, Liliya Savchenko, Inna Naida & Oleksandr Tregubov - 2020 - Списание «Икономически Изследвания (Economic Studies)» 32 (3):61 - 82.
    The entry of Ukraine into the European Union significantly expands the boundaries of cooperation with different countries of the world. Compliance with the European requirements in the marketing sector will greatly increase the efficiency of its operation in the regions of Ukraine. The method of estimating the development of social infrastructure in the resource support of the management mechanism aimed at increasing the competitiveness of the transport system of the region by the integral indicator, which characterizes the level of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that the decline in its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Export logistics of agricultural products of Ukraine in the context of ensuring food security during martial law.Maksym Bezpartochnyi & Igor Britchenko - 2022 - In Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.), Current issues of security management during martial law. Vysoká škola bezpečnostného manažérstva v Košiciach. pp. 163-184.
    The study determined the dynamics of growing grain crops in Ukraine and the geography of their export. The problems of ensuring export logistics as a result of military aggression by russia in the context of ensuring food security are pointed out. The main directions of export logistics of grain crops from Ukraine and the peculiarities of transportation by railway, river and road transport were studied. The directions of diversification of export logistics of grain crops from Ukraine during martial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Forecasting of the number of air passengers in the United States in terms of the maintenance of economic security during the impact of COVID-19.Bartosz Kozicki, Igor Britchenko, Arsen Ovsepyan & Sabina Grabowska - 2021 - Studies in Politics and Society 19 (3):29-40.
    The purpose of the study is to forecast the number of passengers transported by air in the United States for 2021-2022. The forecast is preceded by a multidimensional comparative analysis of the number of passengers transported by air in the United States from 1 January 2019 to 2 November 2021. To achieve this goal, the data were grouped as dependent variables: years, months-years. The observed similarities, the analysis and evaluation of the literature as well as the own experience made it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Nightlife on New York Subway.Yang Immanuel Pachankis - manuscript
    The article reports on some societal observations conducted in 2019 on New York subways. With comparison to the subway management cases observed in Milan and mainland China, the article contends that the phenomenon in the New York public-funded transportation system reflects the spirit of equality in human with efficacy on the utility of the public-funded infrastructure. The message in the letter concludes that public & private fundings need to be drawn for the human development of the homeless population in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Eksperci i narcyzm kulturowy - próba analizy wzajemnych relacji.Andrzej Klimczuk - 2011 - In Jacek Sieradzan (ed.), Narcyzm: Jednostka--Społeczeństwo--Kultura. Uwb. pp. 218--255.
    At the beginning of the XXI century, human societies are entering a period of "late modernity" characterized by new forms of trust and risk, untransparent social situations and economic, political and cultural globalization. These processes are associated with the presence of abstract systems that surround people and which require support of people with expertise in the fields which include transport, telecommunications, finance, security, media, energy. At the same time, it is noted that the expertise cult is born and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Experts and Cultural Narcissism. Relations in the Early 21st Century.Andrzej Klimczuk - 2012 - Lap Lambert Academic Publishing.
    Local and global dependencies and interactions between individuals, groups and institutions are becoming increasingly opaque and risky. This is due to increased importance of highly complex abstract systems created and supported in order to maintain of transport, communications, finance, energy, media, security infrastructure, as well as social and cultural institutions. These systems require the knowledge and skills of experts. Professionals that not only satisfy identified needs, but also create new thereby contribute the development of cultural narcissism phenomenon. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Sustaining Native Entrepreneurship in South African Townships: the Start-up Agenda.Josephat Mukwarami & Robertson K. Tengeh - 2017 - ACTA UNIVERSITATIS DANUBIUS Economica 4 (13):331-345.
    Faced with enormous unemployment, the South African government enacted pro-SMME policies. It was assumed that such policies would ignite broad-based growth within the SMMEs cluster, regardless of the sector. However, the current evidence suggests that these laudable efforts have not benefited the poorest of the poor nor have they aroused and sustained entrepreneurship in certain quarters. Using the spaza shop as the focus and two prominent townships as the locus, this paper sought to understand the factors that under mind the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Igwebuike Philosophy and the Issue of National Development.Kanu Ikechukwu Anthony & Ikechukwu Anthony Kanu - 2017 - Igwebuike: An African Journal of Arts and Humanities 6 (3):16-50.
    Right from traditional African philosophy, down to its modern and contemporary era, there has been a strong link between African philos ophy and language, underlined by the principle of complementarity. This is not disconnec ted with Placid Tempels’ employment of force to explain being, and Alexis Kagame’s NTU, as the underlying principle of reality. Pantaleon Iroegbu explained being as belon gingness. In the thoughts of Innocent Asouzu, Ibuanyidanda, was used to explain the compl ementary nature of reality. In the face (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  82
    Peacebuilding in South Asia – A Perspective from Sri Guru Granth Sahib.Devinder Pal Singh - 2022 - The Sikh Bulletin, USA 24 (4):32-34.
    South Asia, home to one-third of the world population, is a diverse region with distinct conflicts and politico-economic subtleties. It has large sections of an impoverished population due to a lack of adequate health, education, water, sewerage, and transportation facilities. Natural disasters, as well as the lack of access to basic facilities, increase the probability of conflict. Peacebuilding is the practice of developing policies that consolidate peace and restore order through political, economic, and social reforms. Primarily, it depends on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Problems and prospects of Ukraine’s energy supply in the aspects of international trade.Nataliya Krasnikova & A. A. Redchenkov - 2017 - Visnyk of Dniprop’Etrovsk University. Ser. World Economy and International Economic Relations 9 (25):70-79.
    The article studies the energy efficiency of the economy and determines the need to reform the energy sector of Ukraine and conditions of its adaptation to EU requirements. Annual energy consumption in the world is about 14 billion tons of fuel. This is mainly organic origin resources – coal, oil, natural gas – 82 %, nuclear power – 7 %, hydroelectric energy – 3%, wood – 7 % renewable energy and – 1 %. The economic development of any country in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog computing, small applications and resources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Imaginative Transportation.Samuel Kampa - 2018 - Australasian Journal of Philosophy 96 (4):683-696.
    Actors, undercover investigators, and readers of fiction sometimes report “losing themselves” in the characters they imitate or read about. They speak of “taking on” or “assuming” the beliefs, thoughts, and feelings of someone else. I offer an account of this strange but familiar phenomenon—what I call imaginative transportation.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  19. Road transport system in Southeast Asia; problems and economic solutions.Maynard Clark, Sara Kaffashi & Mad Nasir Shamsudin - 2016 - Current World Environment 11 (1):10-19.
    In Southeast Asian countries (SEA), road transport accounts for the main energy consumption and CO2 emission. Air pollution is a major concern in densely populated cities such as Bangkok, Manila, and Kuala Lumpur. The main objective of this paper is to give insights on trends of transport development, car ownership, and CO2 emissions in Southeast Asia. This study also attempts to review the successful transportation policies around the globe and to introduce the possible instruments that can help reduce (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Quantum transport and utilization of free energy in protein α-helices.Danko D. Georgiev & James F. Glazebrook - 2020 - Advances in Quantum Chemistry 82:253-300.
    The essential biological processes that sustain life are catalyzed by protein nano-engines, which maintain living systems in far-from-equilibrium ordered states. To investigate energetic processes in proteins, we have analyzed the system of generalized Davydov equations that govern the quantum dynamics of multiple amide I exciton quanta propagating along the hydrogen-bonded peptide groups in α-helices. Computational simulations have confirmed the generation of moving Davydov solitons by applied pulses of amide I energy for protein α-helices of varying length. The stability and mobility (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Transporte de Gametas, Fertilização e Segmentação.Emanuel Isaque Cordeiro da Silva - manuscript
    TRANSPORTE DE GAMETAS, FERTILIZAÇÃO E SEGMENTAÇÃO -/- • _____OBJETIVO -/- O entendimento do desenvolvimento embrionário nos estágios iniciais, desde a deposição dos espermatozoides na fêmea, passando pela fertilização deste no ovócito e na formação do zigoto, é de suma importância para diferenciar especialistas em reprodução e manejo reprodutivo no mercado de trabalho e, também, durante a vida acadêmica. Compreender os processos que levam à formação do zigoto na fêmea é essencial para avaliar a capacidade reprodutiva dos animais e, mediante técnicas, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Concept of Security in Political Violence.Jessica Wolfendale - 2012 - In Marie Breen-Smyth (ed.), Ashgate Companion to Political Violence. Ashgate. pp. 99-118.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  28. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  76
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri (eds.), Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Trenton, New Jersey, USA: Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Ambiguity and Transport: Reflections on the Proem to Parmenides' Poem.Mitchell Miller - 2006 - In David Sedley (ed.), Oxford Studies in Ancient Philosophy Xxx: Summer 2006. Oxford University Press.
    A close reading of the poem of Parmenides, with focal attention to the way the proem situates Parmenides' insight in relation to Hesiod and Anaximander and provides the context for the thought of "... is". I identify three pointed ambiguities, in the direction of the journey to the gates of the ways of Night and Day, in the way the gates swing open before the waiting traveler, and in the character of the "chasm" that their opening makes, and I suggest (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  41. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  42. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Securing Political Accountability to Future Generations with Retrospective Accountability.Tyler M. John - forthcoming - In Jacob Barrett, Hilary Greaves & David Thorstad (eds.), Essays on Longtermism. Oxford University Press.
    Political short-termism costs the global economy hundreds of billions to trillions of dollars annually, and leads to many millions of deaths from disasters and suboptimal spending. In this paper, I propose a futures assembly explicitly incentivised to promote the interests of future generations as a promising strategy to ameliorate short-termism. The assembly I propose is governed by citizens randomly selected from among the populace, who are rewarded in the future to the extent that they successfully promote the welfare of future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Security, Local Community, and the Democratic Political Culture in Africa.Krzysztof Trzcinski - 2021 - In Adeshina Afolayan (ed.), Pathways to Alternative Epistemologies in Africa. Palgrave Macmillan. pp. 111-122.
    In this study, the idea of the local African community as a social structure ensuring the security of its members is presented. An understanding of the concept of security is first briefly discussed, followed by the meaning of the concept of the local African community. The chapter also makes an a priori distinction between what one can call “moderate” and “radical” types of communal life and two case studies exemplifying them are presented. The chapter aims to analyze the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Robust evidence and secure evidence claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  47. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Philosophy of Global Security.Vihren Bouzov - 2015 - In Ioan-Alexandru Tofan Mihai-Dan Chiţoiu (ed.), Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999