Results for 'zero'

313 found
Order:
  1. The Ideal of a Zero-Waste Humanity: Philosophical Reflections on the Demand for a Bio-Based Economy.Jochem Zwier, Vincent Blok, Pieter Lemmens & Robert-Jan Geerts - 2015 - Journal of Agricultural and Environmental Ethics 28 (2):353-374.
    In this paper we inquire into the fundamental assumptions that underpin the ideal of the Bio-Based Economy as it is currently developed . By interpreting the BBE from the philosophical perspective on economy developed by Georges Bataille, we demonstrate how the BBE is fully premised on a thinking of scarcity. As a result, the BBE exclusively frames economic problems in terms of efficient production, endeavoring to exclude a thinking of abundance and wastefulness. Our hypothesis is that this not only entails (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  2.  35
    Zero-Day Vulnerabilities.Vaka Pavan Reddy - 2012 - International Journal of Innovative Research in Science, Engineering and Technology 1 (2):318-322.
    Zero-day vulnerabilities are critical security risks that exploit previously unknown flaws in software systems, making them difficult to detect and defend against. As such vulnerabilities are discovered by attackers before the software vendor is aware of them, they provide a significant advantage to malicious entities. The exploitation of zero-day vulnerabilities is a major concern for both individuals and organizations, as it can lead to unauthorized data access, loss of information, and compromised systems. This paper aims to explore the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Zero Point.Tine Wilde - 2024 - Amsterdam: Wilde Oceans Publications.
    Publication Zero Point shows the results of a four-years inquiry into the concept of 'measurability'. The book encompasses thirty-eight pictureworks and a philosophical thought experiment. It invites the reader to contemplate and compile their personal 'zero point' as a portrait of God. -/- Measurability appears to be a problematic concept. The boundaries between fixed and fluid; between sharp and vague; between coloured and non-coloured; between love and hate. When does one state of affairs turn into the other? When (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Intolerance and the Zero Tolerance Fallacy.Sheldon Wein - 2013 - In Gabrijela Kišiček & Igor Ž Žagar, What Do We Know About The World? Rhetorical and Argumentative Perspectives. Scholarship at Uwindsor. pp. 132-144.
    When an activity is unwanted, administrators often adopt a zero tolerance policy towards that activity. The background assumption is that, by adopting a zero tolerance policy, one is doing everything that one can to reduce or eliminate the activity in question. Yet which policy best serves to reduce an unwanted behavior is always an empirical question. Thus, those who adopt a zero tolerance policy towards some behavior without first investigating and finding that they are in a set (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  28
    Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-208.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  3
    Zero Trust Architecture for Business Data Security: Principles, Implementation, and Best Practices.Saurabh Jadhav Vaibhav Dond, Omkar Gawali, Mangesh Bhise - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1659-1667.
    n the face of evolving cybersecurity threats, businesses must adopt more robust security frameworks to protect sensitive data. Traditional perimeter-based security models are no longer sufficient, especially with the rise of remote work, cloud computing, and mobile devices. Zero Trust Architecture (ZTA) is a modern security model that assumes no trust by default, whether inside or outside the corporate network. This paper explores the core principles of Zero Trust, how businesses can implement this model effectively, and the key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Exploring the virtues of zero tolerance arguments.Sheldon Wein - unknown
    The zero tolerance fallacy occurs when someone advocates or adopts a zero tolerance policy towards some activity or behaviour without seeing if there is evidence to support the view that such a policy is the best or most cost-effective way of preventing or reducing the unwanted behaviour. This paper explores the idea that, instead of thinking about what the zero tolerance fallacy is, argumentation theorists should try to characterize what features good arguments for zero tolerance policies (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Bullying the Bully: Why zero-tolerance policies get a failing grade.H. Theixos & Kristin Borgwald - 2013 - Journal of Social Influence 8 (2-3):149-160.
    Recent studies show that the current punitive approach to bullying, in the form of zero-tolerance policies, is ineffective in reducing bullying and school violence. Despite this significant finding, anti-bullying legislation is increasing. The authors argue that these policies are not only ineffective but that they are also unjust, harmful, and stigmatizing. They advocate a broader integrative approach to bullying programs that includes both victims and bullies.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Vegan parents and children: zero parental compromise.Carlo Alvaro - 2020 - Ethics and Education 15 (4):476-498.
    Marcus William Hunt argues that when co-parents disagree over whether to raise their child (or children) as a vegan, they should reach a compromise as a gift given by one parent to the other out of respect for his or her authority. Josh Millburn contends that Hunt’s proposal of parental compromise over veganism is unacceptable on the ground that it overlooks respect for animal rights, which bars compromising. However, he contemplates the possibility of parental compromise over ‘unusual eating,’ of animal-based (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  10. The Nuances of Deprogramming Zeros.Parker Emmerson - 2024 - Journal of Liberated Mathematics.
    Description In this paper, we propose an advanced mathematical framework centered around the Energy Number Field (E), which fundamentally avoids the conventional concept of zero by introducing a neutral ele- ment, νE. Through this approach, we redefine core mathematical constructs, including limits, continuity, differentiation, integration, and series summation, ensuring they operate seamlessly within a zero-less paradigm. We address and redefine matrix operations, topology, metric spaces, and complex analysis, aligning them with the principles of E. Additionally, we explore non-mappable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  25
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying every request for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  37
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  64
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Ground zero for a post-moral ethics in J. M. Coetzee’s Disgrace and Julia Kristeva’s melancholic.Cynthia Willett - 2011 - Continental Philosophy Review 45 (1):1-22.
    Perhaps no other novel has received as much attention from moral philosophers as South African writer J. M. Coetzee’s Disgrace . The novel is ethically compelling and yet no moral theory explains its force. Despite clear Kantian moments, neither rationalism nor self-respect can account for the strange ethical task that the protagonist sets for himself. Calling himself the dog man, like the ancient Cynics, this shamelessly cynical protagonist takes his cues for ethics not from humans but from animals. He does (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Zero to Hero” in Mindspongeland.Ni Putu Wulan Purnama Sari - 2024 - Sm3D Portal.
    Are you an Early Career Researcher (ECR) striving for success in academia? If so, I invite you to explore my unconventional path. My journey to success is wandering in mindspongeland with the BMF analytics workhorse [1]. Sounds weird? It is. Sounds unfamiliar? It is. Sounds good? In a strange manner. But unbelievable? Definitely not. I am living proof.
    Download  
     
    Export citation  
     
    Bookmark  
  16. Analyzing the Zeros of the Riemann Zeta Function Using Set-Theoretic and Sweeping Net Methods.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:15.
    The Riemann zeta function ζ(s) is a central object in number theory and complex analysis, defined for complex variables and intimately connected to the distribution of prime numbers through its zeros. The famous Riemann Hypothesis conjectures that all non-trivial zeros of the zeta function lie on the critical line Re(s) = 1 2 . In this paper, we explore the Riemann zeta function through the lens of set-theoretic and sweeping net methods, leveraging creative comparisons of specific sets to gain deeper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Toward Incarceration Zero.Marcia Ricci Pinheiro - 2020 - IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 25 (7):10-17.
    Incarceration is a hurdle for The State, the perpetrator‘s family, society in general, the victim, and the perpetrator themselves. Laws, regulations, and rules are as relative, and fragile as their associated human group intended them to be, and it is frequently the case that they change so completely from one location to another that one can be regarded as a hero in one place, and most unacceptable perpetrator in another for practicing the same acts. It is time for a change: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Absence perception and the philosophy of zero.Neil Barton - 2020 - Synthese 197 (9):3823-3850.
    Zero provides a challenge for philosophers of mathematics with realist inclinations. On the one hand it is a bona fide cardinal number, yet on the other it is linked to ideas of nothingness and non-being. This paper provides an analysis of the epistemology and metaphysics of zero. We develop several constraints and then argue that a satisfactory account of zero can be obtained by integrating an account of numbers as properties of collections, work on the philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Arguing about Infinity: The meaning (and use) of infinity and zero.Paul Mayer - manuscript
    This work deals with problems involving infinities and infinitesimals. It explores the ideas behind zero, its relationship to ontological nothingness, finititude (such as finite numbers and quantities), and the infinite. The idea of infinity and zero are closely related, despite what many perceive as an intuitive inverse relationship. The symbol 0 generally refers to nothingness, whereas the symbol infinity refers to ``so much'' that it cannot be quantified or captured. The notion of finititude rests somewhere between complete nothingness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. The Origin and Significance of Zero: An Interdisciplinary Perspective.Peter Gobets & Robert Lawrence Kuhn (eds.) - 2024 - Leiden: Brill.
    Zero has been axial in human development, but the origin and discovery of zero has never been satisfactorily addressed by a comprehensive, systematic and above all interdisciplinary research program. In this volume, over 40 international scholars explore zero under four broad themes: history; religion, philosophy & linguistics; arts; and mathematics & the sciences. Some propose that the invention/discovery of zero may have been facilitated by the prior evolution of a sophisticated concept of Nothingness or Emptiness (as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. ‘Pure’ Time Preferences Are Irrelevant to the Debate over Time Bias: A Plea for Zero Time Discounting as the Normative Standard.Preston Greene - 2021 - Australasian Philosophical Review 5 (3):254-265.
    I find much to like in Craig Callender's [2022] arguments for the rational permissibility of non-exponential time discounting when these arguments are viewed in a conditional form: viz., if one thinks that time discounting is rationally permissible, as the social scientist does, then one should think that non-exponential time discounting is too. However, time neutralists believe that time discounting is rationally impermissible, and thus they take zero time discounting to be the normative standard. The time neutralist rejects time discounting (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Road Safety Policy in Addis Ababa: A Vision Zero Perspective.Henok Girma Abebe - 2022 - Sustainability 14 (9).
    In this article, the Addis Ababa city road safety policies are examined and analysed based on the Vision Zero approach to road safety work. Three major policy documents are explored and assessed in terms of how they compare with Vision Zero policy in Sweden, concerning how road safety problems are conceptualised, the responsibility ascriptions promoted, the nature of goal setting concerning road safety objectives, and the specific road safety interventions promoted. It is concluded that there is a big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Feasibility Study of A Zero Energy Building in Egypt.Nehad Khattab - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):36-43.
    Abstract— According to studies, buildings use around 40% of the total energy consumption in the world. Most of this consumed energy comes from fossil fuel, one of the sources of environmental pollution. The Net Zero Energy Building (NZEB) is an alternative to this alarming pollution. With its reduced energy needs and renewable energy systems, a ZEB can return as much energy as it takes from the utility on an annual basis. Thus the main objective of this study is to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Gaps Between Zeros of GL(2) L-functions.Patrick J. Ryan, Owen Barrett, Brian McDonald, Steven J. Miller, Caroline L. Turnage-Butterbaugh & Karl Winsor - 2015 - Journal of Mathematical Analysis and Applications 429 (1):204-232.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Equity and Social Justice considerations in road safety work: The case of Vision Zero in New York City.Henok Girma Abebe, Matts-Åke Belin & Karin Edvardsson Björnberg - 2024 - Transport Policy 149 (2024):11-20.
    This paper analyses how Vision Zero (VZ) efforts in New York City (NYC) account for equity and social justice implications of road safety work. VZ policy documents, research literature, popular science and opinion articles on road safety work in the city were studied with a prime focus on equity and social justice. Twelve semi-structured interviews with stakeholders involved in road safety and transport planning in the city and at national level were conducted to gain an in-depth understanding of policy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A Policy of No Interest? The Permanent Zero Interest Rate, and the Evils of Capitalism.Alexander Douglas - manuscript
    In 1937 Joan Robinson proposed that “when capitalism is rightly understood, the rate of interest will be set at zero and the major evils of capitalism will disappear”. A permanent zero rate would abolish capitalist profit except in limited cases, leaving nearly all output to be claimed by labour as wages. It would allow capital to be allocated on the basis of prospective social benefit rather than short-term profitability and a collateral basis that favours the wealthy. It would (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Puzzles for ZFEL, McShea and Brandon’s zero force evolutionary law.Martin Barrett, Hayley Clatterbuck, Michael Goldsby, Casey Helgeson, Brian McLoone, Trevor Pearce, Elliott Sober, Reuben Stern & Naftali Weinberger - 2012 - Biology and Philosophy 27 (5):723-735.
    In their 2010 book, Biology’s First Law, D. McShea and R. Brandon present a principle that they call ‘‘ZFEL,’’ the zero force evolutionary law. ZFEL says (roughly) that when there are no evolutionary forces acting on a population, the population’s complexity (i.e., how diverse its member organisms are) will increase. Here we develop criticisms of ZFEL and describe a different law of evolution; it says that diversity and complexity do not change when there are no evolutionary causes.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  28.  21
    AI-Powered Cloud Migration: Automating the Transition from On-Premises to Cloud Environments with Zero Downtime.M. Vaidhegi G. Glory - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):747-752.
    : As organizations continue to embrace cloud computing, the migration of workloads, applications, and data from on-premises environments to the cloud remains one of the most critical tasks. However, migrating to the cloud is often seen as a daunting task due to the complexity, the risk of downtime, and the potential for service disruptions. Artificial Intelligence (AI) and automation have emerged as transformative technologies for cloud migration, providing solutions that enable a seamless, efficient, and zero-downtime transition. This paper explores (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Theater of Knowledge at the Zero-Point as a Colonial Enterprise: Santiago Castro-Gomez’s Engagement with Kant.Paula Landerreche Cardillo - 2023 - Apa Studies in Hispanic/Latino Issues in Philosophy 22 (2):2-5.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Energy analysis for construction of a zero-energy residential building using thermal simulation in Iran.Nima Amani, Abdulamir Rezasoroush, Mostafa Moghadas Mashhad & Keyvan Safarzadeh - 2021 - International Journal of Energy Sector Management (Ijesm) 15 (5):895-913.
    Purpose: The purpose of this paper is to examine the feasibility and design of zero-energy buildings (ZEBs) in cold and semi-arid climates. In this study, to maximize the use of renewable energy, energy consumption is diminished using passive solar architecture systems and techniques. -/- Design/methodology/approach: The case study is a residential building with a floor area of 100 m2 and four inhabitants in the cold and semi-arid climate, northeast of Iran. For thermal simulation, the climate data such as air (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. On the Reconciliation Between Infinity and Zero - Another 'Theory of Everything' Based on Nothing? - Thanksgiving 2024 Update (19th edition).Louis Taylor - manuscript
    Is there room enough in all creation for another 'Empty Universe Theory'? How should we view the realm in which we exist? Are the natures of matter and energy, their compositions and relationships with each other the fundamental key to the understanding of everything or is it something else? As a researcher I decided to conduct an independent investigation and audit of Creation and this can be thought of as my report. Some thoughts on the true nature of the realm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. An Extension of Heron’s Formula to Tetrahedra, and the Projective Nature of Its Zeros.Havel Timothy - manuscript
    A natural extension of Heron's 2000 year old formula for the area of a triangle to the volume of a tetrahedron is presented. This gives the fourth power of the volume as a polynomial in six simple rational functions of the areas of its four faces and three medial parallelograms, which will be referred to herein as "interior faces." Geometrically, these rational functions are the areas of the triangles into which the exterior faces are divided by the points at which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  17
    Coal Power in China’s Net-Zero Future: A Strategic Transition.Bồ nông - 2025 - The Bird Village.
    China, the world’s largest coal power producer, faces the significant challenge of transitioning to a net-zero emissions power sector while maintaining energy security and economic stability. With coal-fired power plants accounting for a significant share of China’s energy mix, a complete phase-out is neither immediate nor straightforward. Instead, repositioning coal power as a flexible resource rather than a baseload provider offers a pragmatic approach to decarbonization.
    Download  
     
    Export citation  
     
    Bookmark  
  34. Going Nowhere and Back: Is Trivialization the Same as Zero Execution?Ivo Pezlar - 2022 - In Pavel Materna & Bjørn Jespersen, Logically Speaking. A Festschrift for Marie Duží. College Publications. pp. 187-202.
    In this paper I will explore the question whether the Trivialization construction of transparent intensional logic (TIL) can be understood in terms of the Execution construction, specifically, in terms of its degenerate case known as the 0-Execution. My answer will be positive and the apparent contrast between the intuitive understanding of Trivialization and 0-Execution will be explained as a matter of distinct yet related informal perspectives, not as a matter of technical or conceptual differences.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Our Universe’s Fingerprint: Why Zero Point Radiation Occurs and Are Quantum Fluctuations Truly Random?David Angell - manuscript
    Absolute nothing is the absence of our universe and its laws. Without these rules, nothingness has infinite potential. This implies that within the infinite probability of nothing, infinity can emerge. This would be expressed through infinite universes like our own. Infinite of these universes will differ by several particles, appearing and disappearing for no reason other than fulfilling every possibility. This universe is the product of a greater realisation of infinity and we can test this theory via the measurement of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Problem 11589: Where are the zeros?Catalin Barboianu - 2011 - The American Mathematical Monthly 117 (7):653.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Optimized Fog Computing and IoT Integrated Environment for Healthcare Monitoring and Diagnosis using Extended Li Zeroing Neural Network.S. M. Padmavathi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):501-516.
    The EdTech revolution in India has emerged as a transformative force, particularly during and after the COVID-19 pandemic, when traditional education systems faced unprecedented disruptions. While digital technologies have unlocked new opportunities for teaching and learning, they have also exposed systemic inequities and deepened the existing digital divide. This paper examines how EdTech is reshaping India's education landscape by addressing these challenges, with a focus on both the opportunities it presents and the barriers it creates.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Sensation-growth equations for non-zero threshold sensation, evaluated using non-traditional, bounded Fechnerian integration, for Fechner’s Law and for Ekman’s Law, using 12 different Weber Fractions.Lance Nizami - 2020 - In InterNoise 2020. Seoul, South Korea: pp. 1-16.
    An ongoing mystery in sensory science is how sensation magnitude F(I), such as loudness, increases with increasing stimulus intensity I. No credible, direct experimental measures exist. Nonetheless, F(I) can be inferred algebraically. Differences in sensation have empirical (but non-quantifiable) minimum sizes called just-noticeable sensation differences, ∆F, which correspond to empirically-measurable just-noticeable intensity differences, ∆I. The ∆Is presumably cumulate from an empirical stimulus-detection threshold I_th up to the intensity of interest, I. Likewise, corresponding ∆Fs cumulate from the sensation at the stimulus-detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Indonesia chuyển động mạnh mẽ về hướng Net Zero.Observateur Concerné - 2023 - Ocghg.
    Trong khu vực Đông Nam Á, Indonesia là nền kinh tế lớn và cũng là quốc gia phát thải khí nhà kính lớn nhất. Tuy nhiên, Indonesia cũng cam kết mạnh mẽ với mục tiêu giảm mạnh ảnh hưởng phát thải của khu vực sản xuất điện năng của mình, hiện nay đang chủ yếu vận hành các nhà máy nhiệt điện đốt than.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Conservation of the Circle: Core Dynamic in Nature.Ilexa Yardley - 2017 - Https://Medium.Com/the-Circular-Theory/.
    Zero and one is circumference and diameter. Literally. And, figuratively.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Consciousness Makes Things Matter.Andrew Y. Lee - forthcoming - Philosophers' Imprint.
    This paper argues that phenomenal consciousness is what makes an entity a welfare subject. I develop a variety of motivations for this view, and then defend it from objections concerning death, non-conscious entities that have interests (such as plants), and conscious entities that necessarily have welfare level zero. I also explain how my theory of welfare subjects relates to experientialist and anti-experientialist theories of welfare goods.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Grounding nonexistence.Daniel Muñoz - 2020 - Inquiry: An Interdisciplinary Journal of Philosophy 63 (2):209-229.
    Contingent negative existentials give rise to a notorious paradox. I formulate a version in terms of metaphysical grounding: nonexistence can't be fundamental, but nothing can ground it. I then argue for a new kind of solution, expanding on work by Kit Fine. The key idea is that negative existentials are contingently zero-grounded – that is to say, they are grounded, but not by anything, and only in the right conditions. If this is correct, it follows that grounding cannot be (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  44. Leave only Footprints? Reframing Climate Change, Environmental Stewardship, and Human Impact.Monica Aufrecht - 2017 - Ethics, Policy and Environment 20 (1):84-102.
    Cheryl Hall has argued that framing of climate change must acknowledge the sacrifices needed to reach a sustainable future. This paper builds on that argument. Although it is important to acknowledge the value of what must be sacrificed, this paper argues that current frames about the environment falsely portray humans and the environment as in a zero-sum game, and in doing so ask people to give up the wrong things. This could undermine the public’s trust in environmentalism, and might (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Pascalian Expectations and Explorations.Alan Hajek & Elizabeth Jackson - forthcoming - In Roger Ariew & Yuval Avnur, The Blackwell Companion to Pascal. Wiley-Blackwell.
    Pascal’s Wager involves expected utilities. In this chapter, we examine the Wager in light of two main features of expected utility theory: utilities and probabilities. We discuss infinite and finite utilities, and zero, infinitesimal, extremely low, imprecise, and undefined probabilities. These have all come up in recent literature regarding Pascal’s Wager. We consider the problems each creates and suggest prospects for the Wager in light of these problems.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. ONE AND THE MULTIPLE ON THE PHILOSOPHY OF MATHEMATICS - ALEXIS KARPOUZOS.Alexis Karpouzos - 2025 - Comsic Spirit 1:6.
    The relationship between the One and the Multiple in mystic philosophy is a profound and central theme that explores the nature of existence, the cosmos, and the divine. This theme is present in various mystical traditions, including those of the East and West, and it addresses the paradoxical coexistence of the unity and multiplicity of all things. -/- In mystic philosophy, the **One** often represents the ultimate reality, the source from which all things emanate and to which all things return. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. A Logico-Linguistic Inquiry into the Foundations of Physics: Part 1.Abhishek Majhi - 2022 - Axiomathes (NA):153-198.
    Physical dimensions like “mass”, “length”, “charge”, represented by the symbols [M], [L], [Q], are not numbers, but used as numbers to perform dimensional analysis in particular, and to write the equations of physics in general, by the physicist. The law of excluded middle falls short of explaining the contradictory meanings of the same symbols. The statements like “m tends to 0”, “r tends to 0”, “q tends to 0”, used by the physicist, are inconsistent on dimensional grounds because “m”, “r”, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  45
    Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2020 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-1294.
    The global shift to remote work has greatly increased the potential targets for cyberattacks, demanding stronger security measures than what Virtual Private Networks (VPNs) can provide. VPNs provide a bottom-line layer of security but don’t address the changing complexity of the distributed world of work. In this paper, we discuss advanced security frameworks and best practices to protect data and identity in a purely remote work setting, focusing on threat mitigation. The discussed key strategies include Zero Trust Architecture (ZTA), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  58
    Carbon Offsets and Shifting Harms.Luke Elson - 2024 - Erasmus Journal for Philosophy and Economics 17 (1).
    Carbon offsets either remove greenhouse gases from the air or prevent emissions thereof. They face questions both economic (is ‘net zero’ really reached?) and moral. I defend the moral permissibility of off-sets. They likely shift climate harms around, but that need not be unjust—and in any case we cannot avoid doing that.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Constructive Verification, Empirical Induction, and Falibilist Deduction: A Threefold Contrast.Julio Michael Stern - 2011 - Information 2 (4):635-650.
    This article explores some open questions related to the problem of verification of theories in the context of empirical sciences by contrasting three epistemological frameworks. Each of these epistemological frameworks is based on a corresponding central metaphor, namely: (a) Neo-empiricism and the gambling metaphor; (b) Popperian falsificationism and the scientific tribunal metaphor; (c) Cognitive constructivism and the object as eigen-solution metaphor. Each of one of these epistemological frameworks has also historically co-evolved with a certain statistical theory and method for testing (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 313