Results for ' security'

1000+ found
Order:
  1. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  2. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  3.  15
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2013 - Iris 34.
    No categories
     
    Export citation  
     
    Bookmark  
  5. Modal Security.Justin Clarke-Doane & Dan Baras - 2021 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  6. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  88
    Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  8. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  28
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  12. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  13. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  46
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  15.  16
    Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  16. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  17. Securing the nots: moral epistemology for the quasi-realist.Simon Blackburn - 1996 - In Walter Sinnott-Armstrong & Mark Timmons (eds.), Moral knowledge?: new readings in moral epistemology. New York: Oxford University Press. pp. 82--100.
     
    Export citation  
     
    Bookmark   35 citations  
  18. Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart & Arnold Ira Davidson.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   147 citations  
  19.  36
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  20.  49
    Security, Extremism and Education: Safeguarding or Surveillance?Lynn Davies - 2016 - British Journal of Educational Studies 64 (1):1-19.
  21.  51
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  22.  16
    Securities Against Misrule and Other Constitutional Writings For: Tripoli and Greece.Jeremy Bentham - 1990 - Oxford University Press UK. Edited by Philip Schofield.
    The latest important addition to The Collected Works of Jeremy Bentham, these essays lend credence to Bentham's claim that his ideas were `for the use of all nations and all governments professing liberal opinions'.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  23.  94
    Securing the Empirical Value of Measurement Results.Kent W. Staley - 2020 - British Journal for the Philosophy of Science 71 (1):87-113.
    Reports of quantitative experimental results often distinguish between the statistical uncertainty and the systematic uncertainty that characterize measurement outcomes. This article discusses the practice of estimating systematic uncertainty in high-energy physics. The estimation of systematic uncertainty in HEP should be understood as a minimal form of quantitative robustness analysis. The secure evidence framework is used to explain the epistemic significance of robustness analysis. However, the empirical value of a measurement result depends crucially not only on the resulting systematic uncertainty estimate, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  24.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  16
    Education, Security and Intelligence Studies.Liam Gearon - 2015 - British Journal of Educational Studies 63 (3):263-279.
    Reference to security and intelligence in education today will undoubtedly elicit concerns over terrorism, radicalisation and, in the UK, counter-terrorism measures such as Channel and Prevent (UK...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  27.  17
    Environmental Security and the Recombinant Human: Sustainability in the Twenty-first Century.Michael Redclift - 2001 - Environmental Values 10 (3):289-299.
    Examining the concepts of ‘security’ and ‘sustainability’, as they are employed in contemporary environmental discourses, the paper argues that, although the importance of the environment has been increasingly acknowledged since the 1970s, there has been a failure to incorporate other discourses surrounding ‘nature’. The implications of the ‘new genetics’, prompted by research into recombinant DNA, suggest that future approaches to sustainability need to be more cognisant of changes in ‘our’ nature, as well as those of ‘external’ nature, the environment. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  28.  51
    Private Security Companies and Institutional Legitimacy: Corporate and Stakeholder Responsibility.Heather Elms & Robert A. Phillips - 2009 - Business Ethics Quarterly 19 (3):403-432.
    The private provision of security services has attracted a great deal of recent attention, both professional and popular. Much of that attention suggests the questioned moral legitimacy of the private vs. public provision of security. Linking the literature on moral legitimacy and responsibility from new institutional and stakeholder theories, we examine the relationship between moral legitimacy and responsible behavior by both private security companies (PSCs) and their stakeholders. We ask what the moral-legitimacy-enhancing responsibilities of both might be, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  29.  16
    Secure key distribution via pre- and post-selected quantum states.Jeffrey Bub - unknown
    A quantum key distribution scheme whose security depends on the features of pre- and post-selected quantum states is described.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  26
    Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart, François Ewald & Alessandro Fontana.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   60 citations  
  31. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  32.  14
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert Van Der Torre - 2009 - Studia Logica 92 (3):395 - 436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language (both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33. National Security Secrecy: How the Limits Change.Steven Aftergood - 2010 - Social Research: An International Quarterly 77 (3):839-852.
    As a nation, we seem to be of two minds about secrecy. We know that government secrecy is incompatible with democratic decision-making in obvious ways. Yet there is a near-universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities. Reconciling these conflicting interests is an ongoing challenge. In recent years, a large and growing number of public interest organizations and professional societies have turned their attention to government secrecy, identifying it as an (...)
     
    Export citation  
     
    Bookmark  
  34. Security, Profiling and Equality.Paul Bou-Habib - 2008 - Ethical Theory and Moral Practice 11 (2):149-164.
    How, exactly, must we strike the balance between security and equality? Must we insist, out of respect for the equality of persons, that the police refrain from using ethnic profiling and opt for some other strategy in their pursuit of terrorists, or must we allow the police to continue with this policy, which seems to sacrifice equality for the sake of security? This paper assesses the ethical status of ethnic profiling from the perspective of the ideal of equality. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  18
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36. (Metasemantically) Securing Free Will.Jason Turner - 2013 - Australasian Journal of Philosophy 91 (2):295-310.
    Metasemantic security arguments aim to show, on metasemantic grounds, that even if we were to discover that determinism is true, that wouldn't give us reason to think that people never act freely. Flew's [1955] Paradigm Case Argument is one such argument; Heller's [1996] Putnamian argument is another. In this paper I introduce a third which uses a metasemantic picture on which meanings are settled as though by an ideal interpreter. Metasemantic security arguments are widely thought discredited by van (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  37.  22
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  23
    Security as a Political and Social Value.Vihren Bouzov - 2017 - Dialogue and Universalism 27 (2):141-150.
    Security can be defined as the process of support of a satisfactory control by the subject over harmful effects of the environment. In this aspect it is a political and social value of the same type as justice, democracy and freedom. Following the analysis of the existing conflicts in the world today, we conclude that the notion of security in its neoliberal interpretation has collapsed and it could be rejected and defended successfully only as a communitarian value.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  96
    Terrorism, Security, and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1994 - Routledge.
    Terrorism, Security and Nationality shows how the concepts and methods of political philosophy can be applied to the practical problems of terrorism, state violence and national security. The book clarifies a wide range of issues in applied political philosophy, including the ethics of war, theories of state and nation, the relationship between communities and nationalisms, and the uneasy balance of human rights and national security. Ethnicity, national identity and the interests of the state, concepts commonly cited to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  25
    Social security reform: Lessons from private pensions.Karen C. Burke & Grayson M. P. McCouch - unknown
    Widespread concerns about the long-term fiscal gap in Social Security have prompted various proposals for structural reform, with individual accounts as the centerpiece. Carving out individual accounts from the existing system would shift significant risks and responsibilities to individual workers. A parallel development has already occurred in the area of private pensions. Experience with 401 plans indicates that many workers will have difficulty making prudent decisions concerning investment and withdrawal of funds. Moreover, in implementing any system of voluntary individual (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  82
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  15
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  32
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  13
    Secure Attachment Representation in Adolescence Buffers Heart-Rate Reactivity in Response to Attachment-Related Stressors.Manuela Gander, Alexander Karabatsiakis, Katharina Nuderscher, Dorothee Bernheim, Cornelia Doyen-Waldecker & Anna Buchheim - 2022 - Frontiers in Human Neuroscience 16.
    To date, we know very little about the effects of the differences in attachment classifications on the physiological correlates of stress regulation in adolescent age groups. The present study examined for the first time heart rate and heart rate variability during an attachment interview in adolescents. HR and HRV data were collected during a baseline assessment as well as during the administration of the Adult Attachment Projective Picture System in a community-based sample of 56 adolescents. We additionally used the Adult (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  44
    Security and Distribution, or Should You Care about Merely Possible Losses?Kian Mintz-Woo - 2019 - Ethics, Policy and Environment 21 (3):382-386.
    [Comment] Jonathan Herington argues that harms can occur whether or not there is actually a loss. He claims that subjectively or objectively merely being at risk of losing access to basic goods is sufficient for lowering that individual’s well-being for the value of ‘security’. I challenge whether losing access to basic goods is sufficient to justify the introduction of this value. I also point to some issues in his interpretation of IPCC risk categories and the social science research he (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  33
    Securing Cisgendered Futures: Intersex Management under the “Disorders of Sex Development” Treatment Model.Catherine Clune-Taylor - 2019 - Hypatia 34 (4):690-712.
    In this critical, feminist account of the management of intersex conditions under 2006's controversial “Disorders of Sex Development” (DSD) treatment model, I argue that like the “Optimal Gender of Rearing” (OGR) treatment model it replaced, DSD aims at securing a cisgendered future for the intersex patient, referring to a normalized trajectory of development across the lifespan in which multiple sexed, gendered, and sexual characteristics remain in “coherent” alignment. I argue this by critically analyzing two ways that intersex management has changed (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 1000