Results for 'Security studies'

991 found
Order:
  1.  18
    Security Studies: Towards a Reformational Approach.Lucas G. Freire - 2016 - Philosophia Reformata 81 (1):1-13.
    How can reformational philosophy help us reconceptualise the notion of security? In the field of Security Studies, theoreticalismsabound, each of them rooted in a different philosophical tradition. One of these approaches, “securitization theory”, portrays security in connection to five “sectors” that seem to reflect some of the basic aspects of the cosmos analysed by reformational philosophy. I consider the potential of this theory in an initial attempt to introduce a reformational approach to Security Studies. (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2.  11
    Ethical Security Studies: A New Research Agenda.Jonna Nyman & Anthony Burke (eds.) - 2016 - Routledge.
    At a time of grave ethical failure in global security affairs, this is the first book to bring together emerging theoretical debates on ethics and ethical reasoning within security studies. In this volume, working from a diverse range of perspectives—poststructuralism, liberalism, feminism, just war, securitization, and critical theory—leading scholars in the field of security studies consider the potential for ethical visions of security, and lay the ground for a new field: "ethical security (...)". These ethical ‘visions’ of security engage directly with the meaning and value of security and security practice, and consider four key questions: • Who, or what, should be secured? • What are the fundamental grounds and commitments of different security ethics? • Who or what are the most legitimate agents, providers or speakers of security? • What do ethical security practices look like? What ethical principles, arguments, or procedures, will generate and guide ethical security practices? Informed by a rich understanding of the intellectual and historical experience of security, the contributors advance innovative methodological, analytical, political and ethical arguments that represent the cutting edge of the field. This book opens a new phase of collaboration and growth that promises to have great benefits for the more humane, effective and ethical practice of security politics. This book will be of much interest to students of critical security studies, ethics, philosophy, and international relations. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  32
    State Identity Formation in Constructivist Security Studies: A Suggestive Essay.Young Chul Cho - 2012 - Japanese Journal of Political Science 13 (3):299-316.
    Although any typology of constructivism might be arbitrary, there are, broadly speaking, two distinctive constructivist approaches in security studies as well as International Relations (IR) according to their different meta-theoretical stances: conventional constructivism, on the one hand, and critical constructivism on the other. Indeed, regarding how to understand state identity which is integral to national security, there has meta-theoretically been fierce contention between conventional and critical constructivist security studies. In not ignoring but slightly toning down (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  4.  78
    My Critique is Bigger than Yours: Constituting Exclusions in Critical Security Studies.David Roger Mutimer - 2009 - Studies in Social Justice 3 (1):9-22.
    Critical Security Studies proceeds from the premise that words are world-making, that is that the ways we think about security are constitutive of the worlds of security we analyse. Turned to conventional security studies and the practices of global politics, this critical insight has revealed the ways in which the exclusions that are the focus of this conference have been produced. Perhaps most notable in this regard has been David Campbell's work, showing how the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  22
    The Evolution of International Security Studies, Barry Buzan and Lene Hansen , 400 pp., $99 cloth, $30.99 paper. [REVIEW]Ken Booth - 2011 - Ethics and International Affairs 25 (1):85-87.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  25
    The Palgrave Encyclopedia of Global Security Studies.Scott Romaniuk, Manish Thapa & Péter Marton (eds.) - 2018 - Springer Verlag.
    This encyclopaedia provides an authoritative guide intended for students of all levels of studies, offering multidisciplinary insight and analysis of over 500 headwords covering the main concepts of Security and Non-traditional Security, and their relation to other scholarly fields and aspects of real-world issues in the contemporary geopolitical world.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  53
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  8.  16
    Education, Security and Intelligence Studies.Liam Gearon - 2015 - British Journal of Educational Studies 63 (3):263-279.
    Reference to security and intelligence in education today will undoubtedly elicit concerns over terrorism, radicalisation and, in the UK, counter-terrorism measures such as Channel and Prevent (UK...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  9.  96
    Terrorism, Security, and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1994 - Routledge.
    Terrorism, Security and Nationality shows how the concepts and methods of political philosophy can be applied to the practical problems of terrorism, state violence and national security. The book clarifies a wide range of issues in applied political philosophy, including the ethics of war, theories of state and nation, the relationship between communities and nationalisms, and the uneasy balance of human rights and national security. Ethnicity, national identity and the interests of the state, concepts commonly cited to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  5
    Study on the Heterogeneity of Social Security Affecting the Sense of Security of Urban and Rural Residents.Yuanfeng Liu & Shujiao Luo - 2022 - Complexity 2022:1-6.
    Social security is an important part of the national security system from the perspective of the overall security concept, and social security is an important influencing factor of social security. Using the CFPS2018 data, this study uses the critical weight method to measure residents’ individual security and uses path analysis to empirically study the impact of endowment insurance and medical insurance on residents’ security in urban and rural areas. The results show that the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1995 - Routledge.
    _Terrorism, Security and Nationality_ shows how the ideas and techniques of political philosophy can be applied to the practical problems of terrorism, State violence and national identity. In doing so it clarifies a wide range of issues in applied political philosophy including ethics of war; theories of state and nation; the relationship between communities and nationalisms; human rightss and national security. Paul Gilbert identifies conflicting conceptiona of civil strife by different political communities and investigates notions of terrorism both (...)
     
    Export citation  
     
    Bookmark  
  12.  2
    Terrorism, Security, and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1994 - Routledge.
    _Terrorism, Security and Nationality_ shows how the ideas and techniques of political philosophy can be applied to the practical problems of terrorism, State violence and national identity. In doing so it clarifies a wide range of issues in applied political philosophy including ethics of war; theories of state and nation; the relationship between communities and nationalisms; human rightss and national security. Paul Gilbert identifies conflicting conceptiona of civil strife by different political communities and investigates notions of terrorism both (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  10
    Ecological Security Evaluation for Marine Ranching Based on the PLTS/ANP Method: A Case Study of Rongcheng.Yuan-Wei Du & Qiong Song - 2022 - Complexity 2022:1-16.
    The evaluation index system of ecological security of marine ranching is based on the assumption that there is independence among evaluation indexes in the existing studies, which ignores the complex interactive paths of marine ranching as an artificial ecosystem. In this study, the MRES evaluation network model that includes interdependent relationships is established based on the Driver-Pressure-State-Impact-Response model and the analytic network process method. Then, the probabilistic linguistic term sets and analytic network process methods are used to calculate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  16
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  13
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  56
    Weapons, Security, and Oppression: A Normative Study of International Arms Transfers.James Christensen - 2014 - Journal of Political Philosophy 23 (1):23-39.
  17.  14
    Intelligence Studies, Universities and Security.Anthony Glees - 2015 - British Journal of Educational Studies 63 (3):281-310.
  18. The role of global studies in the development of a sustainable security system.Ilya V. Ilyin & Kristina S. Leonova - 2022 - In Alexander N. Chumakov, Alyssa DeBlasio & Ilya V. Ilyin (eds.), Philosophical Aspects of Globalization: A Multidisciplinary Inquiry. Boston: BRILL.
     
    Export citation  
     
    Bookmark  
  19. Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1996 - Philosophy 71 (275):162-164.
    No categories
     
    Export citation  
     
    Bookmark  
  20.  26
    Studying the security of infant-adult attachment: A reprise.Michael E. Lamb, William P. Gardner, Eric L. Charnov, Ross A. Thompson & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):163-171.
  21.  7
    Attachment Security in Infancy: A Preliminary Study of Prospective Links to Brain Morphometry in Late Childhood.Élizabel Leblanc, Fanny Dégeilh, Véronique Daneault, Miriam H. Beauchamp & Annie Bernier - 2017 - Frontiers in Psychology 8.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22.  26
    A case study on human development and security: Madagascar's mining sector and conservation-induced displacement of populations.Jérôme Ballet & Mahefasoa Randrianalijaona - 2014 - Journal of Global Ethics 10 (2):216-230.
    This case study introduces the QIT Madagascar Minerals (QMM) SA mining project at Fort-Dauphin, Madagascar, as a development project that has produced issues concerning justice. Although QMM appears to be a model company with a project that is seen as a success story, its consequent displacement of populations has been problematic in many respects, as have been the social effects that arise due to migration to the area by others who are attracted by the project. We suggest that the root (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Facilitating secure attachment : integrating infant observation studies, attachment, trauma, and neurobiology in clinical interventions.Irene Harwood - 2012 - In Irene N. H. Harwood, Walter Stone & Malcolm Pines (eds.), Self experiences in group, revisited: affective attachments, intersubjective regulations, and human understanding. New York, NY: Routledge.
  24.  5
    Security of multi-agent systems: A case study on comparison shopping.Dieter Hutter, Heiko Mantel, Ina Schaefer & Axel Schairer - 2007 - Journal of Applied Logic 5 (2):303-332.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  19
    Understanding sexuality from the security gospel perspective: Mountain of Fire and Miracles Ministries as a case study.Adewale Adelakun - 2017 - HTS Theological Studies 73 (3):1-6.
    This article examines a new dimension in the Nigerian Pentecostal understanding of sexuality, which is influenced by the security gospel emanating from Mountain of Fire and Miracles Ministries in Nigeria. This new dimension is noted in how Mountain of Fire and Miracles Ministries intricately connects sexuality with destiny. This article shows how Mountain of Fire and Miracles Ministries promotes a conservative understanding of sexuality as the key to securing believers' destinies. Understanding sexuality from the security gospel perspective is (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  72
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Edible backyards: a qualitative study of household food growing and its contributions to food security[REVIEW]Robin Kortright & Sarah Wakefield - 2011 - Agriculture and Human Values 28 (1):39-53.
    Food security is a fundamental element of community health. Informal house-lot food growing, by providing convenient access to diverse varieties of affordable and nutritious produce, can provide an important support for community food security. In this exploratory assessment of the contribution home food gardening makes to community food security, in-depth interviews were conducted with gardeners in two contrasting neighborhoods in Toronto, Canada. A typology of food gardeners was developed, and this qualitative understanding of residential food production was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  28.  18
    British Security Policy, 1934–1938. Studies of the Decision Process in Security and Foreign Policy. [REVIEW]Michael Geyer - 1978 - Philosophy and History 11 (2):220-221.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  11
    Terrorism, Security and Nationality: An introductory study in applied political philosophy By Paul Gilbert, London and New York: Routledge, 1994, vii + 190 pp., £12.99. [REVIEW]Ian Chowcat - 1996 - Philosophy 71 (275):162-.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  46
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  14
    Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.John D. Bustard - 2018 - Science and Engineering Ethics 24 (2):683-698.
    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: aligning teaching content with student interests; taking a pragmatic rather than a philosophical approach to issue resolution; addressing the full complexity of real-world case studies; and covering content in a way that students find entertaining. The use of these principles is then discussed with (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  3
    An Exploratory Study Into the Negotiation of Cyber-Security Within the Family Home.Kate Muir & Adam Joinson - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  88
    Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  34.  15
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  98
    Politics of Security: Towards a Political Phiosophy of Continental Thought.Michael Dillon - 1996 - Routledge.
    In this critique of security studies, with insights into the thinking of Heidegger, Foucault, Derrida, Levinas and Arendt, Michael Dillon contributes to the rethinking of some of the fundamentals of international politics developing what might be called a political philosophy of continental thought. Drawing on the work of Martin Heidegger, Politics of Security establishes the relationship between Heidegger's readical hermeneutical phenomenology and politics and the fundamental link between politics, the tragic and the ethical. It breaks new ground (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  36.  31
    A framework for a regional integrated food security early warning system: a case study of the Dongting Lake area in China.Xiaoxing Qi, Laiyuan Zhong & Liming Liu - 2015 - Agriculture and Human Values 32 (2):315-329.
    Understanding the regional food security situation is of great importance to maintaining China’s food security. To provide targeted information to help regional policymakers monitor food security status, based on the differentiated foci during the phased development of food security, this paper was conceived from the perspective of the need for early warnings and proposes a framework for regional integrated food security that incorporates food quantity security, food quality security, and sustainable food security. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart & Arnold Ira Davidson.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   148 citations  
  38.  14
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert Van Der Torre - 2009 - Studia Logica 92 (3):395 - 436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language (both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  7
    Security: a philosophical investigation.David A. Welch - 2022 - New York: University of Waterloo, University Press.
    How do we know when we are investing wisely in security? Answering this question requires investigating what things are worth securing (and why); what threatens them; how best to protect them; and how to think about it. Is it possible to protect them? How best go about protecting them? What trade-offs are involved in allocating resources to security problems? This book responds to these questions by stripping down our preconceptions and rebuilding an understanding of security from the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  8
    Security, Strategy, and Critical Theory.R. G. Wyn Jones - 1999 - Lynne Rienner Publishers.
    Preface Acknowledgments Introduction 1 Pt. 1 Traditional and Critical Theory 1 Promise: Toward a Critical Theory of Society 9 2 Impasse: Emancipatory Politics After Auschwitz 29 3 Redemption: Renewing the Critical Project 53 Pt. 2 Traditional and Critical Security Studies 4 Theory: Reconceptualizing Security 93 5 Technology: Reconceptualizing Strategy 125 6 Emancipation: Reconceptualizing Practice 145 Epilogue 165 Bibliography 169 Index 187 About the Book 191.
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  13
    Feed the futureland: an actor-based approach to studying food security projects.Carrie Seay-Fleming - 2023 - Agriculture and Human Values 40 (4):1623-1637.
    Critical development and food studies scholars argue that the current food security paradigm is emblematic of a ‘New Green Revolution’, characterized by agricultural intensification, increasing reliance on biotechnology, deepening global markets, and depeasantization. High-profile examples of this model are not hard to find. Less examined, however, are food-security programs that appear to work at cross-purposes with this model. Drawing on the case of Feed the Future in Guatemala, I show how USAID engages in activities that valorize ancestral (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  4
    Security, technology and global politics: thinking with Virilio.Mark J. Lacy - 2014 - London: Routledge.
    This book analyses some of the key problems explored in Paul Virilio's theorising on war and security.Virilio is one of the most challenging and provocative critics of technology, war and globalisation. While many commentators focus on the new possibilities for mobility and communication in an interconnected world, Virilio is interested in the role that technology and security play in the shaping of our bodies and how we come to see the world -- what he terms the 'logistics of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  22
    Ethics and Health Security in the Australian COVID-19 Context: A Critical Interpretive Literature Review.Anson Fehross, Kari Pahlman & Diego S. Silva - 2024 - Journal of Bioethical Inquiry 21 (1):131-150.
    Background The concept of “health security” is often used to motivate public health responses, yet the ethical values that underpin this concept remain largely unexamined. The recent Australian responses to COVID-19 serve as an important case study by which we can analyse the pre-existing literature to see what ethical values shaped, and continue to shape, Australia’s response. Methods We conducted a critical interpretive literature review of academic and grey literatures within key databases, resulting in 2,220 sources. After screening for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  26
    Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart, François Ewald & Alessandro Fontana.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   61 citations  
  47. Governing anarchy: A research agenda for the study of security communities.Emanuel Adler & Michael N. Barnett - 1996 - Ethics and International Affairs 10:63–98.
    Adler and Barnett demonstrate how changes occurring in international politics create the nostalgia of security communities, a concept made prominent by Karl Deutsch nearly forty years ago.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  6
    Human values and global governance: studies in development, security and culture, volume 2.Björn Hettne (ed.) - 2008 - New York: Palgrave-Macmillan.
    The result of major research on development, security and culture, this collection, and second volume Sustainable Development in a Globalized World , outlines the emerging field of global studies and the theoretical approach of global social theory. It considers social relations and the need for intercultural dialogue to respect "the other.".
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  50
    Security, Extremism and Education: Safeguarding or Surveillance?Lynn Davies - 2016 - British Journal of Educational Studies 64 (1):1-19.
  50.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 991