Results for ' USDA SECURE Rule'

1000+ found
Order:
  1.  13
    Public Trust and Biotech Innovation: A Theory of Trustworthy Regulation of (Scary!) Technology.Clark Wolf - 2021 - Social Philosophy and Policy 38 (2):29-49.
    Regulatory agencies aim to protect the public by moderating risks associated with innovation, but a good regulatory regime should also promote justified public trust. After introducing the USDA 2020 SECURE Rule for regulation of biotech innovation as a case study, this essay develops a theory of justified public trust in regulation. On the theory advanced here, to be trustworthy, a regulatory regime must (1) fairly and effectively manage risk, must be (2) “science based” in the relevant sense, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  21
    National Security, Self-rule, and Democratic Action.David McCabe - 2021 - The Journal of Ethics 25 (2):181-202.
    Most discussions of the relationship between liberty and security focus on the idea that enhancing citizens’ security may require imposing constraints on their civil liberties. This paper explores the question of how measures to enhance security stand vis à vis the idea of political liberty, i.e. the idea of citizens’ collectively directing the power of their state. It distinguishes two models whereby citizens might enact that ideal of self-rule and argues that with respect to issues of national security, the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3. Human Security, the 'Rule of Law'and NGOs: Potentials and Problems for Humanitarian Intervention.Oliver Richmond - 2001 - Human Rights Review 2 (4).
     
    Export citation  
     
    Bookmark  
  4. Two ways to rule out error: Severity and security.Kent Staley - unknown
    I contrast two modes of error-elimination relevant to evaluating evidence in accounts that emphasize frequentist reliability. The contrast corresponds to that between the use of of a reliable inference procedure and the critical scrutiny of a procedure with regard to its reliability, in light of what is and is not known about the setting in which the procedure is used. I propose a notion of security as a category of evidential assessment for the latter. In statistical settings, robustness theory and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  5.  24
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 sites mentioned (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  5
    Chapter 4: Special Rules for Personal Security of Consumers.Ulrich Drobnig - 2007 - In Personal Security. Sellier de Gruyter.
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  4
    The Broadened Scope of Rule 1Ob-5: Analysis and Implications for Participants in the Securities Markets.H. Fenwick Huss & Burt A. Leete - 1988 - Business and Society 27 (1):1-6.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8. Corporate rules, distributive justice, and efficiency.Amos Witztum - 2008 - Business Ethics Quarterly 18 (1):85-116.
    The question whether corporations should be used as a means for administering distributive justice is crucial. There are two fundamental issues associated with this. Firstly, would the introduction of rules have any distributional effect? Secondly, what would be the efficiency cost? In this paper, we explore both questions with reference to a job-security corporate rule. We show that the job-security rule will always produce distributional consequences which are consistent with its objectives. However, whether or not it is a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  18
    Ying Chen: Trade, food security, and human rights: the rules for international trade in agricultural products and the evolving world food crisis: Ashgate Publishing Company, Burlington, VT, 2014, 282 pp, ISBN: 978-1-4724-3742-6.Mario R. Machado - 2015 - Agriculture and Human Values 32 (4):795-796.
  10.  20
    9/11 and the Rise of Global Anti-Terrorism Law: How the Un Security Council Rules the World.Arianna Vedaschi & Kim Lane Scheppele (eds.) - 2021 - Cambridge University Press.
    Twenty years after the outbreak of the threat posed by international jihadist terrorism, which triggered the need for democracies to balance fundamental rights and security needs, 9/11 and the Rise of Global Anti-Terrorism Law offers an overview of counter-terrorism and of the interplay among the main actors involved in the field since 2001. This book aims to give a picture of the complex and evolving interaction between the international, regional and domestic levels in framing counter-terrorism law and policies. Targeting scholars, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  55
    Conflicts of interest arising from the prudent investor rule: Ethical implications for over-the-counter derivative securities. [REVIEW]John M. Clark, Linda Ferrell & O. C. Ferrell - 2003 - Journal of Business Ethics 47 (2):165 - 173.
    The Prudent Investor Rule creates a potential ethical dilemma for investment advisors selling over-the-counter financial products issued by their firms. The "opportunity" to defraud investors using complex, over-the-counter derivative securities designed for client-specific risk management is much higher than for exchange traded securities. This paper emphasizes the ethical responsibility held by trustees and their organizations to eliminate potential conflict of interests through internal control and monitoring. Independent evaluations of the performance of investment advisors and independent appraisals of complex over-the-counter (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  14
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on a combination (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  7
    Between Economy and the State: Private Security and Rule Enforcement in Russia.Vadim Volkov - 2000 - Politics and Society 28 (4):483-501.
    This article explores how the segments of the state police and security organs were transformed into a large private security industry in Russia after 1992. As market reforms were launched, the numbers of private property owners grew dramatically, but the state institutions for the protection of property and dispute settlement were either absent or defunct. This gap was consequently filled with various private institutions, private protection companies and private security services being the major ones. The article studies the context of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. Security and liberty (new philosophy of police and civil liberties in a law state).P. Koreny - 2000 - Filozofia 55 (9):673-691.
    The problem of preferential rules embodies several essential issues of searching for the optimal proportion between the security provided by the police and the liberties of citizens. Preferential rules are related to various particular conflicts brought about by carrying out the security functions of the police. The rules consist of values, that ought to be profoundly judged in every particular situation, as well as of proofable standards of various emergencies, i. e. the threats to the values secured by the police. (...)
     
    Export citation  
     
    Bookmark  
  15. On the Incoherence Objection to Rule-Utilitarianism.Alex Rajczi - 2016 - Ethical Theory and Moral Practice 19 (4):857-876.
    For a long time many philosophers felt the incoherence objection was a decisive objection to rule-consequentialism, but that position has recently become less secure, because Brad Hooker has offered a clever new way for rule-consequentialists to avoid the incoherence objection. Hooker’s response defeats traditional forms of the incoherence objection, but this paper argues that another version of the problem remains. Several possible solutions fail. One other does not, but it introduces other problems into the theory. I conclude (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  23
    Security and democratic equality.Brian Milstein - 2021 - Contemporary Political Theory 20 (4):836-857.
    After a recent spate of terrorist attacks in European and American cities, liberal democracies are reintroducing emergency securitarian measures that curtail rights and/or expand police powers. Political theorists who study ESMs are familiar with how such measures become instruments of discrimination and abuse, but the fundamental conflict ESMs pose for not just civil liberty but also democratic equality still remains insufficiently explored. Such phenomena are usually explained as a function of public panic or fear-mongering in times of crisis, but I (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  24
    Secured Financing of Intellectual Property Assets and the Reform of English Personal Property Security Law.Iwan Davies - 2006 - Oxford Journal of Legal Studies 26 (3):559-583.
    The past three decades have seen a decline in traditional industries in the United Kingdom and there has been a relative decline in the value of physical assets to the UK economy. At the same time, the value of intangible assets seen in intellectual property rights have increased considerably. As such, IP rights represent important assets for companies and often comprise the foundation for market dominance and continued profitability. There is a structural uncertainty in the law relating to the use (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  19.  15
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists of various (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  43
    War, torture and terrorism: Rethinking the rules of international security - edited by Anthony F. Lang, jr., and Amanda Russell Beattie.Richard Jackson - 2009 - Ethics and International Affairs 23 (4):419-421.
  21.  6
    Personal Security.Ulrich Drobnig - 2007 - Sellier de Gruyter.
    The Study Group on a European Civil Code has taken upon itself the task of drafting common European principles for the most important aspects of the law of obligations and for certain parts of the law of property in movables which are especially relevant for the functioning of the common market. Like the Commission on European Contract Law's "Principles of European Contract Law", the results of the research conducted by the Study Group on a European Civil Code seek to advance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  28
    Organizational Repertoires and Rites in Health Information Security.Ted Cooper, Jeff Collmann & Henry Neidermeier - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (4):441-452.
    The privacy and security rules of the Health Insurance Portability and Accountability Act of 1996 emphasize taking steps for protecting protected health information from unauthorized access and modification. Nonetheless, even organizations highly skilled in data security that comply with regulations and all good practices will suffer and must respond to breaches. This paper reports on a case study in responding to an important breach of the confidentiality and integrity of identifiable patient information of the Kaiser Internet Patient Portal known as. (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  23.  57
    Moral Rules As Public Goods.Edward F. McClennen - 1999 - Business Ethics Quarterly 9 (1):103-126.
    Abstract:The kind of commitment to moral rules that characterizes effective interaction between persons in among others places, manufacturing and commercial settings is characteristically treated by economists and game theorists as a public good, the securing of which requires the expenditure of scarce resources on surveillance and enforcement mechanisms. Alternatively put, the view is that, characteristically, rational persons cannot voluntarily guide their choices by rules, but can only be goaded into acting in accordance with such rules by the fear of social (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  24.  60
    The US securities and exchange commission and shareholder director nominations: Paving the way for special interest directors?Thomas A. Hemphill - 2007 - International Journal of Business Governance and Ethics 3 (1):19-32.
    The US Securities and Exchange Commission recently proposed rules relating to shareholder (independent) director nominations to publicly-traded companies. While shareholder groups, such as institutional investors, consumer groups, and shareholder activists, generally support the proxy reform, the business community, including The Business Roundtable and the US Chamber of Commerce, are critical of the proposal, arguing that it will 'open the door' to special interest directors, e.g., labour unions or other groups having a social or political agenda contrary to the economic interests (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  56
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes an (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an era of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  26
    Rule‐consequentialism, procreative freedom, and future generations.Julia Mosquera - 2022 - Ratio 35 (4):333-343.
    In this paper I analyse how procreative freedom poses a challenge for rule-consequentialism. First, I reconstruct the rule-consequentialist case for procreative freedom. Second, I argue that population scenarios resulting from very low fertility pose a problem for rule-consequentialism since such scenarios cannot secure population growth or even avoid human extinction in the long run. Third, I argue that population scenarios resulting from excessive procreation also pose a problem for rule-consequentialism since they are incompatible with the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  33
    Securing the objectivity of relative facts in the quantum world.Richard A. Healey - 2022 - Foundations of Physics 52 (4):1-20.
    This paper compares and contrasts relational quantum mechanics with a pragmatist view of quantum theory. I first explain important points of agreement. Then I point to two problems faced by RQM and sketch DP?s solutions to analogous problems. Since both RQM and DP have taken the Born rule to require relative facts I next say what these might be. My main objection to RQM as originally conceived is that its ontology of relative facts is incompatible with scientific objectivity and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  18
    Securing non-domination in the social republic: A social republican theory of rights.Michael Coleman - forthcoming - European Journal of Political Theory.
    Recently, some scholars have sought to cast Marx and other socialists as participants in the republican tradition, expanding ideas such as non-domination and self-rule beyond what they had been typically conceived of as by many of the instigators of the revival of republican thought in recent decades. The ramifications of such an expansion, however, have not yet been fully grappled with in the area of rights. This article aims to remedy this by building a theory of social republican rights (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  52
    Misreporting rules.Dan S. Felsenthal & Moshé Machover - unknown
    In the voting-power literature the rules of decision of the US Congress and the UN Security Council are widely misreported as though abstention amounts to a `no' vote. The hypothesis (proposed elsewhere) that this is due to a specific cause, theory-laden observation, is tested here by examining accounts of these rules in introductory textbooks on American Government and International Relations, where that putative cause does not apply. Our examination does not lead to a conclusive outcome regarding the hypothesis, but reveals (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  27
    Infectious Diseases, Security and Ethics: The Case of Hiv/Aids.Michaelj Selgelid - 2008 - Bioethics 22 (9):457-465.
    Securitization of infectious diseases may involve suspension of ordinary human rights and liberties. In the event of an epidemic, therefore, it is important to limit the occasions upon which draconian disease control measures are implemented in the name of security. The term ‘security’, moreover, should not be used too loosely if it is to retain force and meaning in political discourse. It may be argued that the bar for disease securitization should be set high so that it is limited to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  7
    The Rule of Freedom.Zbigniew Stawrowski - 2021 - Civitas. Studia Z Filozofii Polityki 11:253-267.
    How can liberty be implemented through state institutions? And what kind of liberty are we thinking about in the contemporary world, since this concept is generally acknowledged as ambiguous? In order to understand the modern state as a rule of liberty, one must investigate the essence of liberty itself. It is widely known that liberty can be viewed in many ways, but what kind of liberty can govern the contemporary political order? Among the philosophers who have examined authority from (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  62
    Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
    This article motions to a real contradiction between online security and civil rights. It traverses semantic and conceptual elaborations of both security and human rights, narrowing their range to national security and human rather than civil rights, and suggests that the concept of security itself, whether online or not, is a rhetorical instrument in the hands of interested parties, mostly states and militaries. This instrument is used to undermine human rights precisely by means of its association and even identification with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35. The Politics of the Rule of Law.Joseph Raz - 1990 - Ratio Juris 3 (3):331-339.
    The article reviews several books on the rule of law, including "International Justice in Rwanda and the Balkans: Virtual Trials and the Struggle for State Cooperation," by Victor A. Peskin, "Civil War and the Rule of Law: Security, Development, Human Rights," edited by Agnes Hurwitz and Reyko Huang, and "Plunder: When the Rule of Law Is Illegal," by Ugo Mattei and Laura Nader.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Securities law and the new deal justices.Adam C. Pritchard & Robert B. Thompson - unknown
    Taming the power of Wall Street was a principal campaign theme for Franklin Delano Roosevelt in the 1932 election. Roosevelt's election bore fruit in the Securities Act of 1933, which regulated the public offering of securities, the Securities Exchange Act of 1934, which regulated stock markets and the securities traded in those markets, and the Public Utility Holding Company Act of 1935 (PUHCA), which legislated a wholesale reorganization of the utility industry. The reform effort was spearheaded by the newly created (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  32
    Criteria, Defeasibility and Rules: Intention and the Principal Aim Argument.Leon Culbertson - 2018 - Sport, Ethics and Philosophy 12 (2):149-161.
    This paper builds on a previous discussion of Stephen Mumford’s rejection of what he takes to be David Best’s argument for a distinction between purposive and aesthetic sports. That discussion concluded that Mumford’s argument misses its target, but closed by introducing a possible alternative argument, not made by Mumford, that might be thought to have the potential to secure Mumford’s conclusion. This paper considers that alternative argument, namely, the thought that the ascription of psychological predicates conceived of in terms (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  20
    New Rules for the Spaces of Urbanity.Göran Sonesson - 2014 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 27 (1):7-26.
    The best way to conceive semiotical spaces that are not identical to single buildings, such as a cityscape, is to define the place in terms of the activities occurring there. This conception originated in the proxemics of E. T. Hall and was later generalized in the spatial semiotics of Manar Hammad. It can be given a more secure grounding in terms of time geography, which is involved with trajectories in space and time. We add to this a qualitative dimension (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  39. How (not) to think of the ‘dead-donor’ rule.Adam Omelianchuk - 2018 - Theoretical Medicine and Bioethics 39 (1):1-25.
    Although much has been written on the dead-donor rule in the last twenty-five years, scant attention has been paid to how it should be formulated, what its rationale is, and why it was accepted. The DDR can be formulated in terms of either a Don’t Kill rule or a Death Requirement, the former being historically rooted in absolutist ethics and the latter in a prudential policy aimed at securing trust in the transplant enterprise. I contend that the moral (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  40.  53
    Political reconciliation, the rule of law, and truces.Colleen Murphy - 2017 - Journal of Global Ethics 13 (1):28-39.
    Nir Eisikovits argues in A Theory of Truces that most contemporary conflicts wind down in a much more piecemeal fashion than our theorizing about the morality of ending wars suggests. Pauses in violence are achieved by securing agreement on narrow questions. Moreover, rather than hoping to do away with violence, theorizing would do best, he writes, to take as its starting point the fact of warfare as part of the human condition. Eisikovits aims to articulate the features of truce thinking, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  41.  34
    Geoff Tansey and Tasmin Rajotte (eds.), The Future Control of Food: A Guide to International Negotiations and Rules on Intellectual Property, Biodiversity and Food Security. [REVIEW]Sambit Mallick - 2009 - Agriculture and Human Values 26 (3):245-246.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  11
    The Implementation of Rulings of the Constitutional Court in Legislation (article in Lithuanian).Vytautas Sinkevičius - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):497-516.
    There are some problems in the implementation of rulings of the Constitutional Court. The legislator should make more efforts for implementing the concept of the provisions of the Constitution provided in the reasoning parts of rulings of the Constitutional Court. The Statute of the Seimas should be supplemented with provisions obligating structural sub-units of the Seimas to carry out permanent and systemic analysis of reasoning parts of rulings of the Constitutional Court. It would allow timely to prepare proposals how to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  26
    The Future Control of Food. A Guide to International Negotiations and Rules on Intellectual Property, Biodiversity and Food Security. Edited by Geoff Tansey & Tasmin Rajotte. Pp. 266. (Earthscan, London, 2008.) £19.99, ISBN 978-1-84407-429-7, paperback. [REVIEW]Marisa L. Wilson - 2010 - Journal of Biosocial Science 42 (1):141-142.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  44.  13
    War, Torture and Terrorism: Rethinking the Rules of International Security, Anthony F. Lang Jr., and Amanda Russell Beattie, eds.(London: Routledge, 2009), 232 pp., $160 cloth, $43 paper. [REVIEW]Richard Jackson - 2009 - Ethics and International Affairs 23 (4):419-421.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  3
    Cross-Border Security Over Tangibles.Eva-Maria Kieninger & Harry C. Sigmann - 2007 - Sellier de Gruyter.
    As cross-border trade and cross-border financing continue to increase while security rights over tangible property are governed by the law of the place where the moveable is situated, comparative knowledge of national secured transactions law is crucial for everyone using security rights over tangibles in a cross-border context. This book provides an in-depth examination of the key issues that arise when security rights are created, perfected and enforced in different European countries. Authored by experts on German, English, Dutch, French, Belgian, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  8
    Cross-Border Security Over Receivables.Eva-Maria Kieninger & Harry C. Sigman - 2009 - Sellier de Gruyter.
    Receivables transactions play an important role in modern national economies. Cross-Border Security over Receivables, which studies the law of seven European nations, provides an in-depth examination of the key substantive law issues, as well as a detailed examination of the private international law issues, particularly, the third party effects of assignments. National reports use practical cases to explore the issues and to highlight differences and similarities. The book will assist market participants and their counsel to better understand the rules of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  15
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri & Muhammad Ramzan Saeed - 2022 - Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy numbers to tackle this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  11
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  11
    Securing the Trustworthiness of the FDA to Build Public Trust in Vaccines.Leah Z. Rand, Daniel P. Carpenter, Aaron S. Kesselheim, Anushka Bhaskar, Jonathan J. Darrow & William B. Feldman - 2023 - Hastings Center Report 53 (S2):60-68.
    The Covid‐19 pandemic highlighted the need to examine public trust in the U.S. Food and Drug Administration (FDA) vaccine approval process and the role of political influence in the FDA's decisions. Ensuring that the FDA is itself trustworthy is important for justifying public trust in its actions, like vaccine approvals, thereby promoting public health. We propose five conditions of trustworthiness that the FDA should meet when it reviews vaccines, even during emergencies: consistency with rules, proper expert or political decision‐makers, proper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  30
    HIPAA Privacy Rule 2.0.Mark A. Rothstein - 2013 - Journal of Law, Medicine and Ethics 41 (2):525-528.
    On January 25, 2013, the Federal Register published the Department of Health and Human Services omnibus amendments to the Health Insurance Portability and Accountability Act Privacy, Security, Enforcement, and Breach Notification Rules. These modifications also include the final versions of the HIPAA regulation amendments mandated by the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act. Although the amended rules were effective on March 26, 2013, covered entities and their business associates have a compliance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 1000