Results for ' security evaluation'

1000+ found
Order:
  1.  9
    Ecological Security Evaluation for Marine Ranching Based on the PLTS/ANP Method: A Case Study of Rongcheng.Yuan-Wei Du & Qiong Song - 2022 - Complexity 2022:1-16.
    The evaluation index system of ecological security of marine ranching is based on the assumption that there is independence among evaluation indexes in the existing studies, which ignores the complex interactive paths of marine ranching as an artificial ecosystem. In this study, the MRES evaluation network model that includes interdependent relationships is established based on the Driver-Pressure-State-Impact-Response model and the analytic network process method. Then, the probabilistic linguistic term sets and analytic network process methods are used (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  11
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri & Muhammad Ramzan Saeed - 2022 - Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy numbers to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Evaluation and Security Features in e-learning.Daniela Chuda - 2009 - Communication and Cognition. Monographies 42 (1-2):63-73.
    No categories
     
    Export citation  
     
    Bookmark  
  5. Misuse made plain: Evaluating concerns about neuroscience in national security.Kelly Lowenberg, Brenda M. Simon, Amy Burns, Libby Greismann, Jennifer M. Halbleib, Govind Persad, David L. M. Preston, Harker Rhodes & Emily R. Murphy - 2010 - American Journal of Bioethics Neuroscience 1 (2):15-17.
    In this open peer commentary, we categorize the possible “neuroscience in national security” definitions of misuse of science and identify which, if any, are uniquely presented by advances in neuroscience. To define misuse, we first define what we would consider appropriate use: the application of reasonably safe and effective technology, based on valid and reliable scientific research, to serve a legitimate end. This definition presents distinct opportunities for assessing misuse: misuse is the application of invalid or unreliable science, or (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006)-Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust Model.Xiangli Qu, Jingwei Zhong & Xuejun Yang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3984--224.
     
    Export citation  
     
    Bookmark  
  7.  9
    A Critical Evaluation of Information Security Risks Associated with Networked Information Systems: A Case Study of Beitbridge Town Council.Newten Mujena - unknown
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  25
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  10
    Re-evaluating GPT-4’s bar exam performance.Eric Martínez - forthcoming - Artificial Intelligence and Law:1-24.
    Perhaps the most widely touted of GPT-4’s at-launch, zero-shot capabilities has been its reported 90th-percentile performance on the Uniform Bar Exam. This paper begins by investigating the methodological challenges in documenting and verifying the 90th-percentile claim, presenting four sets of findings that indicate that OpenAI’s estimates of GPT-4’s UBE percentile are overinflated. First, although GPT-4’s UBE score nears the 90th percentile when examining approximate conversions from February administrations of the Illinois Bar Exam, these estimates are heavily skewed towards repeat test-takers (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  12.  72
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  20
    Food Security: One of a Number of ‘Securities’ We Need for a Full Life: An Australian Perspective.Quentin Farmar-Bowers - 2014 - Journal of Agricultural and Environmental Ethics 27 (5):811-829.
    Although agriculture in Australia is very productive, the current food supply systems in Australia fail to deliver healthy diets to all Australians and fail to protect the natural resources on which they depend. The operation of the food systems creates ‘collateral damage’ to the natural environment including biodiversity loss. In coming decades, Australia’s food supply systems will be increasingly challenged by resource price inflation and climate change. Australia exports more than half of its current agricultural production. Government and business are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  14
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  11
    Security and Citizenship: Security, Im/migration and Shrinking Citizenship Regimes.Alexandra Dobrowolsky - 2007 - Theoretical Inquiries in Law 8 (2):629-662.
    This Article points to a widening gap between citizenship theories and practices. Although discourses of citizenship resonate widely and are used extensively by scholars and policy makers, the author argues that the social, economic, political and even psychological processes of citizenship are shrinking in a contemporary context of global insecurity where im/migration and ever more restrictive national security concerns have become enmeshed in law, as well as in the public consciousness. As a result, this Article explores new trends of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  11
    Global governance: evaluating the liberal democratic, Chinese, and Russian solutions.Edward A. Kolodziej - 2022 - New York, NY: Routledge.
    How do we prevent the next pandemic? Will governments successfully tackle climate change? Will they find ways to close the gap between the haves and have-nots and to eliminate poverty? Which solution - democratic or authoritarian - will determine the global governance of a flawed nation-state system? This unique contribution to global studies advances a multidisciplinary theory that the governments of all human societies are the tenuous outcome of the competing solutions to the Imperatives of Order, Welfare, and Legitimacy (OWL). (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  12
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  37
    Security Assessment of Teachers' Right to Healthy and Safe Working Environment: Data from a Mass Written Survey (article in Lithuanian).Gediminas Merkys, Algimantas Urmonas & Daiva Bubelienė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):575-594.
    This paper presents the results of an empirical study that reflects monitoring and evaluation of the implementation of some legal acts on the labour of the Republic of Lithuania. The analysis of legal documents at the national and international level is provided. A review of cognate studies conducted by foreign and Lithuanian researchers is presented and the professional situation of a Lithuanian teacher from the employee rights perspective is highlighted. The professional activities contexts and sectors, wherein systematic violations of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  38
    Evaluation of moral case deliberation at the Dutch Health Care Inspectorate: a pilot study.Wike Seekles, Guy Widdershoven, Paul Robben, Gonny van Dalfsen & Bert Molewijk - 2016 - BMC Medical Ethics 17 (1):31.
    BackgroundMoral case deliberation as a form of clinical ethics support is usually implemented in health care institutions and educational programs. While there is no previous research on the use of clinical ethics support on the level of health care regulation, employees of regulatory bodies are regularly confronted with moral challenges. This pilot study describes and evaluates the use of MCD at the Dutch Health Care Inspectorate.The objective of this pilot study is to investigate: 1) the current way of dealing with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  22. Securing Political Accountability to Future Generations with Retrospective Accountability.Tyler M. John - forthcoming - In Jacob Barrett, Hilary Greaves & David Thorstad (eds.), Essays on Longtermism. Oxford University Press.
    Political short-termism costs the global economy hundreds of billions to trillions of dollars annually, and leads to many millions of deaths from disasters and suboptimal spending. In this paper, I propose a futures assembly explicitly incentivised to promote the interests of future generations as a promising strategy to ameliorate short-termism. The assembly I propose is governed by citizens randomly selected from among the populace, who are rewarded in the future to the extent that they successfully promote the welfare of future (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  24
    Criminogenic Security of Law in the EU and Lithuanian Legislation.Viktoras Justickis & Vidmantas Egidijus Kurapka - 2009 - Jurisprudencija: Mokslo darbu žurnalas 117 (3):217-238.
    The study focuses on the phenomenon of crime-causing (criminogenic) law. It includes a review of related studies on such laws and their criminal side-effects, the change in the legislator’s liability for effects of enacted laws, and the effects of the legislator’s afflatus on the potential criminogenic effects of law. Of special concern are cases where the legislator is aware of the potential criminogenic side-effects of a new law but carelessly neglects them. The study evaluates the tool for detection of probable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. The Concept of Security.Jonathan Herington - 2012 - In Michael Selgelid & Christian Enemark (eds.), Ethical and Security Aspects of Infectious Disease Control: Interdisciplinary Perspectives. Ashgate.
    This chapter provides a philosophical analysis of the different meanings of “security” and, by so doing, identifies some key features of the concept of security. I begin by establishing a number of qualities which this chapter’s conceptual analysis should ideally possess. I then make an important distinction between security as a practice and security as a state of being, and argue that more attention should be paid to the latter if our goal is to interrogate the (...)
     
    Export citation  
     
    Bookmark   5 citations  
  25.  82
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Essential Contestability and Evaluation.Pekka Väyrynen - 2014 - Australasian Journal of Philosophy 92 (3):471-488.
    Evaluative and normative terms and concepts are often said to be "essentially contestable". This notion has been used in political and legal theory and applied ethics to analyse disputes concerning the proper usage of terms like democracy, freedom, genocide, rape, coercion, and the rule of law. Many philosophers have also thought that essential contestability tells us something important about the evaluative in particular. Gallie (who coined the term), for instance, argues that the central structural features of essentially contestable concepts secure (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  27. The UN Security Council, normative legitimacy and the challenge of specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human rights. Both (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  23
    The Morality of Security : A Theory of Just Securitization.Rita Floyd - 2019 - Cambridge University Press.
    When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  19
    National Security Environments, Patriotism, and Japanese Public Opinion.Koji Kagotani - 2015 - Japanese Journal of Political Science 16 (1):96-113.
    This study examines Japanese reactions to neighboring countries’ behavior by addressing possible micro-motives, such as patriotism, the rational demand for national defense, and retrospective policy evaluation. This theoretical development leads to distinctive hypotheses from different motivations and directly tests them using macro-data . This research will apply this framework to Japanese politics and will show that foreign threats stimulate patriotism in the public mind and enhance political support for national leaders. It will also demonstrate that the Japanese public has (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  6
    Large language models in cryptocurrency securities cases: can a GPT model meaningfully assist lawyers?Arianna Trozze, Toby Davies & Bennett Kleinberg - forthcoming - Artificial Intelligence and Law:1-47.
    Large Language Models (LLMs) could be a useful tool for lawyers. However, empirical research on their effectiveness in conducting legal tasks is scant. We study securities cases involving cryptocurrencies as one of numerous contexts where AI could support the legal process, studying GPT-3.5’s legal reasoning and ChatGPT’s legal drafting capabilities. We examine whether a) GPT-3.5 can accurately determine which laws are potentially being violated from a fact pattern, and b) whether there is a difference in juror decision-making based on complaints (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  24
    Doctrine as security? A systematic theological critique of the operational theological framework of the controversial South African neo-Pentecostal prophets.Collium Banda - 2021 - HTS Theological Studies 77 (4):1-10.
    This research article uses the theoretical framework of doctrine as believer's security to critique the theological framework behind the controversial activities reported amongst some South African neo-Pentecostal prophets, which include feeding congregants with grass, spraying them with insecticides and sexual violation of women congregants. The framework of the article falls within the discipline of systematic theology by raising the importance for South African Christians to develop a critical doctrinal framework for protecting themselves from controversial NPPs. The following main question (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  35.  4
    Re-evaluating Phoneme Frequencies.Jayden L. Macklin-Cordes & Erich R. Round - 2020 - Frontiers in Psychology 11.
    Causal processes can give rise to distinctive distributions in the linguistic variables that they affect. Consequently, a secure understanding of a variable's distribution can hold a key to understanding the forces that have causally shaped it. A storied distribution in linguistics has been Zipf's law, a kind of power law. In the wake of a major debate in the sciences around power-law hypotheses and the unreliability of earlier methods of evaluating them, here we re-evaluate the distributions claimed to characterize phoneme (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  4
    Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the power (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  38. Evaluating the Revisionist Critique of Just War Theory.Seth Lazar - 2017 - Daedalus 146 (1):113-124.
    Modern analytical just war theory starts with Michael Walzer's defense of key tenets of the laws of war in his Just and Unjust Wars. Walzer advocates noncombatant immunity, proportionality, and combatant equality: combatants in war must target only combatants; unintentional harms that they inflict on noncombatants must be proportionate to the military objective secured; and combatants who abide by these principles fight permissibly, regardless of their aims. In recent years, the revisionist school of just war theory, led by Jeff McMahan, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Evaluating the Legacy of Nonviolence in South Africa.Gail Presbey - 2006 - Peace and Change 31 (2):141-174.
    This paper engages an important debate going on in the literature regarding the efficacy of nonviolence in confronting unjust regimes. I will focus on the commentators who have claimed that nonviolence, if adhered to more resolutely, would have ended South African apartheid sooner. I will contrast them to Mandela’s account that both violence and nonviolence working in tandem were needed to bring a speedy and just resolution to South Africa’s crisis of racist governance. To consider South Africa an easy case (...)
     
    Export citation  
     
    Bookmark   1 citation  
  40.  71
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Whose social values? Evaluating Canada’s ‘death of evidence’ controversy.Maya J. Goldenberg - 2015 - Canadian Journal of Philosophy 45 (3):404-424.
    With twentieth- and twenty-first-century philosophy of science’s unfolding acceptance of the nature of scientific inquiry being value-laden, the persistent worry has been that there are no means for legitimate negotiation of the social or non-epistemic values that enter into science. The rejection of the value-free ideal in science has thereby been coupled with the spectres of indiscriminate relativism and bias in scientific inquiry. I challenge this view in the context of recently expressed concerns regarding Canada's death of evidence controversy. The (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  42.  47
    Irreducibly Thick Evaluation is not Thinly Evaluative.N. D. Cannon - 2020 - Ethical Theory and Moral Practice 23 (3-4):651-666.
    In this paper, I criticize the pairing of irreducible thickness with the traditional view of evaluation which says evaluation is a matter of encoding good or bad in some way. To do this, I first explicate the determination view, which holds that irreducibly thick concepts are to thin concepts as determinates are to determinables. I then show that, even if the determination view did establish irreducible thickness, it would not have proven that the evaluative is well understood as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  1
    Dynamic Evolution of Securities Market Network Structure under Acute Fluctuation Circumstances.Haifei Liu, Tingqiang Chen & Zuhan Hu - 2017 - Complexity:1-11.
    This empirical research applies cointegration in the traditional measurement method first to build directed weighted networks in the context of stock market. Then, this method is used to design the indicators and the value simulation for measuring network fluctuation and studying the dynamic evolution mechanism of stock market transaction networks as affected by price fluctuations. Finally, the topological structure and robustness of the network are evaluated. The results show that network structure stability is strong in the bull market stage and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  8
    Uses of 'the West': Security and the Politics of Order.Gunther Hellmann & Benjamin Herborth (eds.) - 2016 - Cambridge University Press.
    The notion of 'the West' is commonly used in politics, the media, and in the academic world. To date, our idea of 'the West' has been largely assumed and effective, but has not been examined in detail from a theoretical perspective. Uses of 'the West' combines a range of original and topical approaches to evaluate what 'the West' really does, and how the idea is being used in everyday political practice. This book examines a range of uses of 'the West', (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. Free Will and Evaluation: Remarks on Noel Hendrickson's 'Free Will Nihilism and the Question of Method'.Robert F. Allen - manuscript
    Noel Hendrickson believes that free will is separable from the “evaluative intuitions” with which it has been traditionally associated. But what are these intuitions? Answer: principles such as PAP, Β, and UR (6). The thesis that free will is separable from these principles, however, is hardly unique, as they are also eschewed by compatibilists who are unwilling to abdicate altogether evaluative intuitions. We are told in addition that there are “metaphysical senses” of free will that are not “relevant to responsibility” (...)
     
    Export citation  
     
    Bookmark  
  46. Research of the intelligent resource security of the nanoeconomic development innovation paradigm.Tetiana Ostapenko, Igor Britchenko & Peter Lošonczi - 2021 - Baltic Journal of Economic Studies 7 (5):159-168.
    The resources and resource potential of the innovative component of nanoeconomics are analyzed. The factors of production – classical types of resources such as land, labor, capital and technology – are described. Ways of influencing the security resources of nanoeconomics within the innovation paradigm are evaluated. The purpose of the study is to identify the factor of nanoeconomics in the formation of resource security potential in the innovation paradigm. To achieve this goal, the following tasks were set: to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  16
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  9
    Which Way Forward for Economic Security: Basic Income or Public Services?David Calnitsky & Tom Malleson - 2021 - Basic Income Studies 16 (2):125-167.
    Economic insecurity is an endemic problem across the rich countries of the Global North. What is the solution? This paper compares and contrasts two major proposals: the conventional welfare state package of public services and regulations versus a basic income. By comparing and contrasting these systems in three different contexts – a “nightwatchman” context, a neoliberal context, and a social democratic context – and carefully modeling the monetary equivalence between them, we are able to provide a more precise and compelling (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  29
    Ethical Issues Related to the Mass Marketing of Securities.Michael P. Coyne & Janice M. Traflet - 2008 - Journal of Business Ethics 78 (1-2):193-198.
    This paper examines ethical issues involved in the mass marketing of securities to individuals. The marketing of products deemed “socially questionable” or “sinful” (like tobacco and alcohol) has long been recognized as posing special ethical challenges (Kotler, P. and S. Levy: 1971, Harvard Business Review 49, 74–80; Davidson, D. K: 1996, Selling Sin: The Marketing of Socially Unacceptable Products (Quorum Press, Westport). We contend that marketers should consider securities (i.e. common stock, options) in a similar vein, as a potentially dangerous (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  50.  9
    Multi-criteria Evaluation in Strategic Environmental Assessment in the Creation of a Sustainable Agricultural Waste Management Plan for wineries: Case Study: Oplenac Vineyard.Boško Josimović, Nikola Krunić, Aleksandra Gajić & Božidar Manić - 2021 - Journal of Agricultural and Environmental Ethics 34 (1):1-27.
    Strategic Environmental Assessment, as a support to strategic planning, is a starting point in the creation of a sustainable concept of managing waste that is based on the principles of a circular economy. The role of SEA is to guide the planning process towards the goal of securing the best effects in relation to the quality of the living environment and the socio-economic aspects of development. SEA is also an instrument that can be used when making optimal decisions about spatial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000