Results for 'NSA'

44 found
Order:
  1.  4
    Khvānsārīʹnāmah: sharḥ-i aḥvāl va ās̲ār va majmūʻah-i maqālāt-i ustād-i faqīd Duktur Muḥammad Khvānsārī, bih munāsabat-i yakumīn sālgard-i darguz̲asht.Muḥammad Khvānsārī & Aḥmad Kitābī (eds.) - 2011 - Tihrān: Pizhūhishgāh-i ʻUlūm-i Insānī va Muṭālaʻāt-i Farhangī.
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. al-Ḥāshīyah ʻalá shurūḥ al-Ishārāt (al-Ishārāt wa-Sharḥ al-Ishārāt wa-Sharḥ al-Sharḥ wa-Ḥāshiyat al-Bāghanawī).Ḥusayn ibn Muḥammad Khuwānsārī - 1999 - Qum: Markaz Intishārāt Daftar Tablīghāt Islāmī. Edited by Aḥmad ʻĀbidī.
     
    Export citation  
     
    Bookmark  
  3. Manṭiq-i ṣūrī.Muḥammad Khvānsārī - 1968 - Tihrān: Dānishgāh-i Tihrān.
     
    Export citation  
     
    Bookmark  
  4. al-Ḥāshīyah ʻalá al-Shifāʼ: (al-Ṭabīʻīyāt, al-maqālah al-ūlá wa-al-thānīyah).Jamāl al-Dīn Khvānsārī - 1999 - [Qum]: Muʼtamar Āqā Ḥusayn al-Khuwānsārī. Edited by Riz̤ā Ustādī & Avicenna.
     
    Export citation  
     
    Bookmark  
  5.  4
    Kuls̲ūm nanah.Jamāl al-Dīn Khvānsārī - 1999 - Köln, Germany: Ghassedak Azadeh Sepehri Verlag. Edited by Bahrām Chūbīnah.
    Svar på spørgsmål om kvinder bl. a. om bryllupsnatten, at føde børn, at gå i bad, at få gæster, såkaldte stedsøsterlige forhold (lesbiske forhold) mm. Skrevet af den øverste muslimske præst under Safavidernes dynasti.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. Del exilio español hasta una idea de América. Abellán, un pionero de la historia de las ideas.Fernando Aínsa - 2012 - In Villacañas Berlanga, L. J., Antonio Rivera García & José Luis Abellán (eds.), Ensayos sobre historia del pensamiento español: homenaje a José Luis Abellán. Murcia: Editum, Ediciones de la Universidad de Murcia.
     
    Export citation  
     
    Bookmark  
  7. Formal logika.Ănsărdin Musa - 1982 - [Ürümqi]: Shinjang Khălq Năshriyati.
     
    Export citation  
     
    Bookmark  
  8. Irādat alá al-ḥuduth al-dahrī.Jamāl al-Khwānsārī - 2002 - In Muḥammad ibn Asʻad Dawwānī (ed.), Sabʻ rasāiʼl. Tihrān: Mīrās̲-i Maktūb.
  9. جشن‌نامۀ استاد دکتر محمد خوانسارى.Ḥasan Ḥabībī & Muḥammad Khvānsārī (eds.) - 2005 - Tihrān: Nashr-i Ās̲ār.
     
    Export citation  
     
    Bookmark  
  10.  95
    Nsa Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden.George R. Lucas - 2014 - Ethics and International Affairs 28 (1):29-38.
    Whatever else one might say concerning the legality, morality, and prudence of his actions, Edward Snowden, the former U.S. National Security Agency contractor, is right about the notion of publicity and informed consent, which together constitute the hallmark of democratic public policy. In order to be morally justifiable, any strategy or policy involving the body politic must be one to which it would voluntarily assent when fully informed about it. This, in essence, was Snowden's argument for leaking, in June 2013, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  1
    Kānsāng kānraprū nai sangkhom Thai =.Chairat Charoensin-O.-Larn (ed.) - 2019 - Krung Thēp: Khrōngkān Mēthī Wičhai ʻĀwusō.
    Influence of Thai philosophy on the way of thinking of Thai people.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  3
    Sŏnsa sidae koindol ŭi sŏngjwa e saegyŏjin Han'guk ŭi kodae ch'ŏrhak: Han'guk kodae ch'ŏrhak ŭi chaebalgyŏn.Pyŏng-nyŏl Yun - 2018 - Sŏul-si: Yemun Sŏwŏn.
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  14. Snēhabali, athavā, Alphōnsāmma. R̲ōmuḷūs - 1984 - Bharaṇaṅṅānaṃ: Tōmas Mūttēṭaṃ.
    Biography of Sister Alphōnsa, 1910-1946, Catholic nun from Kerala.
     
    Export citation  
     
    Bookmark  
  15.  10
    Metaphors and Metonyms of Nsa, ‘the Hand’ in Akan.Kofi Aygekum - 2016 - Pragmatics and Cognition 23 (2):300-323.
    This paper looks at the metaphorical and metonymic expressions derived fromnsa, ‘hand’. I will analyse and discuss hand metaphoric and metonymic expressions in relation with the universal concept of the agility and versatility of the hand as an important aspect of the human being. The paper projects the concept of the hand in the Akan cultural system and looks at how it has expanded into compound words, idioms and proverbs. We will look at the cognitive, semantics, sociolinguistics and pragmatics ofnsa, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  3
    Hanam Sŏnsa yŏn'gu.Ch'ang-hwa Yun (ed.) - 2015 - Sŏul: Minjoksa.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  11
    Metaphors and Metonyms of Nsa, ‘the Hand’ in Akan.Kofi Agyekum - 2016 - Pragmatics and Cognition 23 (2):300-323.
    This paper looks at the metaphorical and metonymic expressions derived from nsa, ‘hand’. I will analyse and discuss hand metaphoric and metonymic expressions in relation with the universal concept of the agility and versatility of the hand as an important aspect of the human being. The paper projects the concept of the hand in the Akan cultural system and looks at how it has expanded into compound words, idioms and proverbs. We will look at the cognitive, semantics, sociolinguistics and pragmatics (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. Unbong Sŏnsa simsŏngnon.Unbong Taeji - 2011 - Sŏul-si: Tongguk Taehakkyo Ch'ulp'anbu. Edited by Chong-su Yi.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Jñānsāra. Yaśovijaya - 1977
    No categories
     
    Export citation  
     
    Bookmark  
  20. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  9
    Notes on the NSA.W. Habib - 2014 - Telos: Critical Theory of the Contemporary 2014 (169):139-143.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22. Mīmānsā to bunpōgaku no shisō.Hajime Nakamura - 1995 - Tōkyō: Shunjūsha.
     
    Export citation  
     
    Bookmark  
  23. Zindagīʹnāmah va khadamāt-i ʻilmī va farhangī-i Duktur Muḥammad Khvānsārī =.Umīd Qanbarī (ed.) - 2005 - Tihrān: Anjuman-i Ās̲ār va Mafākhir-i Farhangī.
    Biography and academic life of Muḥammad Khvānsārī, an Iranian university professor and philosopher.
     
    Export citation  
     
    Bookmark  
  24.  20
    Epistemology of the Bhāṭṭa School of Pūrva Mīmānsā.Govardhan P. Bhatt - 1962 - Varanasi,: Chowkhamba Sanskrit Series Office.
  25.  7
    Manṭiq-i Muḥammad Ḥusayn Fāz̤il Tūnī: hamrāh-i Tarjumān-i aḥvāl-i Fāz̤il Tūnī az Muḥammad Khvānsārī.Fāz̤il Tūnī & Muḥammad Ḥusayn - 2007 - Tihrān: Intishārāt-i Mawlá. Edited by Mahnāz Raʼīsʹzādah & Muḥammad Khvānsārī.
    On Islamic philosophy with special reference to logic in Islamic philosophy.
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  9
    Chosŏn ch'ŏrhak chŏnsa.Hyŏk-ch'ŏl O. (ed.) - 2010 - [P'yŏngyang]: Sahoe Kwahak Ch'ulp'ansa.
    1. Kodae ch'ŏrhak sasang -- 2. Chungse ch'ŏrhak sasang 1 (Se nara sigi wa Parhae mit hugi Silla sigi) -- 3. Chungse ch'ŏrhak sasang 2 (Koryŏ sigi) -- 4. Chungse ch'ŏrhak sasang 3 (Yijo chŏnban'gi) -- 5. Chungse ch'ŏrhak sasang 4 (Yijo hugan'gi) -- 6. Chungse ch'ŏrhak sasang 5 (Yijo hugan'gi) -- 7. Kŭndae ch'ŏrhak sasang 1 -- 8. Kŭndae ch'ŏrhak sasang 2 -- 9. Puryo pulgul ŭi hyŏngmyŏng t'usa Kim Hyŏng-jik Sŏnsaengnim ŭi ch'ŏrhak sasang -- 10. Widaehan suryŏng Kim (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Whistleblowing as civil disobedience.William E. Scheuerman - 2014 - Philosophy and Social Criticism 40 (7):609-628.
    The media hoop-la about Edward Snowden has obscured a less flashy yet more vital – and philosophically relevant – part of the story, namely the moral and political seriousness with which he acted to make the hitherto covert scope and scale of NSA surveillance public knowledge. Here I argue that we should interpret Snowden’s actions as meeting most of the demanding tests outlined in sophisticated political thinking about civil disobedience. Like Thoreau, Gandhi, King and countless other grass-roots activists, Snowden has (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  28. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  29.  28
    Data flows and water woes: The Utah Data Center.Mél Hogan - 2015 - Big Data and Society 2 (2).
    Using a new materialist line of questioning that looks at the agential potentialities of water and its entanglements with Big Data and surveillance, this article explores how the recent Snowden revelations about the National Security Agency have reignited media scholars to engage with the infrastructures that enable intercepting, hosting, and processing immeasurable amounts of data. Focusing on the expansive architecture, location, and resource dependence of the NSA’s Utah Data Center, I demonstrate how surveillance and privacy can never be disconnected from (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  35
    Artificial Immune System–Negative Selection Classification Algorithm (NSCA) for Four Class Electroencephalogram (EEG) Signals.Nasir Rashid, Javaid Iqbal, Fahad Mahmood, Anam Abid, Umar S. Khan & Mohsin I. Tiwana - 2018 - Frontiers in Human Neuroscience 12:424534.
    Artificial Immune Systems (AIS) are intelligent algorithms derived on the principles inspired by human immune system. In this research work, electroencephalography (EEG) signals for four distinct motor movement of human limbs are detected and classified using Negative Selection Classification Algorithm (NSCA). For this study, a widely studied open source EEG signal database (BCI IV - Graz dataset 2a, comprising 9 subjects) has been used. Mel Frequency Cepstral Coefficients (MFCCs) are extracted as selected feature from recorded EEG signals. Dimensionality reduction of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  4
    Kanssakulkijat: monilajisten kohtaamisten jäljillä.Tuomas Räsänen & Nora Schuurman (eds.) - 2020 - Helsinki: Suomalaisen Kirjallisuuden Seura.
    Länsimaisessa kulttuurissa ihminen on perinteisesti esitetty omalakisena ja itseriittoisena toimijana, vaikka yhteiskunta on aina rakentunut monilajisen vuorovaikutuksen varaan. Eläimillä on ollut ja on edelleenkin merkittävä vaikutus ihmisten historiaan ja yhteiskuntaan. Kanssakulkijat valottaa niitä erilaisia tapoja, joilla ihmiset ovat suhtautuneet kohtaamiinsa eläimiin ja jakaneet arkensa, työnsä ja kotinsa niiden kanssa. Monitieteinen teos nostaa esiin ihmisten ja eläinten vuorovaikutuksen moninaisia muotoja ja erittelee niissä tapahtuneita muutoksia Suomessa.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  18
    Following Snowden around the World.Andrew A. Adams, Kiyoshi Murata, Yasunori Fukuta, Yohko Orito & Ana María Lara Palma - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):311-327.
    Purpose A survey of the attitudes of students in eight countries towards the revelations of mass surveillance by the US’ NSA and the UK’s GCHQ has been described in an introductory paper and seven country-specific papers. This paper aims to present a comparison of the results from these countries and draws conclusions about the similarities and differences noted. Design/methodology/approach A questionnaire was deployed in Germany, Japan, Mexico, New Zealand, The People’s Republic of China, Spain, Sweden and Taiwan. The original survey (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  24
    Rusbridger’s “The Snowden Leaks and the Public” and Mill’s Utilitarianism.Casey Hladik - 2014 - Stance 7 (1):29-40.
    In the wake of the controversial Snowden leaks, Alan Rusbridger observes that the National Security Administration [NSA] and Government Communications Headquarters [GCHQ] maintain that their mass spying is justified because it prevents the world from “going dark.” This paper will explore the meaning and philosophical significance of “going dark” and argue that the NSA and GCHQ’s claim appeals—wittingly or unwittingly—to J.S. Mill’s ethical principle of utility. This paper will therefore critique this argument within Mill’s utilitarian framework to demonstrate that its (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34.  4
    The activist's Tao Te Ching: ancient advice for a modern revolution.William Martin - 2016 - Novato, CA: New World Library.
    Change and anger are in the air. “We are the 99%,” “black lives matter,” and “love is love” have become part of the lexicon. Previously unquestioned institutions (police, military, the NSA) are under scrutiny. Heat waves, floods, and earthquakes seem to be increasing. Could there be a silver lining? William Martin turns to the Tao Te Ching and finds that while Taoism is known for its quiet, enigmatic wisdom, the Tao can also have the cleansing force of a rushing river. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. Turing’s Mystery Machine.Diane Proudfoot & Jack Copeland - 2019 - American Philosophical Association Newsletter for Philosophy and Computers 18 (2):1-6.
    This is a detective story. The starting-point is a philosophical discussion in 1949, where Alan Turing mentioned a machine whose program, he said, would in practice be “impossible to find.” Turing used his unbreakable machine example to defeat an argument against the possibility of artificial intelligence. Yet he gave few clues as to how the program worked. What was its structure such that it could defy analysis for (he said) “a thousand years”? Our suggestion is that the program simulated a (...)
    No categories
     
    Export citation  
     
    Bookmark  
  36.  3
    Following Snowden: a cross-cultural study on the social impact of Snowden’s revelations.Kiyoshi Murata, Andrew A. Adams & Ana María Lara Palma - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):183-196.
    Purpose This paper aims to introduce a cross-cultural study of the views and implications of Snowden’s revelations about NSA/GCHQ surveillance practices, undertaken through surveys administered in eight countries. The aims and academic and social significance are explained, and justification is offered for the methods used. Design/methodology/approach Pilot surveys were deployed in two countries, following which revised versions were deployed in eight countries. Quantitative analysis of suitable answer sets and quantitative analysis were performed. Findings Through the pilot survey studies conducted in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  19
    Legislating clear-statement regimes in national-security law.Jonathan F. Mitchell & GMU Law School Submitter - unknown
    Congress's national-security legislation will often require clear and specific congressional authorization before the executive can undertake certain actions. The War Powers Resolution, for example, prohibits any law from authorizing military hostilities unless it "specifically authorizes" them. And the Foreign Intelligence Surveillance Act of 1978 required laws to amend FISA or repeal its "exclusive means" provision before they could authorize warrantless electronic surveillance. But efforts to legislate clear-statement regimes in national-security law have failed to induce compliance. The Clinton Administration inferred congressional (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  33
    Why Snowden and not Greenwald? On the Accountability of the Press for Unauthorized Disclosures of Classified Information.Dorota Mokrosinska - 2020 - Law and Philosophy 39 (2):203-238.
    In 2013, following the leaks by Edward Snowden, The Guardian published a number of classified NSA documents. Both leaking and publishing leaks violate the law prohibiting unauthorized disclosures. Accordingly, there are two potential targets for prosecution: the leakers and the press. In practice, however, only the leakers are prosecuted: Snowden is facing a threat of 30 years’ imprisonment; no charges have been made against The Guardian. If both leaking and publishing leaks violate the law, why prosecute only the leakers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39. Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Herramientas para el análisis y monitoreo en Redes Sociales.Juan Gutierrez - 2011 - International Review of Information Ethics 16:33-40.
    Networks or partnerships are used by humans since the beginning of humanity and its analysis raises concerns from many different sectors of society. In the era of the network of networks, Internet, networks are generated by virtual connections of the agents. Social Network Analysis studies the relationship relation to each other, the social structure. It is an area that is emerging as essential in decision-making processes for its ability to analyze and intervene in the behaviour of structures. We analyze three (...)
    No categories
     
    Export citation  
     
    Bookmark  
  41. Indo roppa tetsugaku.Hajime Nakamura - 1995 - Tōkyō: Shujūsha.
    1. Yōga to Sānkiya no shisō -- Niyāya to Vaishēshika no shisō -- 3. Mīmānsā to bunpōgaku no shisō -- 4. Vēdānta shisō no tenkai.
     
    Export citation  
     
    Bookmark  
  42.  10
    Digesting agriculture development: nutrition-oriented development and the political ecology of rice–body relations in India.Carly E. Nichols - 2022 - Agriculture and Human Values 39 (2):757-771.
    Nutrition-sensitive agriculture has emerged as a major development paradigm that works to diversify crops and diets throughout the Global South in order to improve nutritional outcomes. Drawing on a conceptual framework from political ecologies of health that looks at political economic factors, social discourse, and embodied, material experiences of food, I analyze qualitative and ethnographic data from an integrated NSA intervention in Madhya Pradesh and Jharkhand, India. The analysis shows that while embodied experiences of differing rice varieties were central to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  34
    The Edward Snowden Case and the Morality of Secrecy.Cynthia Nolan - 2017 - Catholic Social Science Review 22:291-310.
    When Edward Snowden decided in 2013 to hand over thousands of classified documents to reporters, he launched a firestorm of criticism aimed at both himself and the US National Security Agency. The NSA’s collection of metadata ended in 2015 as a direct result of Snowden’s revelations. He continues to leak classified documents from his political asylum in Russia. This article uses just war theory, theories of civil disobedience, and Church teaching on resistance to political authority to examine Snowden’s whistleblower decision. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  8
    Sŏul ŭi chesa, kamsa wa kiwŏn ŭi momchit.Chong-ch'ŏn Pak - 2013 - Sŏul T'ŭkpyŏlsi: Sŏul T'ŭkpyŏlsi Sisa P'yŏnch'an Wiwŏnhoe.
    1. Chesa ran muŏt in'ga -- 2. Sŏnsa-Koryŏ sidae ŭi tawŏnjŏk chesa munhwa -- 3. Chosŏn sidae Sŏul ŭi yugyosik chesa munhwa -- 4. Chesa munha ŭi kŭndaejŏk pyŏnyong kwa hyŏndaejŏk sesokhwa.
    Direct download  
     
    Export citation  
     
    Bookmark