Results for 'cognitive security'

1000+ found
Order:
  1. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  43
    The Model Gap: Cognitive Systems in Security Applications and Their Ethical Implications. [REVIEW]Tobias Matzner - 2016 - AI and Society 31 (1):95-102.
    The use of cognitive systems like pattern recognition or video tracking technology in security applications is becoming ever more common. The paper considers cases in which the cognitive systems are meant to assist human tasks by providing information, but the final decision is left to the human. All these systems and their various applications have a common feature: an intrinsic difference in how a situation or an event is assessed by a human being and a cognitive (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  4
    Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. [REVIEW]Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample & Shridat Sugrim - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  15
    Objectivity Applied to Embodied Subjects in Health Care and Social Security Medicine: Definition of a Comprehensive Concept of Cognitive Objectivity and Criteria for its Application.Hans Magnus Solli & António Barbosa da Silva - 2018 - BMC Medical Ethics 19 (1):1-16.
    Background The article defines a comprehensive concept of cognitive objectivity applied to embodied subjects in health care. The aims of this study were: to specify some necessary conditions for the definition of a CCCO that will allow objective descriptions and assessments in health care, to formulate criteria for application of such a CCCO, and to investigate the usefulness of the criteria in work disability assessments in medical certificates from health care provided for social security purposes. Methods The study (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  10
    Objectivity applied to embodied subjects in health care and social security medicine: definition of a comprehensive concept of cognitive objectivity and criteria for its application.Hans Magnus Solli & António Barbosa da Silva - 2018 - BMC Medical Ethics 19 (1):15.
    The article defines a comprehensive concept of cognitive objectivity applied to embodied subjects in health care. The aims of this study were: to specify some necessary conditions for the definition of a CCCO that will allow objective descriptions and assessments in health care, to formulate criteria for application of such a CCCO, and to investigate the usefulness of the criteria in work disability assessments in medical certificates from health care provided for social security purposes. The study design was (...)
    No categories
    Direct download (6 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  6. Ontology and Cognitive Outcomes.David Limbaugh, Jobst Landgrebe, David Kasmier, Ronald Rudnicki, James Llinas & Barry Smith - 2020 - Journal of Knowledge Structures and Systems 1 (1): 3-22.
    The term ‘intelligence’ as used in this paper refers to items of knowledge collected for the sake of assessing and maintaining national security. The intelligence community (IC) of the United States (US) is a community of organizations that collaborate in collecting and processing intelligence for the US. The IC relies on human-machine-based analytic strategies that 1) access and integrate vast amounts of information from disparate sources, 2) continuously process this information, so that, 3) a maximally comprehensive understanding of world (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  10
    Social Capital Dimensions in Household Food Security Interventions: Implications for Rural Uganda.Haroon Sseguya, Robert E. Mazur & Cornelia B. Flora - 2018 - Agriculture and Human Values 35 (1):117-129.
    We demonstrate that social capital is associated with positive food security outcomes, using survey data from 378 households in rural Uganda. We measured food security with the Household Food Insecurity Access Scale. For social capital, we measured cognitive and structural indicators, with principal components analysis used to identify key factors of the concept for logistic regression analysis. Households with bridging and linking social capital, characterized by membership in groups, access to information from external institutions, and observance of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  16
    Security, Planning and Justice: A Reply to Mintz-Woo.Jonathan Herington - 2018 - Ethics, Policy and Environment 21 (3):387-390.
    In a recent paper, I argued that the mere risk of climate-related harm was itself a harm, since it undermined the security of individuals subject to that risk. In his commentary, Mintz-Woo argues that my account of the value of security is mistaken. On his view, the value of belief-relative security is already well captured by standard theories of wellbeing, and the value of fact-relative security is illusory. In the following, I attempt to respond to his (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9. Cloud Network Security Based on Biometrics Cryptography Intelligent Tutoring System.Jihan Y. Abu Elreesh & Samy S. Abu-Naser - 2019 - International Journal of Academic Information Systems Research (IJAISR) 3 (3):37-70.
    Intelligent Tutoring System (ITS) is becoming more famous through over the world, it impacts the view to appear obviously actually that anybody could teach at any place in whenever. Without the aid of intelligent tutoring system, the learning question's student's response can't be understood in time. Thus, it is important to create an intelligent tutoring system keeping in mind the end goal to give learning support service for students. In this thesis, the thesis presents an Intelligent Tutoring System for Learning (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  22
    Emotions, Fear and Security in Sen – Nussbaum's Capability Approch.Mattia Baglieri - forthcoming - Governare la Paura. Journal of Interdisciplinary Studies.
    This article discusses the contribution of the Capability Approach within the theoretical framework of moral philosophy, political theory and political philosophy. Starting from delineating the contours to properly interpret this contemporary political doctrine, the A. recognises its primary roots in the human emotional development, as outlined by the American political philosopher Martha Nussbaum. Then the A. offers a comparative review of the Nussbaumean conception of emotions in Upheavals of Thought as well as in the most recent contributions on the topic. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  3
    Can Humans Find Security in Augmented and Virtual Realities?Elliot D. Cohen - 2020 - International Journal of Applied Philosophy 34 (1):31-41.
    Logic-Based Therapy, a mode of philosophical counseling I invented beginning in the mid 1980s, under the auspices of Cognitive Behavior Therapy founder Albert Ellis, takes metaphysical security as a sin qua non for human happiness. The goal of LBT is to help people overcome irrational thinking that leads to metaphysical insecurity and to help build constructive, philosophical thinking that promotes metaphysical security. However, the advent of augmented and digital reality are beginning to present new challenges to obtaining (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  12.  64
    Timescapes of Security: Clocks, Clouds, and the Complexity of Security Governance.Emilian Kavalski - 2009 - World Futures 65 (7):527 – 551.
    This article pulls together the disjointed complexification of security studies. Such analytical overview suggests that the perspective of “timescapes” allows for exploring the complexity that shapes meanings and practices of security and its governance. In this respect, it is the imperative to change that suggests the significance of complexity thinking to security studies—that is, it is alone in taking the discontinuities of global life seriously. Security, in this regard, is not merely about the clockwork of survival, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  4
    Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Sarah Cooney, Milind Tambe & Christian Lebiere - 2020 - Topics in Cognitive Science 12 (3):992-1011.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  48
    Evolutionary Biology Research, Entrepreneurship, and the Morality of Security-Seeking Behavior in an Imperfect Economy.Ronald K. Mitchell - 2004 - The Ruffin Series of the Society for Business Ethics 2004:263-287.
    This article investigates whether there is an underlying morality in the ways that human beings seek to obtain economic security within our imperfect economy, which can be illuminated through evolutionary biology research. Two research questions are the focus of the analysis: (1) What is the transaction cognitive machinery that is specialized for the entrepreneurial task of exchange-based security-seeking? and, (2) What are the moral implications of the acquisition and use of such transaction cognitions?Evolutionary biology research suggests within (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  8
    Chemical Substances on the Frontiers of Health Security: Metrological Controversies Over Endocrine Disruptors and Low Doses.Francis Chateauraynaud, Josquin Debaz & Matthieu Fintz - 2014 - Social Science Information 53 (4):437-452.
    The issue of low doses already has a long history. Initially linked with radioactivity, it can be traced through a series of metrological controversies about the evaluation of health and environmental risks. Building on recent developments, including the increased public profile of endocrine disruptors, this article offers an exploration of the different epistemic logics at work in research environments and of the expertise brought to bear on low doses. Based on an analysis of documents, participant observation in groups of experts, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16. Part VII. Towards Renewed Political Life and Citizenship: 19. Electronic Voting and Computer Security.Stephan Brunessaux - 2009 - In Bernard Reber & Claire Brossaud (eds.), Digital Cognitive Technologies: Epistemology and Knowledge Society. Iste.
     
    Export citation  
     
    Bookmark  
  17. World Ordering: A Social Theory of Cognitive Evolution.Emanuel Adler - 2019 - Cambridge University Press.
    Drawing on evolutionary epistemology, process ontology, and a social-cognition approach, this book suggests cognitive evolution, an evolutionary-constructivist social and normative theory of change and stability of international social orders. It argues that practices and their background knowledge survive preferentially, communities of practice serve as their vehicle, and social orders evolve. As an evolutionary theory of world ordering, which does not borrow from the natural sciences, it explains why certain configurations of practices organize and govern social orders epistemically and normatively, (...)
    No categories
     
    Export citation  
     
    Bookmark   2 citations  
  18.  52
    Biosecurity and the Division of Cognitive Labour.Thomas Douglas - 2013 - Journal of Medical Ethics 39 (4):193-194.
    The last 12 years have seen historically high levels of interest in biosecurity among life scientists, science policymakers, and academic experts on science and security policy. This interest was triggered by the 9/11 terrorist attacks, the ‘anthrax letters’ attack of the same year, and two virology papers, published early last decade, that were thought to raise serious biosecurity concerns.1 Ethicists have come relatively late to the game, but, in recent years, a lively debate has developed on ethical issues raised (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  19.  32
    Trials of Reason: Plato and the Crafting of Philosophy.David Wolfsdorf - 2008 - Oxford University Press.
    Interpretation -- Introduction -- Interpreting Plato -- The political culture of Plato's early dialogues -- Dialogue -- Character and history -- The mouthpiece principle -- Forms of evidence -- Desire -- Socrates and eros -- The subjectivist conception of desire -- Instrumental and terminal desire -- Rational and irrational desires -- Desire in the critique of Akrasia -- Interpreting Lysis -- The deficiency conception of desire -- Inauthentic friendship -- Platonic desire -- Antiphilosophical desires -- Knowledge -- Excellence as wisdom (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  20. An Intelligent Tutoring System for Learning Classical Cryptography Algorithms (CCAITS).Jihan Y. AbuEl-Reesh & Samy S. Abu-Naser - 2018 - International Journal of Academic and Applied Research (IJAAR) 2 (2):1-11.
    With the expansion of computer and information technologies, intelligent tutoring system are becoming more prominent everywhere throughout the world, it influences the scene to wind up plainly genuine that anyone could learn at anyplace in whenever. Be that as it may, without the help of intelligent tutoring system, the learning questions students’ response can't be understood in time. Thus it is important to create intelligent tutoring system (ITS) keeping in mind the end goal to give learning support service for students. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  63
    Meaningful Electronic Signatures Based on an Automatic Indexing Method.Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous & Nathanael Cottin - 2006 - Artificial Intelligence and Law 14 (3):161-175.
    Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  22.  38
    Informed Consent in Implantable BCI Research: Identifying Risks and Exploring Meaning.Eran Klein - 2016 - Science and Engineering Ethics 22 (5):1299-1317.
    Implantable brain–computer interface technology is an expanding area of engineering research now moving into clinical application. Ensuring meaningful informed consent in implantable BCI research is an ethical imperative. The emerging and rapidly evolving nature of implantable BCI research makes identification of risks, a critical component of informed consent, a challenge. In this paper, 6 core risk domains relevant to implantable BCI research are identified—short and long term safety, cognitive and communicative impairment, inappropriate expectations, involuntariness, affective impairment, and privacy and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  23. A Utilitarian Argument Against Torture Interrogation of Terrorists.Jean Maria Arrigo - 2004 - Science and Engineering Ethics 10 (3):543-572.
    Following the September 2001 terrorist attacks on the United States, much support for torture interrogation of terrorists has emerged in the public forum, largely based on the “ticking bomb” scenario. Although deontological and virtue ethics provide incisive arguments against torture, they do not speak directly to scientists and government officials responsible for national security in a utilitarian framework. Drawing from criminology, organizational theory, social psychology, the historical record, and my interviews with military professionals, I assess the potential of an (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  24.  7
    Reason and Reality: Realism and Idealism in Pragmatic Perspective.Nicholas Rescher - 2005 - Rowman & Littlefield Publishers.
    Reason and Reality expounds a pragmatic metaphysics that offers a new approach to this subject's traditional objective of providing us with a secure cognitive grip on the nature of reality. The characteristic nature of this metaphysical approach lies in its commitment to the idea that the requisite security is best and most reliably provided by functional considerations of pragmatic efficacy service the aims and purposes of rational inquiry and effective communication.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  31
    Epistemological Culture Theory: A Micro Theory of the Origin and Maintenance of Culture.Loren Demerath - 2002 - Sociological Theory 20 (2):208-226.
    This paper presents a new "epistemological" theory of culture that explains how individuals enhance their sense of security in the world by creating and maintaining culture as knowledge of the world. Using cognitive and affective processes previously ignored by culture theorists, the theory posits three dimensions of cultural production: we articulate, typify, and orient our experiences to make them meaningful. The theory asserts that we produce culture because it allows us to feel as if we understand our world, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  26.  25
    Unmaking and Remaking the World in Long-Term Solitary Confinement.Lisa Guenther - 2018 - Social Philosophy Today 34:7-25.
    This paper analyzes the Security Housing Unit in Pelican Bay State Prison as a form of weaponized architecture for the torture of prisoners and the unmaking of the world. I argue that through collective resistance, prisoners in the Pelican Bay Short Corridor have re-purposed this weaponized architecture as a tool for remaking the world by creating new, resistant and resurgent forms of social life. This collective practice of remaking of the world used the self-destructive tactic of a hunger strike (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  28
    Human Rights Attitudes: Dimensionality and Psychological Correlates.H. Michael Crowson - 2004 - Ethics and Behavior 14 (3):235 – 253.
    This study assesses the dimensionality and correlates of individuals' attitudes toward human rights. In previous research, the Attitudes Toward Human Rights Inventory (ATHRI) was assumed to measure a unidimensional phenomenon and, as such, was used as an omnibus measure of human rights attitudes. In this study, factor analysis revealed the presence of 3 factors accounting for the variance in the measure, Personal Liberties, Civilian Constraint, and Social Security. This finding provided partial replication of results obtained by Diaz-Veizades, Widaman, Little, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  6
    Communicative Action, Strategic Action, and Inter-Group Dialogue.Michael Rabinder James - 2003 - European Journal of Political Theory 2 (2):157-182.
    A consensus has emerged among many normative theorists of cultural pluralism that dialogue is the key to securing just relations among ethnic or cultural groups. However, few normative theorists have explored the conditions or incentives that enable inter-group dialogue versus those that encourage inter-group conflict. To address this problem, I use Habermas’s distinction between communicative and strategic action, since many models of inter-group dialogue implicitly rely upon communicative action, while many accounts of inter-group conflict rest upon strategic action. Drawing on (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Security, Territory, Population: Lectures at the Collège De France, 1977-1978.Michel Foucault - 2007 - Palgrave-Macmillan.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the Collège de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced in his 1976 course Society Must be Defended , Foucault sets out to study the foundations of this new technology of power over population. Distinct from punitive, disciplinary systems, the mechanisms of power are here finely entwined with the technologies of security, and (...)
     
    Export citation  
     
    Bookmark   103 citations  
  30.  3
    Arguments of Cause-And-Effect Relationships in Person’s Expectations With Divergent Thought.Vladimir Karapetyan - 2020 - Wisdom 16 (3):28-40.
    The goal of the research is to reveal the semantic divisions of cause-and-effect, receiving arguments, processing and presenting information through person’s implicit judgments. The methodological apparatus of the research has been chosen in the result of the combination of danger, emotion, provability connected with the subjective arguments of cause-and-effect relations. Through Ch. Osgood’s method of semantic differential, the Ishikawa diagram analytical tool and PARLA method the effects of word, consequently, the action grade, force-activity factors were revealed. The results of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Assistive Technologies in Dementia Care: An Updated Analysis of the Literature.Alessandro Pappadà, Rabih Chattat, Ilaria Chirico, Marco Valente & Giovanni Ottoboni - 2021 - Frontiers in Psychology 12.
    Objectives: Technology can assist and support both people with dementia and caregivers. Recently, technology has begun to embed remote components. Timely with respect to the pandemic, the present work reviews the most recent literature on technology in dementia contexts together with the newest studies about technological support published until October 2020. The final aim is to provide a synthesis of the timeliest evidence upon which clinical and non-clinical decision-makers can rely to make choices about technology in the case of further (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  7
    Communicative Action, Strategic Action, and Inter-Group Dialogue.Michael Rabinder James - 2003 - European Journal of Political Theory 2 (2):157-182.
    A consensus has emerged among many normative theorists of cultural pluralism that dialogue is the key to securing just relations among ethnic or cultural groups. However, few normative theorists have explored the conditions or incentives that enable inter-group dialogue versus those that encourage inter-group conflict. To address this problem, I use Habermas’s distinction between communicative and strategic action, since many models of inter-group dialogue implicitly rely upon communicative action, while many accounts of inter-group conflict rest upon strategic action. Drawing on (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Августинова Версія Закону - Європейський Пошук Легітимації Індивідуального.Oleh Turenko - 2013 - Схід 6 (126):282-286.
    The article describes the representation of St. Augustine's spirit and theological-historical implications of the law, its positive impact on the legitimization of European identity. Theologian distinguishes three types of law: a temporary, natural and eternal law. The latter is an all-encompassing force that controls all the processes of creation. It is implemented through the story and disclosed in the cognitive capabilities of a person to understand its course. Person of the eternal law is also the Holy Letter. It directs (...)
     
    Export citation  
     
    Bookmark  
  34.  4
    Machine Invention Systems: A (R)Evolution of the Invention Process?Dragos-Cristian Vasilescu & Michael Filzmoser - forthcoming - AI and Society.
    Current developments in fields such as quantum physics, fine arts, robotics, cognitive sciences or defense and security indicate the emergence of creative systems capable of producing new and innovative solutions through combinations of machine learning algorithms. These systems, called machine invention systems, challenge the established invention paradigm in promising the automation of – at least parts of – the innovation process. This paper’s main contribution is twofold. Based on the identified state-of-the-art examples in the above mentioned fields, key (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  24
    Critical Thinking and Sociopolitical Values Reflective of Political Ideology.Robert L. Williams, Kathleen B. Aspiranti & Katherine R. Krohn - 2010 - Inquiry: Critical Thinking Across the Disciplines 25 (3):22-30.
    Critical thinking measures have often been empirically associated with other cognitive dimensions but seldom with sociopolitical perspectives. Consequently, the current study examined the relationship of critical thinking to sociopolitical values reflective of political ideology, namely respect for civil liberties, emphasis on national security, militarism, and support for the Iraq War. In a sample of 232 undergraduates attending a Southeastern university, critical thinking correlated significantly with respect for civil liberties, emphasis on national security, militarism, and support for the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36. Modal Security.Justin Clarke-Doane & Dan Baras - 2021 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  37.  76
    Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  38. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Security, Territory, Population: Lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - République Française.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the Collège de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced in his 1976 course Society Must be Defended , Foucault sets out to study the foundations of this new technology of power over population. Distinct from punitive, disciplinary systems, the mechanisms of power are here finely entwined with the technologies of security, and (...)
     
    Export citation  
     
    Bookmark   40 citations  
  40. Early Relationships, Pathologies of Attachment, and the Capacity to Love.Monique Wonderly - forthcoming - In Adrienne Martin (ed.), Routledge Handbook of Love in Philosophy. New York, USA: Routledge.
    Psychologists often characterize the infant’s attachment to her primary caregiver as love. Philosophical accounts of love, however, tend to speak against this possibility. Love is typically thought to require sophisticated cognitive capacities that infants do not possess. Nevertheless, there are important similarities between the infant-primary caregiver bond and mature love, and the former is commonly thought to play an important role in one’s capacity for the latter. In this work, I examine the relationship between the infant-primary caregiver bond and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  19
    Waarheidsliefde En Relativisme.Arnold Burms & Herman de Dijn - 1979 - Tijdschrift Voor Filosofie 41 (4):590 - 614.
    One can assign three different aims to the desire for knowledge : utility, pleasure, truth-for-truth's-sake. Whereas the first two aims have a concretely determinable content and therefore look evident, the third one has been looked upon as strange and problematic : it is not immediately clear what kind of value is defended in this case. Popper is one of the recent defenders of the traditional ideal of truth-for-truth's-sake. He wants to defend the ideal against three positions : a primitive taboo-ridden (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Waarheidsliefde en relativisme.Arnold Burms & Herman De Dijn - 1979 - Tijdschrift Voor Filosofie 41 (4):590-614.
    One can assign three different aims to the desire for knowledge : utility, pleasure, truth-for-truth's-sake. Whereas the first two aims have a concretely determinable content and therefore look evident, the third one has been looked upon as strange and problematic : it is not immediately clear what kind of value is defended in this case. Popper is one of the recent defenders of the traditional ideal of truth-for-truth's-sake. He wants to defend the ideal against three positions : a primitive taboo-ridden (...)
    No categories
    Translate
     
     
    Export citation  
     
    Bookmark  
  43.  8
    Retrotraction and the Young Leibniz's Critique of Hobbesian Sovereignty Notions.William F. Drischler - 2011 - Kritike 5 (1):99-107.
    Leibniz’ 1669-1671 manuscript “Elements of Natural Right” – first published in the 21st century – provides keen insights into problems of political philosophy and marks the outset of Leibniz’ engagement with the Hobbesian indivisible sovereignty idea. While concurring with the Sage of Malmesbury that any state worthy of the name is a security system, Leibniz – via reversal of Hobbes’ contention security produces happiness – throws open a series of questions related to “retrotraction” and the state legitimacy problematic. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  9
    Segmentation du travail cognitif et individualisation du salaire.Andrea Fumagalli & Cristina Morini - 2008 - Multitudes 32 (1):65.
    The paper deals with the transformation of labour and wages differentiation, providing some empirical examples in the diffusion of cognitive labour, especially in the publishing industry. The first part gives a definition of cognitive labour by focussing on the role played by relation activities and learning processes. It is the type of labour which is able, better than others, to exploit the new types of dynamic scale economies which affect the way of accumulation of cognitive capitalism. Network (...)
    Direct download (4 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  45. Children at Play: Thoughts About the Impact of Networked Toys in the Game of Life and the Role of Law.Ulrich Gaspar - 2018 - International Review of Information Ethics 27.
    Information communication technology is spreading fast and wide. Driven by convenience, it enables people to undertake personal tasks and make decisions more easily and efficiently. Convenience enjoys an air of liberation as well as self-expression affecting all areas of life. The industry for children's toys is a major economic market becoming ever more tech-related and drawn into the battle for convenience. Like any other tech-related industry, this battle is about industry dominance and, currently, that involves networked toys. Networked toys aim (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  2
    Unmaking and Remaking the World in Long-Term Solitary Confinement.Lisa Guenther - 2018 - Journal of Critical Phenomenology 1 (1):74.
    In The Body in Pain, Elaine Scarry analyzes the structure of torture as an unmaking of the world in which the tools that ought to support a person’s embodied capacities are used as weapons to break them down. The Security Housing Unit of California’s Pelican Bay State Prison functions as a weaponized architecture of torture in precisely this sense; but in recent years, prisoners in the Pelican Bay Short Corridor have re-purposed this weaponized architecture as a tool for remaking (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Writing Security United States Foreign Policy and the Politics of Identity.David Campbell - 1992
     
    Export citation  
     
    Bookmark   17 citations  
  48. Food Security and Biodiversity: Can We Have Both? An Agroecological Analysis. [REVIEW]Michael Jahi Chappell & Liliana A. LaValle - 2011 - Agriculture and Human Values 28 (1):3-26.
    We present an extensive literature review exploring the relationships between food insecurity and rapid biodiversity loss, and the competing methods proposed to address each of these serious problems. Given a large and growing human population, the persistence of widespread malnutrition, and the direct and significant threats the expanding agricultural system poses to biodiversity, the goals of providing universal food security and protecting biodiversity seem incompatible. Examining the literature shows that the current agricultural system already provides sufficient food on a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  49.  19
    Routines quotidiennes et moments fatidiques.Claude Javeau - 2006 - Cahiers Internationaux de Sociologie 121 (2):227.
    Lorsque l’individu de la surmodernité, placé dans un environnement dominé par le risque et entraîné dans le « grand dérangement », est soustrait à sa routine et confronté à un moment fatidique, c’est-à-dire lourd pour lui de conséquences mal maîtrisables a priori, il est appelé à passer d’un système expert à un autre système expert, ce que peut lui faciliter une réflexivité cognitive bien alimentée.When the individual of the late modernity, situated within an environment dominated by risk and swept (...)
    No categories
    Direct download (5 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  50.  71
    Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 1000