Results for 'security spillage'

1000+ found
Order:
  1. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  2. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  3.  66
    Myanmar–China Relations: Interlocking Interests but Independent Output.N. Ganesan - 2011 - Japanese Journal of Political Science 12 (1):95-111.
    The bilateral relationship between China and Myanmar is important and intricate despite being asymmetrical in China's favour. Whereas most observers regard the relationship as being heavily weighted in China's favour, Myanmar does have a fair amount of latitude within the relationship that is informed by historical, economic, and strategic considerations. The nationalism and xenophobia present in the attitudes of elite from the Myanmar military junta is both recognized and understood by China that is keen to have a stable peripheral environment. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  4
    Security: a philosophical investigation.David A. Welch - 2022 - New York: University of Waterloo, University Press.
    How do we know when we are investing wisely in security? Answering this question requires investigating what things are worth securing (and why); what threatens them; how best to protect them; and how to think about it. Is it possible to protect them? How best go about protecting them? What trade-offs are involved in allocating resources to security problems? This book responds to these questions by stripping down our preconceptions and rebuilding an understanding of security from the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  11
    Vertical Security in the Megacity.Peter Adey - 2010 - Theory, Culture and Society 27 (6):51-67.
    By excavating the ambiguities of the helicopter’s machinic-prosthetic view, a perspective which may be distant and abstract, while also near and viscerally present, this article will explore how megacity security is increasingly waged and consumed. The article argues that megacity security marches to the rotator-beat of the police helicopter, fuelled by military technophilia and in a context of the biopolitical desertion of the megacities’ most vulnerable. The article takes three aspects, visually expressed and constituted through aerial-helicopter security. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Modal Security.Justin Clarke-Doane & Dan Baras - 2021 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  7.  4
    The security principle: from serenity to regulation.Frédéric Gros - 2019 - Brooklyn, NY: Verso. Edited by David Broder.
    Introduction -- The serenity of the wise man -- The seventh day of history -- The guarantor-state -- Biosecurity -- Conclusion -- Appendix -- Index.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  23
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  8
    Food Security and Food Safety for the Twenty-first Century: Proceedings of APSAFE2013.Soraj Hongladarom (ed.) - 2015 - Singapore: Imprint: Springer.
    This book is a collection of selected papers that were presented at the First International Conference of the Asia-Pacific Society for Agricultural and Food Ethics (APSAFE 2013), which was held at Chulalongkorn University from November 28 - 30, 2013. The papers are interdisciplinary, containing insights into food security and food ethics from a variety of perspectives, including, but not limited to, philosophy, sociology, law, sociology, economics, as well as the natural sciences. The theme of the conference was to consider (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  11.  3
    Security, technology and global politics: thinking with Virilio.Mark J. Lacy - 2014 - London: Routledge.
    This book analyses some of the key problems explored in Paul Virilio's theorising on war and security.Virilio is one of the most challenging and provocative critics of technology, war and globalisation. While many commentators focus on the new possibilities for mobility and communication in an interconnected world, Virilio is interested in the role that technology and security play in the shaping of our bodies and how we come to see the world -- what he terms the 'logistics of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  8
    Nordic Societal Security: Convergence and Divergence.Sebastian Larsson & Mark Rhinard (eds.) - 2021 - New York: Routledge/Taylor & Francis Group.
    This book compares and contrasts publicly espoused security concepts in the Nordic region, and explores the notion of societal security. Outside observers often assume that Nordic countries take similar approaches to the security and safety of their citizens. This book challenges that assumption and traces the evolution of 'societal security', and its broadly equivalent concepts, in Sweden, Norway, Denmark and Finland. The notion of societal security is deconstructed and analysed in terms of its different meanings (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  14.  49
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  15. Security.Pinar Bilgin - 2020 - In Arlene B. Tickner & Karen Smith (eds.), International relations from the global South: worlds of difference. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  16. Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2013 - Iris 34.
    No categories
     
    Export citation  
     
    Bookmark  
  17.  87
    Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  18. Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart & Arnold Ira Davidson.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   147 citations  
  19. Intentionally secure : teaching students to become responsible and ethical users.Judith Lewandowski - 2019 - In Ashley Blackburn, Irene Linlin Chen & Rebecca Pfeffer (eds.), Emerging trends in cyber ethics and education. Hershey, PA: Information Science Reference.
     
    Export citation  
     
    Bookmark   1 citation  
  20.  92
    Securing the Empirical Value of Measurement Results.Kent W. Staley - 2020 - British Journal for the Philosophy of Science 71 (1):87-113.
    Reports of quantitative experimental results often distinguish between the statistical uncertainty and the systematic uncertainty that characterize measurement outcomes. This article discusses the practice of estimating systematic uncertainty in high-energy physics. The estimation of systematic uncertainty in HEP should be understood as a minimal form of quantitative robustness analysis. The secure evidence framework is used to explain the epistemic significance of robustness analysis. However, the empirical value of a measurement result depends crucially not only on the resulting systematic uncertainty estimate, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  21. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22.  14
    Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  23.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  14
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  27. The Concept of Security in Political Violence.Jessica Wolfendale - 2012 - In Marie Breen-Smyth (ed.), Ashgate Companion to Political Violence. Ashgate. pp. 99-118.
  28. Ontological security and the emotional significance of sovereignty.Nina C. Krickel-Choi - 2023 - In Hannes Černy & Janis Grzybowski (eds.), Variations on sovereignty: contestations and transformations from around the world. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  29.  48
    Private Security Companies and Institutional Legitimacy: Corporate and Stakeholder Responsibility.Heather Elms & Robert A. Phillips - 2009 - Business Ethics Quarterly 19 (3):403-432.
    The private provision of security services has attracted a great deal of recent attention, both professional and popular. Much of that attention suggests the questioned moral legitimacy of the private vs. public provision of security. Linking the literature on moral legitimacy and responsibility from new institutional and stakeholder theories, we examine the relationship between moral legitimacy and responsible behavior by both private security companies (PSCs) and their stakeholders. We ask what the moral-legitimacy-enhancing responsibilities of both might be, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  30. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  14
    Education, Security and Intelligence Studies.Liam Gearon - 2015 - British Journal of Educational Studies 63 (3):263-279.
    Reference to security and intelligence in education today will undoubtedly elicit concerns over terrorism, radicalisation and, in the UK, counter-terrorism measures such as Channel and Prevent (UK...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  32.  17
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  70
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  35.  7
    GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  25
    Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart, François Ewald & Alessandro Fontana.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   60 citations  
  37. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  98
    Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  13
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. (Metasemantically) Securing Free Will.Jason Turner - 2013 - Australasian Journal of Philosophy 91 (2):295-310.
    Metasemantic security arguments aim to show, on metasemantic grounds, that even if we were to discover that determinism is true, that wouldn't give us reason to think that people never act freely. Flew's [1955] Paradigm Case Argument is one such argument; Heller's [1996] Putnamian argument is another. In this paper I introduce a third which uses a metasemantic picture on which meanings are settled as though by an ideal interpreter. Metasemantic security arguments are widely thought discredited by van (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  41.  21
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  31
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  92
    Terrorism, Security, and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1994 - Routledge.
    Terrorism, Security and Nationality shows how the concepts and methods of political philosophy can be applied to the practical problems of terrorism, state violence and national security. The book clarifies a wide range of issues in applied political philosophy, including the ethics of war, theories of state and nation, the relationship between communities and nationalisms, and the uneasy balance of human rights and national security. Ethnicity, national identity and the interests of the state, concepts commonly cited to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  46
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  42
    Security and Distribution, or Should You Care about Merely Possible Losses?Kian Mintz-Woo - 2019 - Ethics, Policy and Environment 21 (3):382-386.
    [Comment] Jonathan Herington argues that harms can occur whether or not there is actually a loss. He claims that subjectively or objectively merely being at risk of losing access to basic goods is sufficient for lowering that individual’s well-being for the value of ‘security’. I challenge whether losing access to basic goods is sufficient to justify the introduction of this value. I also point to some issues in his interpretation of IPCC risk categories and the social science research he (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  72
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  14
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  17
    Environmental Security and the Recombinant Human: Sustainability in the Twenty-first Century.Michael Redclift - 2001 - Environmental Values 10 (3):289-299.
    Examining the concepts of ‘security’ and ‘sustainability’, as they are employed in contemporary environmental discourses, the paper argues that, although the importance of the environment has been increasingly acknowledged since the 1970s, there has been a failure to incorporate other discourses surrounding ‘nature’. The implications of the ‘new genetics’, prompted by research into recombinant DNA, suggest that future approaches to sustainability need to be more cognisant of changes in ‘our’ nature, as well as those of ‘external’ nature, the environment. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  50. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000