Results for ' security and development'

993 found
Order:
  1.  18
    Security and Sustained Development.Krystyna Najder-Stefaniak - 2017 - Dialogue and Universalism 27 (4):43-52.
    Interesting for the debate on human security is the concept of coexistence of culture and civilization. According to Albert Schweitzer, civilization and culture were not mutually exclusive and did not compete against each other. However, if civilizational growth began to dominate over cultural development, or, in other words, if culture began to lag behind civilization, human life would be reduced to its biological aspect and man would become unable to take the adequate care of his natural and social (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  21
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  7
    Post-Conflict Security, Peace and Development: Perspectives From Africa, Latin America, Europe and New Zealand.Christine Atieno & Colin Robinson (eds.) - 2018 - Springer Verlag.
    This book examines links between post-conflict security, peace and development in Africa, Latin America, Europe and New Zealand. Young peace researchers from the Global South as well as from Italy and New Zealand address in case studies traumas in Northern Uganda, demobilisation and reintegration of ex-combatants in the Ivory Coast, economic and financial management of terrorism in Kenya, organised crime in Brazil, mental health issues in Colombia, macro realism in Europe and global defence reforms within the military apparatus (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  12
    The Philosophy of Rhetoric.George Campbell, William Creech, Thomas Cadell, W. Davies & George Ramsay and Company - 2009 - Printed by George Ramsay & Co. For William Creech, Edinburgh; and T. Cadell and W. Davies, London.
    The Philosophy of Rhetoric is widely regarded as the most important work of a theory of rhetoric produced in the 18th century. Campbell's work engages such themes in an attempt to formulate a universal theory of human communication. Campbell attempts to develop his theory by discovering deep principles in human nature that account for all instances and kinds of human communication. He seeks to derive all communication principles and processes empirically. In addition, all statements in discourse that have to do (...)
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  5.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  21
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  66
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  9. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  40
    Understanding How Climate Change Impacts Food Security and Human Development in the Fragile States.Ane Cristina Figueiredo Pereira de Faria - 2018 - Journal for Peace and Justice Studies 28 (1):3-39.
    Human security is being threatened as a consequence of climate change. However, the human security paradigm still needs to be addressed as a cause and effect of environmental degradation. Therefore, this article aims to comprehend the impacts of climate change in fragile states regarding food security and human development. The article is a comparative case study of the five most vulnerable countries in Africa: Somalia, South Sudan, Central African Republic, Sudan, and Congo (Dem. Republic). This research (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  6
    Human values and global governance: studies in development, security and culture, volume 2.Björn Hettne (ed.) - 2008 - New York: Palgrave-Macmillan.
    The result of major research on development, security and culture, this collection, and second volume Sustainable Development in a Globalized World , outlines the emerging field of global studies and the theoretical approach of global social theory. It considers social relations and the need for intercultural dialogue to respect "the other.".
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  8
    The Human and the Social: a Comparison of the Discourses of Human Development, Human Security and Social Quality. Des Gasper - 2011 - International Journal of Social Quality 1 (1):91-108.
    This paper presents a structured comparison of the social quality approach with the UNDP-led 'human development' approach and its sister work on 'human security'. Through clarification of their respective foci, roles and underlying theoretical and value assumptions, the paper suggests that partnership of the social quality approach with these 'human' approaches appears possible and relevant for each side.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  20
    Trading in Vain? Investigating the Philippines' Development-oriented National Security and Free Trade Linkages.Michael I. Magcamit - 2016 - Japanese Journal of Political Science 17 (1):84-105.
    This paper examines the manner through which the Philippine government has utilized free trade in pursuing its development-oriented national security policies and strategies in the twenty-first century. It argues that against the backdrop of uneven economic development being perpetuated by a deeply entrenched oligarchic system and patronage culture, the primary referent of Philippine national security is its diminishing development space. Despite the government rhetoric with regard to the role of inclusive development in enhancing national (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  16
    Philosophical and sociocultural dimensions of personality psychological security.O. Y. Blynova, L. S. Holovkova & O. V. Sheviakov - 2018 - Anthropological Measurements of Philosophical Research 14:73-83.
    Purpose. The dynamics and pace of social and economic transformations that are characteristic of modern society, lead to an increase in tension and the destruction of habitual stereotypes – ideals, values, norms, patterns of behaviour that unite people. These moments encourage us to rethink the understanding of "security" essence, in particular, psychological, which emphasizes the urgency of its study in the philosophical and sociocultural coordinates. Theoretical basis of the research is based on the philosophical methodology of K. Jaspers, E. (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  15. Session 3-Security Requirements and Development-Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. [REVIEW]Alfonso Rodriguez, Eduardo Fernandez-Medina & Mario Piattini - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4083--51.
     
    Export citation  
     
    Bookmark  
  16.  14
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  39
    On food security and alternative food networks: understanding and performing food security in the context of urban bias.Jane Dixon & Carol Richards - 2016 - Agriculture and Human Values 33 (1):191-202.
    This paper offers one explanation for the institutional basis of food insecurity in Australia, and argues that while alternative food networks and the food sovereignty movement perform a valuable function in building forms of social solidarity between urban consumers and rural producers, they currently make only a minor contribution to Australia’s food and nutrition security. The paper begins by identifying two key drivers of food security: household incomes (on the demand side) and nutrition-sensitive, ‘fair food’ agriculture (on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19.  5
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber (...) Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  47
    The Relationship Between Food Security and Trade Liberalization: Assessing the World Trade Organization’s Agreement on Agriculture and the Role of Transnational Corporations.Siti Musa - 2009 - International Corporate Responsibility Series 4:191-208.
    This paper addresses the issue of food security in developing countries and how agriculture plays an important role in achieving not only food security, but also in reducing poverty and promoting sustainable development. The promotion of trade liberalization by the World Trade Organization (WTO) through the Agreement on Agriculture (AoA) has undermined the productive capacity of developing countries and their comparative advantage in the agricultural sector, marginalizing small-scale farmers and benefitting the big corporations. The paper looks at (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  2
    Common Foreign, Security, and Defense Policy.Ramses A. Wessel - 2015 - In Dennis Patterson (ed.), A Companion to European Union Law and International Law. Wiley-Blackwell. pp. 394–412.
    The Common Foreign and Security Policy (CFSP) objectives are an integral part of the overall objectives of the European Union and the policy area has developed from a purely intergovernmental form of cooperation in the days of the European political cooperation to an area in which the member states have increasingly accepted new forms of institutionalization. CFSP decisions are taken by the General Affairs Council, consisting of the ministers for foreign affairs of the member states. In spite of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. On the Right to Development, Human Security, and a Life in Dignity.Elisabeth E. Scheper - forthcoming - Human Nature.
  24. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--709.
  25.  27
    Deconstructing homegardens: food security and sovereignty in northern Nicaragua.Karie Boone & Peter Leigh Taylor - 2016 - Agriculture and Human Values 33 (2):239-255.
    Development scholars and practitioners are promoting food security, food sovereignty, and the localization of food systems to prepare for the projected negative impacts of climate change. The implementation of biodiverse homegardens is often seen as a way not only to localize food production but also as a strategy in alignment with a food sovereignty agenda. While much scholarship has characterized and critiqued food security and sovereignty conceptualizations, relatively little research has examined people’s lived experiences in order to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  77
    Community food security and environmental justice: Searching for a common discourse. [REVIEW]Robert Gottlieb & Andrew Fisher - 1996 - Agriculture and Human Values 13 (3):23-32.
    Community food security and environmental justice are parallel social movements interested in equity and justice and system-wide factors. They share a concern for issues of daily life and the need to establish community empowerment strategies. Both movements have also begun to reshape the discourse of sustainable agriculture, environmentalism and social welfare advocacy. However, community food security and environmental justice remain separate movements, indicating an incomplete process in reshaping agendas and discourse. Joining these movements through a common language of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  27.  9
    Social Innovation for Food Security and Tourism Poverty Alleviation: Some Examples From China.Guo-Qing Huang & Fu-Sheng Tsai - 2021 - Frontiers in Psychology 12.
    The COVID-19 pandemic has brought hunger to millions of people around the world. Social distancing measures coupled with national lockdowns have reduced work opportunities and the overall household incomes. Moreover, the disruption in agricultural production and supply routes is expected to continue into 2021, which may leave millions without access to food. Coincidentally, those who suffer the most are poor people. As such, food security and tourism poverty alleviation are interlinked when discussing social problems and development. While the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  56
    Infectious Diseases, Security and Ethics: The Case of Hiv/Aids.Michaelj Selgelid - 2008 - Bioethics 22 (9):457-465.
    Securitization of infectious diseases may involve suspension of ordinary human rights and liberties. In the event of an epidemic, therefore, it is important to limit the occasions upon which draconian disease control measures are implemented in the name of security. The term ‘security’, moreover, should not be used too loosely if it is to retain force and meaning in political discourse. It may be argued that the bar for disease securitization should be set high so that it is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  32
    Japanese risk society: trying to create complete security and safety using information and communication technology.Kiyoshi Murata & Yohko Orito - 2010 - Acm Sigcas Computers and Society 40 (3):38-49.
    The construction of a secure and safe society using information and communication technology is recognised as an urgent issue in Japan. This recognition is based on public fear about crime related to manufactured risk caused by modernisation or industrial civilisation. This fear has created a social atmosphere that has led to the rapid development and implementation of security systems using ICT, such as security cameras, smart IC cards and mobile phones, to establish security and safety in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  5
    Risks, Violence, Security and Peace in Latin America: 40 Years of the Latin American Council of Peace Research (CLAIP).Úrsula Oswald Spring, Serrano Oswald & Serena Eréndira (eds.) - 2018 - Cham: Imprint: Springer.
    This book analyses the war against drugs, violence in streets, schools and families, and mining conflicts in Latin America. It examines the nonviolent negotiations, human rights, peacebuilding and education, explores security in cyberspace and proposes to overcome xenophobia, white supremacy, sexism, and homophobia, where social inequality increases injustice and violence. During the past 40 years of the Latin American Council for Peace Research (CLAIP) regional conditions have worsened. Environmental justice was crucial in the recent peace process in Colombia, but (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  41
    World Food Security and Agriculture in a Globalizing World.Eric Tollens & Johan de Tavernier - 2006 - Ethical Perspectives 13 (1):91-115.
    There is an increasing awareness of the importance of food security, of which the UN’s Millennium Development Goals are the best measure. Although some progress has been made in some regions, much progress still needs to be made in Sub-Saharan Africa, where agriculture largely remains subsistence and personal savings extremely low, and where population growth outstrips economic growth.Thus, there has been a renewed effort to bring these problems back on the development agenda. Food insecurity is a major (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  41
    Accounting for the Benefits of Social Security and the Role of Business: Four Ideal Types and Their Different Heuristics.Rüdiger W. Waldkirch, Matthias Meyer & Karl Homann - 2009 - Journal of Business Ethics 89 (S3):247 - 267.
    Germany is considered to be a pioneer of social security systems; nonetheless, globalization and demographic changes have put enormous pressure on them. A solution is not yet in sight as the debate on the future of the German social security systems still lacks consensus. We argue that ideas matter and that the debate can benefit from a deeper reflection on the concept of social security. This objective is pursued along two lines. First, we take a historical perspective (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33. In search of stability, security, and growth: BRICS and a new world order.H. H. S. Viswanathan & Nandan Unnikrishnan (eds.) - 2012 - New Delhi: Observer Research Foundation.
    Papers presented at the 4th BRICS Academic Forum held in New Delhi on March 5-6, 2012.
     
    Export citation  
     
    Bookmark  
  34. Colonial and postcolonial state and development in Africa.Mueni Wa Muiu - 2010 - Social Research: An International Quarterly 77 (4):1311-1338.
    This article examines the colonial and post colonial state and development in Africa; it does so by trying to answer the following questions: what is the nature of the African state and when did impunity become the norm? Who is the colonial and post-colonial state accountable to and how does this impact the welfare of the majority of the people? How can the state be reconstituted in the interests of the Africans ? By development, I mean a process (...)
     
    Export citation  
     
    Bookmark  
  35.  10
    Globalization, culture and development: the UNESCO Convention on Cultural Diversity.Christiaan De Beukelaer, Miikka Pyykkönen & J. P. Singh (eds.) - 2015 - Houndmills, Basingstoke, Hampshire: Palgrave-Macmillan.
    The 2005 UNESCO Convention on the Protection and Promotion of the Diversity of Cultural Expressions provides an international policy lens for analysing broad debates on issues of cultural globalization and development. The interdisciplinary contributions in this volume offer a fresh understanding of these key issues whilst examining cultural globalization, which is conceived in terms of artistic expressions and entertainment industries and interpreted anthropologically as the rituals, symbols, and practices of everyday life. The broad gamut of theories, methods, and evidence (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  21
    Constraining war: Human security and the Human right to peace. [REVIEW]Patrick Hayden - 2004 - Human Rights Review 6 (1):35-55.
    The explicit articulation of a cosmopolitan conception of human security and a corresponding right to peace is a positive development in global politics, inasmuch as it decenters the state in our understanding of the human community and delegitimizes organized violence as the generally accepted means for the “continuation” of realist politics. I have argued that just war theory, when defined in suitably narrow fashion, helps to contribute to our thinking on issues of human security in several ways. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  22
    Agriculture development and food security policy in eritrea - an analysis.Ravinder Rena - unknown
    The main economic activity of the people of Eritrea is agriculture: crop production and livestock herding. Agriculture mainly comprises mixed farming and some commercial concessions. Most agriculture is rain-fed. The main rain-fed crops are sorghum, millet and sesame, and the main irrigated crops are all horticultural crops like bananas, onions and tomatoes and cotton. The major livestock production constraints are disease, water and feed shortages and agricultural expansion especially in the river frontages. The agricultural sector employs eighty percent of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  9
    Economic security in Russia: current state, threats and prospects of development.Lyudmila Gennadyevna Lopasteyskaya - 2021 - Kant 40 (3):48-52.
    The purpose of the study is to determine the current state, threats and prospects for the development of Russia's economic security. The scientific novelty lies in the development of key areas for countering threats to Russia's economic security, which are represented by the consequences of the impact of the COVID-19 coronavirus infection. The solution to the key problems that have arisen as a result of the pandemic is to ensure effective protection of the Russian economy. Accordingly, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  13
    Auditor Independence, Accounting Firms, and the Securities and Exchange Commission: Application of the Issue Life Cycle Model.Virginia W. Gerde & Craig G. White - 2003 - Business and Society 42 (1):83-114.
    The authors apply the issue life cycle model to analyze the 1999 through 2001 dispute between the Securities and Exchange Commission and the accounting profession concerning auditor independence. The analysis also brings additional insights that extend understanding of the issue life cycle and issues development. This analysis highlights the roles of a trigger event, the shift of an issue from a technical concern to a public debate, and likely recurrence. The reappearance of the auditor independence issue in 2002 with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  11
    Refining Green Political Economy: From Ecological Modernisation to Economic Security and Sufficiency.John Barry & Peter Doran - 2006 - Analyse & Kritik 28 (2):250-275.
    Perhaps the most problematic dimension of the ‘triple bottom line’ understanding of sustainable development has been the ‘economic’ dimension. Much of the thinking about the appropriate ‘political economy’ to underpin or frame sustainable development has been either utopian (as in some ‘green’ political views) or an attempt to make peace with ‘business as usual’ approaches. This article suggests that ‘ecological modernisation’ is the dominant conceptualisation of ‘sustainable development’ within the UK, and illustrates this by looking at some (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  31
    The Trouble with Terror: Liberty, Security and the Response to Terrorism.Tamar Meisels - 2008 - Cambridge University Press.
    What is terrorism and can it ever be defended? Beginning with its definition, proceeding to its possible justifications, and culminating in proposals for contending with and combating it, this book offers a full theoretical analysis of the issue of terrorism. Tamar Meisels argues that, regardless of its professed cause, terrorism is diametrically opposed to the requirements of liberal morality and can only be defended at the expense of relinquishing the most basic of liberal commitments. Meisels opposes those who express sympathy (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  17
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  4
    Fundamental Rights in the Eu Area of Freedom, Security and Justice.Sara Iglesias & Maribel Pascual (eds.) - 2021 - Cambridge University Press.
    The development of the Area of Freedom, Security and Justice has transformed the European Union and placed fundamental rights at the core of EU integration and its principles of mutual recognition and trust. The impact of the AFSJ in the development of an EU standard of fundamental rights, which has come to the fore since the Treaty of Lisbon, is a topic of great theoretical and practical importance. This is the first systematic academic study of the AFSJ (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Fundamental Rights in the Eu Area of Freedom, Security and Justice.Sara Iglesias & Maribel González Pascual (eds.) - 2021 - Cambridge University Press.
    The development of the Area of Freedom, Security and Justice has transformed the European Union and placed fundamental rights at the core of EU integration and its principles of mutual recognition and trust. The impact of the AFSJ in the development of an EU standard of fundamental rights, which has come to the fore since the Treaty of Lisbon, is a topic of great theoretical and practical importance. This is the first systematic academic study of the AFSJ (...)
    No categories
     
    Export citation  
     
    Bookmark  
  45.  15
    Fundamental Rights in the Eu Area of Freedom, Security, and Justice.Sara Iglesias Sánchez & Maribel González Pascual (eds.) - 2020 - Cambridge University Press.
    The development of the Area of Freedom, Security and Justice has transformed the European Union and placed fundamental rights at the core of EU integration and its principles of mutual recognition and trust. The impact of the AFSJ in the development of an EU standard of fundamental rights, which has come to the fore since the Treaty of Lisbon, is a topic of great theoretical and practical importance. This is the first systematic academic study of the AFSJ (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. The Work of Hunger: Security, Development and Food-for-Work in Post-crisis Jakarta.Jamey Essex - 2009 - Studies in Social Justice 3 (1):99-116.
    Food-for-work programs distribute food aid to recipients in exchange for labor, and are an important mode of aid delivery for both public and private aid providers. While debate continues as to whether food-for-work programs are socially just and economically sensible, governments, international institutions, and NGOs continue to tout them as a flexible and cost-effective way to deliver targeted aid and promote community development. This paper critiques the underlying logic of food-for-work, focusing on how this approach to food aid and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Technology, development, global commons and international security: A global commons and interdisciplinary approach to global security.M. Matheswaran - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  48.  2
    Financing and Oversight of the Application of Invasive Measures for the Purpose of Security and Defense.Leta Bargjieva Miovska - 2023 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 76 (1):601-614.
    Invasive measures, as special investigative measures are defined, are ante delictum measures. They are applied only in situations in which the evidence cannot be obtained by conventional methods, and are needed for the smooth conduct of criminal proceedings. The financial means for the application of these invasive measures for the needs of defence and security are allocated with a budget by the legislative authority. The main hypothesis of this paper states that: supervision over the application and financing of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. A Sense of Proportion: Some Thoughts on Equality, Security and Justice.Annabelle Lever - 2020 - Res Publica 26 (3):357-371.
    This article develops an intuitive idea of proportionality as a placeholder for a substantive conception of equality, and contrasts it with Ripstein’s ideas, as presented in an annual guest lecture to the Society of Applied Philosophy in 2016. It uses a discussion of racial profiling to illustrate the conceptual and normative differences between the two. The brief conclusion spells out my concern that talk of ‘proportionality’, though often helpful and, sometimes, necessary for moral reasoning, can end up concealing, rather than (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  18
    Ethics and the Future of Spying: Technology, National Security and Intelligence Collection.Jai Galliott & Warren Reed (eds.) - 2016 - Routledge.
    This volume examines the ethical issues generated by recent developments in intelligence collection and offers a comprehensive analysis of the key legal, moral and social questions thereby raised. Intelligence officers, whether gatherers, analysts or some combination thereof, are operating in a sea of social, political, scientific and technological change. This book examines the new challenges faced by the intelligence community as a result of these changes. It looks not only at how governments employ spies as a tool of state and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 993