Results for ' physical security'

988 found
Order:
  1.  46
    Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11.
    _ Source: _Page Count 21 Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2. Handguns, Moral Rights, and Physical Security.David DeGrazia - 2016 - Journal of Moral Philosophy 13 (1):56-76.
    _ Source: _Page Count 21 Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11 (1):56-76.
    Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable assumptions. In light of persisting (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  4.  8
    The Tort Entitlement to Physical Security as the Distributive Basis for Environmental, Health, and Safety Regulations.Mark A. Geistfeld - 2014 - Theoretical Inquiries in Law 15 (2):387-416.
    In a wide variety of contexts, individuals face a risk of being physically harmed by the conduct of others in the community. The extent to which the government protects individuals from such harmful behavior largely depends on the combined effect of administrative regulation, criminal law, and tort law. Unless these different departments are coordinated, the government cannot ensure that individuals are adequately secure from the cumulative threat of physical harm. What is adequate for this purpose depends on the underlying (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  44
    A Human Rights Debate on Physical Security, Political Liberty, and the Confucian Tradition.Benedict S. B. Chan - 2014 - Dao: A Journal of Comparative Philosophy 13 (4):567-588.
    There are many East and West debates on human rights. One of them is whether all civil and political rights are human rights. On one hand, scholars generally agree that rights to physical security are human rights. On the other hand, some scholars argue that rights to political liberty are only Western rights but not human rights because political liberty conflicts with some East Asian cultural factors, especially the Confucian tradition. I argue that physical security also (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  28
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating (...) to the conditions of agency for practically and epistemically limited animals. In §3, this argument is compared with other attempts to understand the value of physical security. In §4, the relationship between security and threats of rights violation is clarified. In §5, the epistemic analogy of §2 is used to suggest a difference between the concepts of “security” and “capability”. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  8.  92
    Securing the Empirical Value of Measurement Results.Kent W. Staley - 2020 - British Journal for the Philosophy of Science 71 (1):87-113.
    Reports of quantitative experimental results often distinguish between the statistical uncertainty and the systematic uncertainty that characterize measurement outcomes. This article discusses the practice of estimating systematic uncertainty in high-energy physics. The estimation of systematic uncertainty in HEP should be understood as a minimal form of quantitative robustness analysis. The secure evidence framework is used to explain the epistemic significance of robustness analysis. However, the empirical value of a measurement result depends crucially not only on the resulting systematic uncertainty estimate, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  9. (Metasemantically) Securing Free Will.Jason Turner - 2013 - Australasian Journal of Philosophy 91 (2):295-310.
    Metasemantic security arguments aim to show, on metasemantic grounds, that even if we were to discover that determinism is true, that wouldn't give us reason to think that people never act freely. Flew's [1955] Paradigm Case Argument is one such argument; Heller's [1996] Putnamian argument is another. In this paper I introduce a third which uses a metasemantic picture on which meanings are settled as though by an ideal interpreter. Metasemantic security arguments are widely thought discredited by van (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  84
    Security as a Selective Project.Alice Hills - 2009 - Studies in Social Justice 3 (1):79-97.
    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities, where the principal political weapons are coercion and intimidation, and territoriality is a significant facet of security’s physical dimension and exclusionary tendencies. Cities such as Baghdad and Basra are divided into ethnic or sectarian areas, and security’s referent object is an identity or group. Friction exists between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  12.  18
    Assessing Security Technology’s Impact: Old Tools for New Problems.Reinhard Kreissl - 2014 - Science and Engineering Ethics 20 (3):659-673.
    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  30
    Reference-Securing Belief and Content Externalism.Huiming Ren - 2020 - Acta Analytica 36 (1):87-99.
    I argue that our physical and social environments play a role in determining the content of most of our thoughts only indirectly—by playing a role in causing, and therefore, determining the content of, our reference-securing beliefs concerning general terms, beliefs that, when true, dictate what a general term will pick out. I also show that the problem of empty natural kind terms can be solved.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  19
    Secured Financing of Intellectual Property Assets and the Reform of English Personal Property Security Law.Iwan Davies - 2006 - Oxford Journal of Legal Studies 26 (3):559-583.
    The past three decades have seen a decline in traditional industries in the United Kingdom and there has been a relative decline in the value of physical assets to the UK economy. At the same time, the value of intangible assets seen in intellectual property rights have increased considerably. As such, IP rights represent important assets for companies and often comprise the foundation for market dominance and continued profitability. There is a structural uncertainty in the law relating to the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  26
    Securing the objectivity of relative facts in the quantum world.Richard A. Healey - 2022 - Foundations of Physics 52 (4):1-20.
    This paper compares and contrasts relational quantum mechanics with a pragmatist view of quantum theory. I first explain important points of agreement. Then I point to two problems faced by RQM and sketch DP?s solutions to analogous problems. Since both RQM and DP have taken the Born rule to require relative facts I next say what these might be. My main objection to RQM as originally conceived is that its ontology of relative facts is incompatible with scientific objectivity and undercuts (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  16.  31
    Physical Realism.Brian Ellis - 2005 - Ratio 18 (4):371-384.
    Physical realism is the thesis that the world is more or less as present‐day physical theory says it is, i.e. a mind‐independent reality, that consists fundamentally of physical objects that have causal powers, are located in space and time, belong to natural kinds, and interact causally with each other in various natural kinds of ways. It is thus a modern form of physicalism that takes due account of the natural kinds structure of the world. It is a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  17. Physical realism.Brian Ellis - 2005 - Ratio 18 (4):371–384.
    Physical realism is the thesis that the world is more or less as present‐day physical theory says it is, i.e. a mind‐independent reality, that consists fundamentally of physical objects that have causal powers, are located in space and time, belong to natural kinds, and interact causally with each other in various natural kinds of ways. It is thus a modern form of physicalism that takes due account of the natural kinds structure of the world. It is a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  18. Physical Possibility and Determinate Number Theory.Sharon Berry - manuscript
    It's currently fashionable to take Putnamian model theoretic worries seriously for mathematics, but not for discussions of ordinary physical objects and the sciences. But I will argue that (under certain mild assumptions) merely securing determinate reference to physical possibility suffices to rule out nonstandard models of our talk of numbers. So anyone who accepts realist reference to physical possibility should not reject reference to the standard model of the natural numbers on Putnamian model theoretic grounds.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  49
    Physical Possibility and Determinate Number Theory.Sharon Berry - forthcoming - Philosophia Mathematica:nkab013.
    ABSTRACT It is currently fashionable to take Putnamian model-theoretic worries seriously for mathematics, but not for discussions of ordinary physical objects and the sciences. However, I will argue that merely securing determinate reference to physical possibility suffices to rule out the kind of nonstandard interpretations of our number talk Putnam invokes. So, anyone who accepts determinate reference to physical possibility should not reject determinate reference to the natural numbers on Putnamian model-theoretic grounds.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  23
    Challenges for food security in eritrea - a descriptive and qualitative analysis.Ravinder Rena - unknown
    Food security is about ensuring that all people at all times have both physical and economic access to the basic food they need. In a number of African countries chronic malnutrition and transitory food insecurity are pervasive. Like most African countries, Eritrea is also a victim of the problem of food insecurity. Based on this historical and recurrent food insecurity in Eritrea, an attempt is made in this paper to assess the possible causes of food insecurity in the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  20
    Secure Communication in the Twin Paradox.Juan Carlos Garcia-Escartin & Pedro Chamorro-Posada - 2015 - Foundations of Physics 45 (11):1433-1453.
    The amount of information that can be transmitted through a noisy channel is affected by relativistic effects. Under the presence of a fixed noise at the receiver, there appears an asymmetry between “slowly aging” and “fast aging” observers which can be used to have private information transmission. We discuss some models for users inside gravitational wells and in the twin paradox scenario.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Whose Justice is it Anyway? Mitigating the Tensions Between Food Security and Food Sovereignty.Samantha Noll & Esme G. Murdock - 2020 - Journal of Agricultural and Environmental Ethics 33 (1):1-14.
    This paper explores the tensions between two disparate approaches to addressing hunger worldwide: Food security and food sovereignty. Food security generally focuses on ensuring that people have economic and physical access to safe and nutritious food, while food sovereignty movements prioritize the right of people and communities to determine their agricultural policies and food cultures. As food sovereignty movements grew out of critiques of food security initiatives, they are often framed as conflicting approaches within the wider (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  24.  7
    Torture, Truth and National Security in seneca's Troades.Matthew F. Payne - 2022 - Classical Quarterly 72 (2):719-738.
    This article argues that the encounter between Andromache and Ulysses in Seneca's Troades engages with the genre of declamation to juxtapose two different discourses surrounding torture: one focussed on torture's connection to truth, the other on its connection to tyranny. It describes how the Greek general Ulysses, convinced of the danger of letting the Trojan prince Astyanax live, threatens his mother Andromache with physical torture in order to ascertain the truth of Astyanax's whereabouts. However, Ulysses is countered by Andromache's (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  8
    Privacy and Security within Biobanking: The Role of Information Technology.Raymond Heatherly - 2016 - Journal of Law, Medicine and Ethics 44 (1):156-160.
    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  16
    The Phenomenon of Security Within the Socio-Psychological Knowledge in the Era of Postmodernism.Olha Lazorko, Hryhorii Dzhahupov, Rafal Abramciow, Svitlana Symonenko, Olena Hrek & Tetiana Kostieva - 2022 - Postmodern Openings 13 (3):180-200.
    The relevance of the study of the socio-psychological phenomenon of personal security in the era of post-modernism is due to the real problems of today's society, which at the present stage of state development are characterized by acute interrelationships between the requirements of social security as a factor of socio-political and national security and the real state of mental existence. associated with indicators of social well-being of the individual. The aim of the article is to prove that (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  20
    Ethics of security: A genealogical introduction.Andrea Rossi - 2020 - History of the Human Sciences 33 (2):48-71.
    This article analyses the set of ethical questions underlying the emergence of the modern politics of security, as articulated, in particular, in the work of Thomas Hobbes. An ethic is here understood – in line with its ancient philosophical use and the interpretation advanced by authors such as Michel Foucault and Pierre Hadot – as a domain of reflections and practices related to the cultivation and conversion of the self. The article aims to demonstrate that, besides attending to the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  20
    Value-based argumentation for designing and auditing security measures.Brigitte Burgemeestre, Joris Hulstijn & Yao-Hua Tan - 2013 - Ethics and Information Technology 15 (3):153-171.
    Designing security measures often involves trade-offs between various types of objectives. Multiple stakeholders may have conflicting demands and may have different ideas on how to resolve the resulting design conflicts. This paper reports on an application of value-sensitive design. Based on argumentation theory and social values, the paper develops a structured approach for discussing design conflicts, called value-based argumentation. The application domain examined in the paper is concerned with physical safety and security issues that arise in cross-border (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  4
    Exploring the ethics of physical restraints: Students’ questioning.Maki Tanaka - 2023 - Nursing Ethics 30 (3):408-422.
    Background Physical restraints are routinely employed to ensure patient safety in Japanese acute care. Little is known about nursing students' perspectives and how they begin to question their value and knowledge in the face of restraint experiences in clinical practice. Objective To investigate nursing students’ questions about patient restraints and how they understand the ethics of the use of restraints in nursing. Research design Qualitative descriptive research using narrative analysis. Participants and research context Experiential data were generated and thematically (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Being Sure and Living Well: How Security Affects Human Flourishing.J. A. M. Daemen - 2024 - Journal of Value Inquiry 58 (1):93-110.
    This paper analyses how security affects well-being. Security is understood as someone’s sureness of enjoying some good in the future; well-being is treated as a matter of human flourishing. Security can contribute to our well-being in various ways: if we are in fact bound to enjoy a good, in principle this is positive for our flourishing in the future; if we also believe that we will enjoy this good, we can be more efficient in pursuing our well-being; (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  6
    Violence and Violation: Women and Secure Settings1.Kate Noble Women & Gill Aitken - 2001 - Feminist Review 68 (1):68-88.
    This article focuses on service provision for women who are involuntarily referred under the UK Mental Health Act (1983) into medium and high security care in England and Wales. We explore how physical and procedural security in such settings is prioritized over relational care (see also Fallon Report, Department of Health, 1999a and NHS Executive, 2000 – Tilt Report). We are not arguing against the importance of protecting the public from the acts of dangerous members of our (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  43
    Science and security before the atomic bomb: The loyalty case of Harald U. sverdrup.Naomi Oreskes & Ronald Rainger - 2000 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 31 (3):309-369.
    In the summer of 1941, Harald Sverdrup, the Norwegian-born Director of the Scripps Institution of Oceanography (SIO) in La Jolla, California, was denied security clearance to work on Navy-sponsored research in underwater acoustics applied to anti-submarine warfare. The clearance denial embarrassed the world renown oceanographer and Arctic explorer, who repeatedly offered his services to the U.S. government only to see scientists of far lesser reputation called upon to aid the war effort. The official story of Sverdrup's denial was the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  13
    The Poetics of Physics.Chris Jeynes, Michael C. Parker & Margaret Barker - 2023 - Philosophies 8 (1):3.
    Physics has been thought to truly represent reality since at least Galileo, and the foundations of physics are always established using philosophical ideas. In particular, the elegant naming of physical entities is usually very influential in the acceptance of physical theories. We here demonstrate (using current developments in thermodynamics as an example) that both the epistemology and the ontology of physics ultimately rest on poetic language. What we understand depends essentially on the language we use. We wish to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  64
    Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System.Li Xiong, Zhenlai Liu & Xinguo Zhang - 2017 - Complexity:1-23.
    This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the novel hyperchaotic system (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  19
    Solid State Insurrection: How the Science of Substance Made American Physics Matter.Joseph D. Martin - 2018 - Pittsburgh, PA, USA: University of Pittsburgh Press.
    Solid state physics, the study of the physical properties of solid matter, was the most populous subfield of Cold War American physics. Despite prolific contributions to consumer and medical technology, such as the transistor and magnetic resonance imaging, it garnered less professional prestige and public attention than nuclear and particle physics. Solid State Insurrection argues that solid state physics was essential to securing the vast social, political, and financial capital Cold War physics enjoyed in the twentieth century. Solid state’s (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  7
    Increasing a patient's sense of security in the hospital: A theory of trust and nursing action.Patricia S. Groves, Jacinda L. Bunch & Francis Kuehnle - 2023 - Nursing Inquiry 30 (4):e12569.
    Having a decreased sense of security leads to unnecessary suffering and distress for patients. Establishing trust is critical for nurses to promote a patient's sense of security, consistent with trauma‐informed care. Research regarding nursing action, trust, and sense of security is wide‐ranging but fragmented. We used theory synthesis to organize the disparate existing knowledge into a testable middle‐range theory encompassing these concepts in hospitals. The resulting model illustrates how individuals are admitted to the hospital with some predisposition (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  66
    Is Stuxnet Physical? Does It Matter?Ryan Jenkins - 2013 - Journal of Military Ethics 12 (1):68-79.
    Cyberweapons are software and software, at least intuitively, is nonphysical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyberweapons. If Article 2(4) only proscribes the use of physical force, and if cyberweapons are nonphysical, then cyberweapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  12
    Quausation and the Physical Indeterminism Luck Objection: a Reply to Moore.Neil Campbell - 2023 - Philosophia 51 (3):1129-1142.
    Dwayne Moore raises the physical indeterminism luck objection to libertarian theories of free will, which claims that because agents lack control over the indeterministic physical processes that cause choices, agents lack control over those choices. Moore considers the libertarian strategy of identifying these processes with agential states, such as efforts of will, in order to secure agential control over the outcome of these processes. According to Moore, this strategy faces an insurmountable obstacle in the form of a quausation (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  4
    Unravelling College Students’ Fear of Crime: The Role of Perceived Social Disorder and Physical Disorder on Campus.Marlies Sas, Wim Hardyns, Genserik Reniers & Koen Ponnet - 2022 - British Journal of Educational Studies 70 (1):65-85.
    The current study explores the role of individual and environmental determinants on students’ fear of crime. Based on a large-scale survey among students of a Belgian university (n = 1,463), the relationship between perceived social and physical disorder and the three dimensions of fear of crime (perceived risk of victimization, feelings of anxiety, avoidance behaviour) is examined. Support was found for a relationship between perceived social and physical disorder and perceived risk of victimization. Moreover, a relationship was found (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  25
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  41.  14
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  42.  13
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burris & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  43.  18
    Science and Security before the Atomic Bomb: The Loyalty Case of Harald U. Sverdrup.Naomi Oreskes & Ronald Rainger - 2000 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 31 (3):309-369.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  2
    The Limitations of Physics as a Chemical Reducing Agent.Paul A. Bogaard - 1978 - PSA Proceedings of the Biennial Meeting of the Philosophy of Science Association 1978 (2):344-356.
    Theories of chemistry have come to depend inescapably upon the framework provided by atomic physics. This is a dependency which is anchored upon the ability within quantum theory — in particular since the wave mechanics of Schrödinger — to account for chemical bonding by the pairing of electrons, the stability of their resulting structures, and thereby to provide a basis from which to deal with chemical behavior generally. The optimism generated fifty years ago by the initial attempts to apply this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  11
    Where are the market devices? Exploring the links among regulation, markets, and technology at the securities and exchange commission, 1935–2010.Juan Pablo Pardo-Guerra - 2020 - Theory and Society 49 (2):245-276.
    This article examines regulation’s understanding of technology in American financial markets as means for rethinking the contours and institutional limits of governance in the age of financialization. The article identifies how the Securities and Exchange Commission perceived markets and their conceptual relation to technology throughout much of the long twentieth century by distilling the “ontologies” expressed by the agency’s leadership. Despite the fact that SEC’s commissioners recognized technologies as playing a central role in the market’s current and future operations, these (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  42
    A Phenomenological Analysis of the Experience of Security and Contentment for Latency Aged Children in Shared-time Parenting Arrangements.Christina Sadowski & Jennifer E. McIntosh - 2015 - Journal of Phenomenological Psychology 46 (1):69-104.
    This study explored the lived experience of security and contentment, and their absence, for latency-aged children living in shared-time parenting arrangements following their parents’ separation. A descriptive phenomenological methodology was utilized. Sixteen children living in shared-time were interviewed about their experiences of two phenomena: “feeling secure and content living in shared-time” and “not feeling secure and content living in shared-time.” The eight richest protocols were selected for analysis. The two resultant general structures and their core constituents are presented, and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  47.  19
    A Clonal Selection Optimization System for Multiparty Secure Computing.Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu & Xiang Wu - 2021 - Complexity 2021:1-14.
    The innovation of the deep learning modeling scheme plays an important role in promoting the research of complex problems handled with artificial intelligence in smart cities and the development of the next generation of information technology. With the widespread use of smart interactive devices and systems, the exponential growth of data volume and the complex modeling requirements increase the difficulty of deep learning modeling, and the classical centralized deep learning modeling scheme has encountered bottlenecks in the improvement of model performance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  12
    High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties.Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu & Shunjiang Wang - 2020 - Complexity 2020:1-11.
    System security is essential for the operation of the island microgrid. However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. Firstly, a high-order disturbance observer is designed to estimate the unmeasurable factors in the microgrid. Secondly, a HODO-based sliding mode control strategy is proposed where the estimated (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  3
    Hybrid War as a Phenomenon of Semantic Postmodern Discourse with Emphasis on the Military Constant as a Factor of National Security.Andriy Tkachuk & Pavlo Tkachuk - 2021 - Postmodern Openings 12 (3):190-215.
    The article states the core thesis about two asymmetric modes of existence of war – physical and discursive. The purpose of the article is to substantiate the analytical and practical necessity of distinguishing between two modes of existence of hybrid warfare as a phenomenon of physical reality and as a discursive construct, as well as to raise questions about the value specificity of the relationship between them. The methodology of work represents the implication of two asymmetric modes of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  31
    An Assemblage of Science and Home: The Gendered Lifestyle of Svante Arrhenius and Early Twentieth-Century Physical Chemistry.Staffan Bergwik - 2014 - Isis 105 (2):265-291.
    This essay explores the gendered lifestyle of early twentieth-century physics and chemistry and shows how that way of life was produced through linking science and home. In 1905, the Swedish physical chemist Svante Arrhenius married Maja Johansson and established a scientific household at the Nobel Institute for Physical Chemistry in Stockholm. He created a productive context for research in which ideas about marriage and family were pivotal. He also socialized in similar scientific sites abroad. This essay displays how (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 988