Results for ' security'

1000+ found
Order:
  1. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  2. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  3.  31
    ‘Rescaling’ alternative food systems: from food security to food sovereignty.Navé Wald & Douglas P. Hill - 2016 - Agriculture and Human Values 33 (1):203-213.
    In this paper, we critically interrogate the benefits of an interdisciplinary and theoretically diverse dialogue between ‘local food’ and ‘alternative food networks’ and outline how this dialogue might be enriched by a closer engagement with discourses of food sovereignty and the politics of scale. In arguing for a shift towards a greater emphasis on food sovereignty, we contend that contemporary discourses of food security are inadequate for the ongoing task of ensuring a just and sustainable economy of food. Further, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  4. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
  5.  47
    Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  30
    Rethinking the Alternatives: Food Sovereignty as a Prerequisite for Sustainable Food Security.Ronald Byaruhanga & Ellinor Isgren - 2023 - Food Ethics 8 (2):1-20.
    The concept of food sovereignty is primarily taken as an alternative to the prevailing neoliberal food security model. However, the approach has hitherto not received adequate attention from policy makers. This could be because the discourse is marked by controversies and contradictions, particularly regarding its ability to address the challenges of feeding a rapidly growing global population. In response to these criticisms, this paper argues that the principles of food sovereignty, such as democratic and transparent food systems, agroecology, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  15
    The Problems of Genocide: Permanent Security and the Language of Transgression.A. Dirk Moses - 2021 - Cambridge University Press.
    "Genocide is a problem: not only the terrible fact of mass death, but also how the relatively new idea and law of genocide organises and distorts our thinking about civilian destruction. Taking the normative perspective of civilian immunity from military attack, this book argues that the implicit hierarchy of international law, atop which sits genocide as the "crime of crimes," blinds us to other types of humanly caused civilian death, like bombing cities, the "collateral damage" of missile and drone strikes, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  17
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11 (1):56-76.
    Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable assumptions. In light of persisting reasonable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10.  37
    Bare Statistical Evidence and the Right to Security.N. P. Adams - 2023 - Journal of Ethics and Social Philosophy 24 (2).
    Courts and jurors sometimes refuse to assign liability to defendants on the basis of statistics alone, despite their apparent reliability. I argue that this refusal is best understood as a recognition of defendants’ right to security. Understood as a robust good in Philip Pettit’s sense, security requires that someone risking harm to others’ protected interests adopt a disposition of concern that controls against wrongfully harming them. Since trials risk harm, the state must adopt such a disposition. Statistics leave (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  31
    U.S. Responses To Japanese Wartime Inhuman Experimentation After World War Ii: National Security and Wartime Exigency.Howard Brody, Sarah E. Leonard, Jing-bao Nie & Paul Weindling - 2014 - Cambridge Quarterly of Healthcare Ethics 23 (2):220-230.
    In 1945–46, representatives of the U.S. government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the United States, influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the United States played an equally key role in concealing information about (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  12.  18
    Precommitment Regimes for Intervention: Supplementing the Security Council.Allen Buchanan & Robert O. Keohane - 2011 - Ethics and International Affairs 25 (1):41-63.
    As global governance institutions proliferate and become more powerful, their legitimacy is subject to ever sharper scrutiny. Yet what legitimacy means in this context and how it is to be ascertained are often unclear. In a previous paper in this journal, we offered a general account of the legitimacy of such institutions and a set of standards for determining when they are legitimate. In this paper we focus on the legitimacy of the UN Security Council as an institution for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  13.  6
    The tacit dimension of expertise: Professional vision at work in airport security.Chiara Bassetti - 2021 - Discourse Studies 23 (5):597-615.
    Whereas “professional vision” has been mostly analyzed in apprenticeship and other settings where knowledge is made explicit or reflected upon, I focus on how expertise tacitly plays out in task-oriented interaction among practitioners. The paper considers orientation both to the coworker’s and one’s own expertise in the collaborative accomplishment of airport security work. I show how screeners recruit action from colleagues in largely underspecified ways, based on shared access to the visibility field and expected professional vision. Requesting is tacitly (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  60
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection and cyber (...) included in these strategic documents. The final part contains recommendations for future research and evaluation of its key features. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  33
    Assessing National Public Health Law to Prevent Infectious Disease Outbreaks: Immunization Law as a Basis for Global Health Security.Tsion Berhane Ghedamu & Benjamin Mason Meier - 2019 - Journal of Law, Medicine and Ethics 47 (3):412-426.
    Immunization plays a crucial role in global health security, preventing public health emergencies of international concern and protecting individuals from infectious disease outbreaks, yet these critical public health benefits are dependent on immunization law. Where public health law has become central to preventing, detecting, and responding to infectious disease, public health law reform is seen as necessary to implement the Global Health Security Agenda. This article examines national immunization laws as a basis to implement the GHSA and promote (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  16
    The Ethics of Neuroscience and National Security.Nicholas Evans - 2021 - Routledge.
    New advances in neuroscience promise innovations in national security, especially in the areas of law enforcement, intelligence collection, and armed conflict. But ethical questions emerge about how we can, and should, use these innovations. This book draws on the open literature to map the development of neuroscience, particularly through funding by the Defense Advanced Research Projects Agency, in certain areas like behavior prediction, behavior modification, and neuroenhancement, and its use in the creation of novel weapons. It shows how advances (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  8
    The Human and the Social: a Comparison of the Discourses of Human Development, Human Security and Social Quality. Des Gasper - 2011 - International Journal of Social Quality 1 (1):91-108.
    This paper presents a structured comparison of the social quality approach with the UNDP-led 'human development' approach and its sister work on 'human security'. Through clarification of their respective foci, roles and underlying theoretical and value assumptions, the paper suggests that partnership of the social quality approach with these 'human' approaches appears possible and relevant for each side.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  16
    Inevitable Decay: Debates over Climate, Food Security, and Plant Heredity in Nineteenth-Century Britain.John Lidwell-Durnin - 2019 - Journal of the History of Biology 52 (2):271-292.
    Climate change and the failure of crops are significant but overlooked events in the history of heredity. Bad weather and dangerously low harvests provided momentum and urgency for answers to questions about how best to improve and acclimatize staple varieties. In the 1790s, a series of crop failures in Britain led to the popularization of and widespread debate over Thomas Andrew Knight’s suggestion that poor weather was in fact largely unconnected to the bad harvests. Rather, Knight argued, Britain’s older varieties—particularly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  26
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  21.  14
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  14
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burris & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  23.  11
    Freedom of Conscience and Freedom of Religion within the Context of Human Security and Authenticity in Vito Mancuso’s Lay Secular Theology.Corneliu C. Simuţ - 2017 - Neue Zeitschrift für Systematicsche Theologie Und Religionsphilosophie 59 (2):228-244.
    Name der Zeitschrift: Neue Zeitschrift für Systematische Theologie und Religionsphilosophie Jahrgang: 59 Heft: 1 Seiten: 228-244.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  27
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  33
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical moral code for this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  26
    Export Controls and the Tensions Between Academic Freedom and National Security.Samuel A. W. Evans & Walter D. Valdivia - 2012 - Minerva 50 (2):169-190.
    In the U.S.A., advocates of academic freedom—the ability to pursue research unencumbered by government controls—have long found sparring partners in government officials who regulate technology trade. From concern over classified research in the 1950s, to the expansion of export controls to cover trade in information in the 1970s, to current debates over emerging technologies and global innovation, the academic community and the government have each sought opportunities to demarcate the sphere of their respective authority and autonomy and assert themselves in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  16
    Securitizing Islam: Identity and the Search for Security.Stuart Croft - 2012 - Cambridge University Press.
    Securitizing Islam examines the impact of 9/11 on the lives and perceptions of individuals, focusing on the ways in which identities in Britain have been affected in relation to Islam. 'Securitization' describes the processes by which a particular group or issue comes to be seen as a threat, and thus subject to the perceptions and actions which go with national security. Croft applies this idea to the way in which the attitudes of individuals to their security and to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  5
    The implications of the conflict in ex-Yugoslavia for the European security.Zagorka T. Golubović - 1996 - Filozofija I Društvo 1996 (9):319-333.
  29.  49
    Bourdieu, International Relations, and European security.Trine Villumsen Berling - 2012 - Theory and Society 41 (5):451-478.
    This article takes the failure to grasp fully the paradigmatic case of European security after the Cold War as an example of how International Relations (IR) would benefit from reformulating not only its empirical research questions but also several of its central conceptual building blocks with the aid of Bourdieusian sociology. The separation between theory and practice and the overemphasis on military power and state actors blind IR from seeing the power struggles that reshaped European security. Instead, a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  5
    Gendered Views in a Feminist State: Swedish Opinions on Crime, Terrorism, and National Security.Isabella Nilsen, Eva-Karin Olsson & Charlotte Wagnsson - 2020 - Gender and Society 34 (5):790-817.
    Gender differences have been observed regarding many political and social issues, yet we lack comprehensive evidence on differences in perceptions on a wide range of security issues increasingly important to voters: military threats, criminality, and terrorism. Previous research suggests that when women are highly politically mobilized, as they are in Sweden, gender differences in political opinion are large. On the other hand, Swedish politicians have worked hard to reduce gender stereotypical thinking. This prompts the question: Are there gender differences (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  11
    International Law, COVID-19 and Feminist Engagement with the United Nations Security Council: The End of the Affair?Catherine O’Rourke - 2020 - Feminist Legal Studies 28 (3):321-328.
    The gendered implications of COVID-19, in particular in terms of gender-based violence and the gendered division of care work, have secured some prominence, and ignited discussion about prospects for a ‘feminist recovery’. In international law terms, feminist calls for a response to the pandemic have privileged the United Nations Security Council (UNSC), conditioned—I argue—by two decades of the pursuit of the Women, Peace and Security (WPS) agenda through the UNSC. The deficiencies of the UNSC response, as characterised by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  20
    The Problem of Proliferation: Guidelines for Improving the Security of Qualitative Data in a Digital Age.Judith Aldridge, Juanjo Medina & Robert Ralphs - 2010 - Research Ethics 6 (1):3-9.
    High profile breaches of data security in government and other organizations are becoming an increasing concern amongst members of the public. Academic researchers have rarely discussed data security issues as they affect research, and this is especially the case for qualitative social researchers, who are sometimes disinclined to technical solutions. This paper describes 14 guidelines developed to help qualitative researchers improve the security of their digitally-created and stored data. We developed these procedures after the theft of a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  16
    Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.John D. Bustard - 2018 - Science and Engineering Ethics 24 (2):683-698.
    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: aligning teaching content with student interests; taking a pragmatic rather than a philosophical approach to issue resolution; addressing the full complexity of real-world case studies; and covering content in a way that students find entertaining. The use of these principles is then discussed with respect (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Reasons for action: making a difference to the security of outcomes.Mattias Gunnemyr & Caroline Torpe Touborg - 2022 - Philosophical Studies 180 (1):333-362.
    In this paper, we present a new account of teleological reasons, i.e. reasons to perform a particular action because of the outcomes it promotes. Our account gives the desired verdict in a number of difficult cases, including cases of overdetermination and non-threshold cases like Parfit’s famous _Drops of water._ The key to our account is to look more closely at the metaphysics of causation. According to Touborg (_The dual nature of causation_, 2018), it is a necessary condition for causation that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  35.  76
    The Principled Case for Employing Private Military and Security Companies in Interventions for Human Rights Purposes.Deane-Peter Baker & James Pattison - 2011 - Journal of Applied Philosophy 29 (1):1-18.
    The possibility of using private military and security companies to bolster the capacity to undertake intervention for human rights purposes has been increasingly debated. The focus of such discussions has, however, largely been on practical issues and the contingent problems posed by private force. By contrast, this article considers the principled case for privatising humanitarian intervention. It focuses on two central issues. First, does outsourcing humanitarian intervention to private military and security companies pose some fundamental, deeper problems in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  29
    Media framing of immigrants in Central Europe in the period surrounding the refugee crisis: Security, negativity, and political sources.Jan Kovář - 2023 - Communications 48 (1):5-27.
    This article investigates how all the main quality and tabloid newspapers and the television newscasts of the main broadcasters in Czechia and Slovakia framed immigrants, what the tone of the employed frames was, and who the main framing actors were before and during the EU refugee crisis (2013–2016). Using quantitative content analysis (N = 7,910), we show that security and cultural frames are most commonly employed while the victimization frame is much less common. Whereas tabloids use the security (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  39
    Linguistic Patterns of Modality in UN Resolutions: The Role of Shall, Should, and May in Security Council Resolutions Relating to the Second Gulf War.Giuseppina Scotto di Carlo - 2017 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 30 (2):223-244.
    This paper will discuss the role of modality in UN Security Council resolutions. As a work in progress on whether the use of strategic vagueness in UN resolutions has contributed to the outbreak of the second Gulf war, this work proposes a qualitative and quantitative analysis on the role of vagueness of the central modal verbs shall, should, and may in the institutional language of the UN, drawing upon Wodak’s Discourse-Historical Approach and Jenkins, Gotti, and Trosborg's theories on modality. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  44
    Evolutionary Debunking Arguments, Explanationism and Counterexamples to Modal Security.Christopher Noonan - forthcoming - Erkenntnis:1-23.
    According to one influential response to evolutionary debunking arguments against moral realism, debunking arguments fail to undermine our moral beliefs because they fail to imply that those beliefs are insensitive or unsafe. The position that information about the explanatory history of our belief must imply that our beliefs are insensitive or unsafe in order to undermine those beliefs has been dubbed “Modal Security”, and I therefore label this style of response to debunking arguments the “modal security response”. An (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  8
    Modern wars and their impact on national security.Andrey Kovalev - 2023 - Sotsium I Vlast 4 (98):37-50.
    Introduction. War occupies a special place in the mankind development because it is an integral part of its history. Thousands of researchers have been engaged in the problem of war from the standpoint of various sciences. The confrontation of nations and individual social groups as a social and political fact has been seen in philosophical thought since the epoch of the first major civilizations. However, at the present stage of society’s development, the problems of war are closely connected with the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Cuba's national food program and its prospects for food security.Carmen Diana Deere - 1993 - Agriculture and Human Values 10 (3):35-51.
    Cuba's National Food Program aims to assure its population a minimum degree of food security during the current period of transition from dependency upon the ex-Socialist trading bloc. A number of important elements of the Food Program, however, were conceived before the demise of COMECON in an effort to deepen food import substitution. This paper reviews the degree of Cuba's food import dependence before the breakup of the Socialist bloc, the initial targets of the National Food Program, and how (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  74
    Evolutionary Biology Research, Entrepreneurship, and the Morality of Security-Seeking Behavior in an Imperfect Economy.Ronald K. Mitchell - 2004 - The Ruffin Series of the Society for Business Ethics 2004:263-287.
    This article investigates whether there is an underlying morality in the ways that human beings seek to obtain economic security within our imperfect economy, which can be illuminated through evolutionary biology research. Two research questions are the focus of the analysis: (1) What is the transaction cognitive machinery that is specialized for the entrepreneurial task of exchange-based security-seeking? and, (2) What are the moral implications of the acquisition and use of such transaction cognitions?Evolutionary biology research suggests within concepts (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  34
    Which is it you want – equality or maternity leave?: Alabaster v. Barclays Bank p.l.c. and Secretary of State for Social Security [2005] E.W.C.A Civ. 508, [2005] I.R.L.R. 576.Anne E. Morris - 2006 - Feminist Legal Studies 14 (1):87-97.
    In Alabaster v. Barclays Bank plc and Secretary of State for Social Security (No. 2: [2005] E.W.C.A Civ. 508, [2005] I.R.L.R. 576.) Michelle Alabaster won a grand total of £204.53 (plus £65.86 interest) after eight years of litigation, which included two visits to the Court of Appeal and one to the European Court of Justice. This marathon resulted from the sex discrimination which Alabaster had alleged in relation to the calculation of her Statutory Maternity Pay (S.M.P.) whilst she was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  19
    Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as an (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  88
    Darra Adam Khel a Supermarket of Illicit Arms : A Security Concern.Shakeel Husain - 2021 - Research Expression 4 (6):84-86.
    Illicit arms availability in neighbourhoods are always a threat to external and internal security. Due to the geopolitics of Afghanistan, superpowers and non-state actors were active in that region for decades .Consequently, the FATA area of Pakistan and Adam Khel in particular became an oasis for arms Producers and traders as well as terrorists and drug traffickers. America and the former Soviet Union poured Afghanistan with the latest weapons from 1979 to 1989. A major part of that stockpile came (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  27
    When is a Sale Not a Sale? The Riddle of Athenian Terminology for Real Security Revisited.Edward M. Harris - 1988 - Classical Quarterly 38 (02):351-.
    In Athens during the late Classical and Hellenistic periods, it was customary for a man who was borrowing a large sum of money to pledge some property as security for the repayment of his loan. To show that this property was legally encumbered, a flat slab of stone, called a horos, was set up, and an inscription, indicating the nature of the lien on the property, was inscribed on the horos. These horoi served to warn third parties that the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  34
    From complex conflicts to stable cooperation: Cases in environment and security.Jürgen Scheffran & Bruce Hannon - 2007 - Complexity 13 (2):78-91.
  47.  55
    The American Republic, Executive Power and the National Security State: Hannah Arendt's and Hans Morgenthau's Critiques of the Vietnam War.Douglas B. Klusmeyer - 2011 - Journal of International Political Theory 7 (1):63-94.
    There is nothing new or even faintly original in the neoconservative foreign policy vision. It simply recycles the old national security ideology for a post-Cold War era. Consistent with this ideological agenda, conservatives have also been advancing the case for the strong executive who operates above the law. In championing the principle of the strong executive, they are seeking to re-define the meaning of modern republicanism around this principle. During the 1960s Hannah Arendt and Hans Morgenthau developed a broad (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  16
    Orthodoxy of Ukraine and national security.Oleksandr N. Sagan - 2015 - Ukrainian Religious Studies 76:246-257.
    Is it possible and whether it is necessary to consider the events of the inter-church and inter-church Orthodox life of Ukraine through the prism of national security? What are the pain points in relations between the Ukrainian state and the Orthodox Churches? Does the legislation in Ukraine regulate state-church relations in Ukraine and whether it is Ukrainian-centric? These and other issues were the subject of consideration of the Expert Round Table on "Fighting Identities in Orthodoxy of Ukraine after the" (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  13
    Risk management in digitalized educational environments: Teachers’ information security awareness levels.Hamza Fatih Sapanca & Sezer Kanbul - 2022 - Frontiers in Psychology 13.
    With the spread of Information and Communication Technologies tools and the Internet, Twenty first century technologies have significantly affected human life, and it has been desired to be obtained continuously. It has become challenging to protect information due to the increase in the methods by which malicious people can get information. As a result, it is crucial to determine people’s awareness levels by revealing the risks and threats to information security. In this context, a study was conducted to show (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  43
    Violating ethics: unlawful combatants, national security and health professionals.D. Holmes & A. Perron - 2007 - Journal of Medical Ethics 33 (3):143-145.
    Violations of ethical conductThis article is about torture, power and the breach of ethical conduct among military doctors, nurses and medics in the “War on Terror”. Violations of ethical conduct have been widely recounted in academic and non-academic journals and reports.1 This paper is also a call to international boards of doctors and nurses to intervene directly to stop abuses undertaken by US military healthcare providers under the guise of the War on Terror. With evidence growing that US military and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 1000