Results for 'IT security'

996 found
Order:
  1.  53
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  2.  6
    Is it becoming harder to secure reviewers for peer review? A test with data from five ecology journals.Timothy H. Vines, Alison Cobra, Jennifer L. Gow & Arianne Y. K. Albert - 2016 - Research Integrity and Peer Review 1 (1).
    BackgroundThere is concern in the academic publishing community that it is becoming more difficult to secure reviews for peer-reviewed manuscripts, but much of this concern stems from anecdotal and rhetorical evidence.MethodsWe examined the proportion of review requests that led to a completed review over a 6-year period (2009–2015) in a mid-tier biology journal (Molecular Ecology). We also re-analyzed previously published data from four other mid-tier ecology journals (Functional Ecology, Journal of Ecology, Journal of Animal Ecology, and Journal of Applied Ecology), (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Whose Justice is it Anyway? Mitigating the Tensions Between Food Security and Food Sovereignty.Samantha Noll & Esme G. Murdock - 2020 - Journal of Agricultural and Environmental Ethics 33 (1):1-14.
    This paper explores the tensions between two disparate approaches to addressing hunger worldwide: Food security and food sovereignty. Food security generally focuses on ensuring that people have economic and physical access to safe and nutritious food, while food sovereignty movements prioritize the right of people and communities to determine their agricultural policies and food cultures. As food sovereignty movements grew out of critiques of food security initiatives, they are often framed as conflicting approaches within the wider literature. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  4.  88
    Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  5.  16
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  42
    Is it less wrong to harm the vulnerable than the secure?Frances Howard-Snyder - 1992 - Journal of Philosophy 89 (12):643-647.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  18
    Is It Less Wrong to Harm the Vulnerable than the Secure?Frances Howard-Snyder - 1992 - Journal of Philosophy 89 (12):643.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Modal Security.Justin Clarke-Doane & Dan Baras - 2021 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  9. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  10
    Two dominant security concepts in Europe and its influence on Ukraine.Serhii M. Lysenko, Vladislav O. Veklych, Myhailo V. Kocherov, Ivan V. Servetskiy & Tetiana B. Arifkhodzhaieva - 2023 - Prometeica - Revista De Filosofía Y Ciencias 26:43-51.
    The article is devoted to the analysis of two dominant security concepts in the modern world. Given the long bipolarity of the world, due to the dominance of the Horde and Westphalian concepts of security, the question arises about the place of Ukraine in this coordinate system. In the process of research, a historical analysis of the emergence, formation and dissemination of two, alternative concepts of security, which are characteristic of countries with different governance models. The article (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  32
    Which is it you want – equality or maternity leave?: Alabaster v. Barclays Bank p.l.c. and Secretary of State for Social Security [2005] E.W.C.A Civ. 508, [2005] I.R.L.R. 576.Anne E. Morris - 2006 - Feminist Legal Studies 14 (1):87-97.
    In Alabaster v. Barclays Bank plc and Secretary of State for Social Security (No. 2: [2005] E.W.C.A Civ. 508, [2005] I.R.L.R. 576.) Michelle Alabaster won a grand total of £204.53 (plus £65.86 interest) after eight years of litigation, which included two visits to the Court of Appeal and one to the European Court of Justice. This marathon resulted from the sex discrimination which Alabaster had alleged in relation to the calculation of her Statutory Maternity Pay (S.M.P.) whilst she was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. Cuba's national food program and its prospects for food security.Carmen Diana Deere - 1993 - Agriculture and Human Values 10 (3):35-51.
    Cuba's National Food Program aims to assure its population a minimum degree of food security during the current period of transition from dependency upon the ex-Socialist trading bloc. A number of important elements of the Food Program, however, were conceived before the demise of COMECON in an effort to deepen food import substitution. This paper reviews the degree of Cuba's food import dependence before the breakup of the Socialist bloc, the initial targets of the National Food Program, and how (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  17.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  2
    “So Open It Hurts”: Enabling “Therefore, We Can …” in the Dangerous Secure World of Education.Barbara Stengel - 2013 - Philosophy of Education 69:1-15.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  22. America should use its surveillance tools to preserve national security.Jena Baker McNeill - 2014 - In David M. Haugen (ed.), War. Detroit: Greenhaven Press, A part of Gale, Cengage Learning.
     
    Export citation  
     
    Bookmark  
  23.  16
    Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  22
    Ethics and Health Security in the Australian COVID-19 Context: A Critical Interpretive Literature Review.Anson Fehross, Kari Pahlman & Diego S. Silva - 2024 - Journal of Bioethical Inquiry 21 (1):131-150.
    Background The concept of “health security” is often used to motivate public health responses, yet the ethical values that underpin this concept remain largely unexamined. The recent Australian responses to COVID-19 serve as an important case study by which we can analyse the pre-existing literature to see what ethical values shaped, and continue to shape, Australia’s response. Methods We conducted a critical interpretive literature review of academic and grey literatures within key databases, resulting in 2,220 sources. After screening for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. (Metasemantically) Securing Free Will.Jason Turner - 2013 - Australasian Journal of Philosophy 91 (2):295-310.
    Metasemantic security arguments aim to show, on metasemantic grounds, that even if we were to discover that determinism is true, that wouldn't give us reason to think that people never act freely. Flew's [1955] Paradigm Case Argument is one such argument; Heller's [1996] Putnamian argument is another. In this paper I introduce a third which uses a metasemantic picture on which meanings are settled as though by an ideal interpreter. Metasemantic security arguments are widely thought discredited by van (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  28.  23
    Security as a Political and Social Value.Vihren Bouzov - 2017 - Dialogue and Universalism 27 (2):141-150.
    Security can be defined as the process of support of a satisfactory control by the subject over harmful effects of the environment. In this aspect it is a political and social value of the same type as justice, democracy and freedom. Following the analysis of the existing conflicts in the world today, we conclude that the notion of security in its neoliberal interpretation has collapsed and it could be rejected and defended successfully only as a communitarian value.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  30. National Security Secrecy: How the Limits Change.Steven Aftergood - 2010 - Social Research: An International Quarterly 77 (3):839-852.
    As a nation, we seem to be of two minds about secrecy. We know that government secrecy is incompatible with democratic decision-making in obvious ways. Yet there is a near-universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities. Reconciling these conflicting interests is an ongoing challenge. In recent years, a large and growing number of public interest organizations and professional societies have turned their attention to government secrecy, identifying it as an (...)
     
    Export citation  
     
    Bookmark  
  31. Security, Profiling and Equality.Paul Bou-Habib - 2008 - Ethical Theory and Moral Practice 11 (2):149-164.
    How, exactly, must we strike the balance between security and equality? Must we insist, out of respect for the equality of persons, that the police refrain from using ethnic profiling and opt for some other strategy in their pursuit of terrorists, or must we allow the police to continue with this policy, which seems to sacrifice equality for the sake of security? This paper assesses the ethical status of ethnic profiling from the perspective of the ideal of equality. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  18
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Democracy and Security.Annabelle Lever - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International.
    This chapter is concerned with the role of democracy in preventing terrorism, identifying and apprehending terrorists, and in minimizing and alleviating the damage created by terrorism.1 Specifically, it considers the role of democracy as a resource, not simply a limitation, on counterterrorism.2 I am mainly concerned with the ways in which counterterrorism is similar to more familiar forms of public policy, such as the prevention of crime or the promotion of economic prosperity, and so nothing that I say turns on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  25
    Social security reform: Lessons from private pensions.Karen C. Burke & Grayson M. P. McCouch - unknown
    Widespread concerns about the long-term fiscal gap in Social Security have prompted various proposals for structural reform, with individual accounts as the centerpiece. Carving out individual accounts from the existing system would shift significant risks and responsibilities to individual workers. A parallel development has already occurred in the area of private pensions. Experience with 401 plans indicates that many workers will have difficulty making prudent decisions concerning investment and withdrawal of funds. Moreover, in implementing any system of voluntary individual (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  22
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  9
    Secure traveling salesman problem with intelligent transport systems features.Gloria Cerasela Crişan, Camelia-M. Pintea, Anisoara Calinescu, Corina Pop Sitar & Petrică C. Pop - forthcoming - Logic Journal of the IGPL.
    Meeting the security requests in transportation is nowadays a must. The intelligent transport systems represent the support for addressing such a challenge, due to their ability to make real-time adaptive decisions. We propose a new variant of the travelling salesman problem integrating security constraints inspired from ITSs. This optimization problem is called the secure TSP and considers a set of security constraints on its integer variables. Similarities with fuzzy logic are presented alongside the mathematical model of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  11
    INTRODUCTION: Securing Reproductive Justice After Dobbs.Aziza Ahmed, Nicole Huberfeld & Linda C. McClain - 2023 - Journal of Law, Medicine and Ethics 51 (3):463-467.
    When we conceptualized this symposium, Roe v. Wade1 was still the law of the land, albeit precariously. We aimed to commemorate its fiftieth anniversary by exploring historical, legal, medical, and related dimensions of access to abortion as well as the challenges ahead to secure reproductive justice. With the leak of the U.S. Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization on May 2, 2022, we shifted to mark the dawn of a new era. In the nearly identical official (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42.  33
    Securing Cisgendered Futures: Intersex Management under the “Disorders of Sex Development” Treatment Model.Catherine Clune-Taylor - 2019 - Hypatia 34 (4):690-712.
    In this critical, feminist account of the management of intersex conditions under 2006's controversial “Disorders of Sex Development” (DSD) treatment model, I argue that like the “Optimal Gender of Rearing” (OGR) treatment model it replaced, DSD aims at securing a cisgendered future for the intersex patient, referring to a normalized trajectory of development across the lifespan in which multiple sexed, gendered, and sexual characteristics remain in “coherent” alignment. I argue this by critically analyzing two ways that intersex management has changed (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  84
    Security as a Selective Project.Alice Hills - 2009 - Studies in Social Justice 3 (1):79-97.
    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities, where the principal political weapons are coercion and intimidation, and territoriality is a significant facet of security’s physical dimension and exclusionary tendencies. Cities such as Baghdad and Basra are divided into ethnic or sectarian areas, and security’s referent object is an identity or group. Friction exists between the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  12
    Security dilemma’ of pakistan in the context of afghanistan: A regional trilateral solution.Syed Shuja Uddin - 2016 - Journal of Social Sciences and Humanities 55 (2):89-100.
    Three inevitable realities instigate this study. Primarily, the goal of security in the region will most likely be accomplished just if as a minimum some level of cooperation is achieved between the major countries of the region. Second, Afghanistan cannot advance economically or enhance its security and administration independently without some cooperation from India and Pakistan. Third, although many strategists view the idea of Pak-India cooperation with distrust, there are many common grounds where both can gain considerable (...), governance, and economic advantages. Most of the existing studies are focused on the assumptions that how peace in the region will come. First view is about involvement of USA and European countries on one side and stake holders in Afghanistan on the other. Some believe in a trilateral pattern i.e. Western World, Afghan stake holders and Pakistan. Many also highlight the importance of support from neighboring countries like Iran, the Central Asian Republics, and China. This study highlights the significance of a trilateral solution in Afghanistan and the steps forward from this particular aspect. The possible answer to security dilemma of Pakistan in the context of Afghanistan is a solution within the region. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. Edible backyards: a qualitative study of household food growing and its contributions to food security[REVIEW]Robin Kortright & Sarah Wakefield - 2011 - Agriculture and Human Values 28 (1):39-53.
    Food security is a fundamental element of community health. Informal house-lot food growing, by providing convenient access to diverse varieties of affordable and nutritious produce, can provide an important support for community food security. In this exploratory assessment of the contribution home food gardening makes to community food security, in-depth interviews were conducted with gardeners in two contrasting neighborhoods in Toronto, Canada. A typology of food gardeners was developed, and this qualitative understanding of residential food production was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  46. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  34
    Social security and social welfare.Michael Adler - 2010 - In Peter Cane & Herbert M. Kritzer (eds.), The Oxford Handbook of Empirical Legal Research. Oxford University Press. pp. 399--423.
    This article reviews empirical research on social security and social welfare law. It identifies the efforts needs to be carried out to promote empirical research in this area of law and outlines an empirical research agenda of topics that should be given priority. The UK defines social security as based on five key benefits viz. social/contributory, categorical/universal, tax-based, and occupational/means-tested. This article focuses on the primary model of administrative justice. It is a three-fold: bureaucratic rationality/accuracy and efficiency; professional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  14
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  24
    Objectivity applied to embodied subjects in health care and social security medicine: definition of a comprehensive concept of cognitive objectivity and criteria for its application.Hans Magnus Solli & António Barbosa da Silva - 2018 - BMC Medical Ethics 19 (1):1-16.
    Background The article defines a comprehensive concept of cognitive objectivity applied to embodied subjects in health care. The aims of this study were: to specify some necessary conditions for the definition of a CCCO that will allow objective descriptions and assessments in health care, to formulate criteria for application of such a CCCO, and to investigate the usefulness of the criteria in work disability assessments in medical certificates from health care provided for social security purposes. Methods The study design (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  24
    Secured Financing of Intellectual Property Assets and the Reform of English Personal Property Security Law.Iwan Davies - 2006 - Oxford Journal of Legal Studies 26 (3):559-583.
    The past three decades have seen a decline in traditional industries in the United Kingdom and there has been a relative decline in the value of physical assets to the UK economy. At the same time, the value of intangible assets seen in intellectual property rights have increased considerably. As such, IP rights represent important assets for companies and often comprise the foundation for market dominance and continued profitability. There is a structural uncertainty in the law relating to the use (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 996