Results for 'Securities industry'

994 found
Order:
  1. Ethics within the Securities Industry.John G. Weithers - 1989 - In Oliver F. Williams, Frank K. Reilly & John W. Houck (eds.), Ethics and the investment industry. Savage, MD: Rowman & Littlefield Publishers. pp. 35--39.
     
    Export citation  
     
    Bookmark  
  2.  12
    The Border Security Industry and the Second Refugee Crisis: A Commentary on Serena Parekh’s No Refuge: Ethics and the Global Refugee Crisis.José Jorge Mendoza - 2022 - Puncta 5 (3):72-81.
    Until recently, much of the philosophical literature on refugees has focused on what Serena Parekh (2020) in No Refuge: Ethics and the Global Refugee Crisis, calls the “first refugee crisis,” i.e., the refugee crisis as experienced from Europe, understood as the arrival of large numbers of asylum seekers and the political handling of this situation. This literature has therefore dealt primarily with questions about who really counts as a refugee and when states acquire obligations to admit non-citizens. Rarely, however, do (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3.  13
    The Ethics of Arbitration in the Securities Industry.John R. Boatright - 1998 - Business and Society Review 99 (1):19-24.
  4.  5
    Refraining Regulation in the Global Securities Industry.Lawrence J. Lad - 1992 - Proceedings of the International Association for Business and Society 3:691-710.
  5. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between cyber (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  12
    Ethics and the investment industry.Oliver F. Williams, Frank K. Reilly & John W. Houck (eds.) - 1989 - Savage, MD: Rowman & Littlefield Publishers.
    To find more information about Rowman and Littlefield titles, please visit www.rowmanlittlefield.com.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  6
    Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA. [REVIEW]James Chike Nwankwo - 2022 - Bulletin of Science, Technology and Society 42 (1-2):3-10.
    This article explores the technological innovations associated with industry 4.0 and how it has altered virtually every aspect of the human life. Even though in the process of redefining technology, the insatiable and complex needs of man can be met quite considerably, there are various challenges observed with its usage by individuals, groups, business organizations and countries. Some of the consequences highlighted in this study include cyber-threat or attacks against businesses and individuals, political figures and government. Therefore the author (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  26
    Mitigating risks of digitalization through managed industrial security services.Christoph Jansen & Sabina Jeschke - 2018 - AI and Society 33 (2):163-173.
    Digitalization has become a cornerstone of competitiveness in the industrial arena, especially in the cases of small lot sizes with many variants in the goods produced. Managers of industrial facilities have to handle the complexity that comes along with Industry 4.0 in diverse dimensions to leverage the potentials of digitalization for their sites. This article describes major drivers of this complexity in current industrial automation to outline the environment of today’s challenges for managers of this technical transition—and shows how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  52
    Private Security Companies and Institutional Legitimacy: Corporate and Stakeholder Responsibility.Heather Elms & Robert A. Phillips - 2009 - Business Ethics Quarterly 19 (3):403-432.
    The private provision of security services has attracted a great deal of recent attention, both professional and popular. Much of that attention suggests the questioned moral legitimacy of the private vs. public provision of security. Linking the literature on moral legitimacy and responsibility from new institutional and stakeholder theories, we examine the relationship between moral legitimacy and responsible behavior by both private security companies (PSCs) and their stakeholders. We ask what the moral-legitimacy-enhancing responsibilities of both might be, and contribute to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  10.  30
    Hacia una nueva cultura de seguridad e higiene industrial en las empresas Mexicanas (Toward a new culture of security and industrial hygiene in Mexican companies).R. Villarreal, M. H. Badii & J. L. Abreu - 2008 - Daena 3 (1):260-337.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  27
    Two students and a professor discover what every business person should know about Industrial Security Firms.Maris Stella Swift, Travis Cornwell & Joseph Woods - 2010 - International Journal of Business Governance and Ethics 5 (1/2):112-127.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  24
    Secured Financing of Intellectual Property Assets and the Reform of English Personal Property Security Law.Iwan Davies - 2006 - Oxford Journal of Legal Studies 26 (3):559-583.
    The past three decades have seen a decline in traditional industries in the United Kingdom and there has been a relative decline in the value of physical assets to the UK economy. At the same time, the value of intangible assets seen in intellectual property rights have increased considerably. As such, IP rights represent important assets for companies and often comprise the foundation for market dominance and continued profitability. There is a structural uncertainty in the law relating to the use (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  20
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various stakeholder groups (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become especially evident in the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  13
    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks.Jiaqi Liang, Yibei Wu, Jun’E. Li, Xiong Chen, Heqin Tong & Ming Ni - 2021 - Complexity 2021:1-12.
    With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  15
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, malware, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  40
    National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience. [REVIEW]Gail Ridley - 2011 - Journal of Business Ethics 103 (1):111-125.
    This article argues for an extension to the scope of corporate social responsibility (CSR) research to include a contemporary issue of importance to national and global security, critical infrastructure resilience. Rather than extending the multiple perspectives on CSR, this study aimed to identify a method of recognising CSR-related issues, before applying it to two dissimilar case studies on critical infrastructure resilience. One case study was of an international telecommunications company based in the US while the other was of the railway (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  4
    Industrial Perspective: Photographs of the Gulf Coast.Andrew Borowiec - 2005 - Center for American Places.
    The world of factories and industry is a crucial yet oft-forgotten fact that undergirds the bustling prosperity of contemporary American life. Photographer Andrew Borowiec has spent his career exploring the industrial fields of middle America, and he now turns his camera's eye southward in Industrial Perspective, exploring the panoramic landscapes along and near the Gulf of Mexico where oil and gas industry workers live and work. Borowiec gained permission from oil corporations to enter their high-security sites and was (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, decision-making responsibility, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  1
    Chapter 9. Information Security in the Structure of the Security Complex.Сергій СТАВЧЕНКО - 2024 - Epistemological studies in Philosophy, Social and Political Sciences 1 (1):259-280.
    The essence of the security complex is revealed. Approaches to understanding the essence of information security are determined, in particular, as a state of security, as a type of public information legal relations, the direction of information relations within the limits of information legislation, the state of information (information environment of society, information development). The informational component of national security is considered. The institutional landscape of information security is described, which includes supranational international bodies and institutions and transnational corporations, states (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  47
    Self-regulating industry behavior: Antitrust limitations and trade association codes of conduct. [REVIEW]Thomas A. Hemphill - 1992 - Journal of Business Ethics 11 (12):915 - 920.
    Self-regulation exists at the firm-level, the industry-level, and the business-level of economic organization. Industry self-regulation has faced economic (free rider) and legal (antitrust) impediments to widespread implementation, although there exist examples of effective industry self-regulation, e.g., securities industry and the SEC, advertising and the FTC. By instituting industry codes of conduct, national trade associations have shown to be natural vehicles for self-regulation. While there has been long-standing general encouragement for establishing industry codes, adopting (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  24.  55
    Ethical behaviour and securities trading.Jan H. W. Goslings - 1997 - Business Ethics, the Environment and Responsibility 6 (3):147–152.
    “Economic man does not ask himself ethical questions”. Yet securities trading inevitably raises many ethical issues, and ethical behaviour may be restricting and costly. Drawing on his economics background and his executive experience in the insurance and pension investment industry, as well as supervisory positions on the European Option Exchange, Dr Goslings analyses the securities markets and their structure, and explores their moral strengths and weaknesses in The Netherlands and elsewhere, before offering some practical recommendations.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  13
    Ethical Behaviour and Securities Trading.Jan H. W. Goslings - 1997 - Business Ethics, the Environment and Responsibility 6 (3):147-152.
    “Economic man does not ask himself ethical questions”. Yet securities trading inevitably raises many ethical issues, and ethical behaviour may be restricting and costly. Drawing on his economics background and his executive experience in the insurance and pension investment industry, as well as supervisory positions on the European Option Exchange, Dr Goslings analyses the securities markets and their structure, and explores their moral strengths and weaknesses in The Netherlands and elsewhere, before offering some practical recommendations. He has (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  18
    Genomics in Industry: issues of a bio-based economy.Patricia Osseweijer, Laurens Landeweerd & Robin Pierce - 2010 - Genomics, Society and Policy 6 (2):1-14.
    What value does genomics hold for industry? Ten years after the White House Press conference where the human genome sequence was first presented, we ask in which ways and to what extent the developments in genomics have been integrated into industry. This enables us to assess whether this integration has been as successful as expected, but also which unexpected developments in genomics advances have triggered additional benefits for industry. Genomics has contributed to the beginning of a global (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  12
    Intellectual property and industrialization: legalizing hope in economic growth.Laura R. Ford - 2017 - Theory and Society 46 (1):57-93.
    This article draws on theoretical resources from economic sociology and sociology of law to intervene in economic debates about the relationship between intellectual property and industrialization. Utilizing historical evidence from the earliest period of American intellectual property law and from a formative company in the New England textile industry, I propose a social process of influence that connects intellectual property law to industrialization. I argue that, consistent with the findings of New Economic Sociology, social relationship structures and social capital (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  13
    On Spillover Effect of Systemic Risk of Listed Securities Companies in China Based on Extended CoVaR Model.Ze-Jiong Zhou, Shao-Kang Zhang, Mei Zhang & Jia-Ming Zhu - 2021 - Complexity 2021:1-13.
    Based on the daily data from January 2, 2019, to September 30, 2020, this paper uses the extended CoVaR model to measure the spillover effect of systemic risk among top 10 securities companies by market value in China, All Share Brokerage Index, All Share Financials Index, All Share Insurance Index, and CSI Banks Index. The conclusions are as follows: there are risk spillover effects among 10 securities companies, which are asymmetric and bidirectional and highly volatile in a short (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  9
    Social Innovation for Food Security and Tourism Poverty Alleviation: Some Examples From China.Guo-Qing Huang & Fu-Sheng Tsai - 2021 - Frontiers in Psychology 12.
    The COVID-19 pandemic has brought hunger to millions of people around the world. Social distancing measures coupled with national lockdowns have reduced work opportunities and the overall household incomes. Moreover, the disruption in agricultural production and supply routes is expected to continue into 2021, which may leave millions without access to food. Coincidentally, those who suffer the most are poor people. As such, food security and tourism poverty alleviation are interlinked when discussing social problems and development. While the corporate interest (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  6
    It's legal but it ain't right: harmful social consequences of legal industries.Nikos Passas & Neva R. Goodwin (eds.) - 2004 - Ann Arbor: University of Michigan Press.
    Many U.S. corporations and the goods they produce negatively impact our society without breaking any laws. We are all too familiar with the tobacco industry's effect on public health and health care costs for smokers and nonsmokers, as well as the role of profit in the pharmaceutical industry's research priorities. It's Legal but It Ain't Right tackles these issues, plus the ethical ambiguities of legalized gambling, the firearms trade, the fast food industry, the pesticide industry, private (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  25
    Russell versus the Happiness Industry [review of Tim Phillips, Bertrand Russell’s The Conquest of Happiness; a Modern-Day Interpretation of a Self-Help Classic ].Chad Trainer - 2013 - Russell: The Journal of Bertrand Russell Studies 33 (1):72-75.
    In lieu of an abstract, here is a brief excerpt of the content:72 Reviews RUSSELL VERSUS THE HAPPINESS INDUSTRY Chad Trainer 1006 Davids Run Phoenixville, pa 19460, usa [email protected] Tim Phillips. Bertrand Russell’sThe Conquest of Happiness; a Modern-Day Interpretation of a Self-Help Classic. Oxford: Infinite Ideas, 2010. Pp. 118. 978-1906821 -27-2 (pb). us$11.95. German translation as Bertrand Russells Eroberung des Glücks in a “Business Classics” series (gabal Verlag, 2012). he popular writing Bertrand Russell undertook to make money has long (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  32.  4
    Between Economy and the State: Private Security and Rule Enforcement in Russia.Vadim Volkov - 2000 - Politics and Society 28 (4):483-501.
    This article explores how the segments of the state police and security organs were transformed into a large private security industry in Russia after 1992. As market reforms were launched, the numbers of private property owners grew dramatically, but the state institutions for the protection of property and dispute settlement were either absent or defunct. This gap was consequently filled with various private institutions, private protection companies and private security services being the major ones. The article studies the context (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Diachronic exploitation of landscape resources - tangible and intangible industrial heritage and their synthesis suspended step.Georgia Zacharopoulou - 2015 - Https://Ticcih-2015.Sciencesconf.Org/.
    It is expected that industrial heritage actually tells the story of the emerging capitalism highlighting the dynamic social relationship between the “workers” and the owners of the “production means”. In current times of economic crisis, it may even involve a painful past with lost social, civil, gender and/or class struggles, a depressing present with abandoned, fragmented, degraded landscapes and ravaged factories, and a hopeless future for the former workers of the local (not only) society; or just a conquerable ground for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  32
    Japanese risk society: trying to create complete security and safety using information and communication technology.Kiyoshi Murata & Yohko Orito - 2010 - Acm Sigcas Computers and Society 40 (3):38-49.
    The construction of a secure and safe society using information and communication technology is recognised as an urgent issue in Japan. This recognition is based on public fear about crime related to manufactured risk caused by modernisation or industrial civilisation. This fear has created a social atmosphere that has led to the rapid development and implementation of security systems using ICT, such as security cameras, smart IC cards and mobile phones, to establish security and safety in Japanese society. However, the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35.  20
    How does moral identity promote employee voice behavior? The roles of work engagement and leader secure-base support.Na-Ting Liu, Shu-Chen Chen & Wei-Chu Lee - 2022 - Ethics and Behavior 32 (5):449-467.
    ABSTRACT This study seeks exploration of how employees’ moral identity is related to voice behavior in the current organizational dynamics. By integrating the self-consistency theory with a situational strength perspective, a moderated mediation model was constructed to examine connections among moral identity, leader secure-base support, work engagement, and voice behavior. Surveys were collected at 2 time points, 1 month apart, from 206 full-time employees in various organizations and industries in Taiwan. Supporting results indicated that employees’ moral identity was positively related (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  18
    The Morality of Private War: The Challenge of Private Military and Security Companies.James Pattison - 2014 - Oxford University Press.
    The private military industry has been growing rapidly since the end of the Cold War. The Morality of Private War uses normative political theory to assess the leading moral arguments for and against the use of private military and security companies.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  7
    Good practices in designing a communication channel architecture for secure async flexible distributed collaboration.Rudolf Erdei, Daniela Delinschi, Oliviu Matei & Laura Andreica - 2024 - Logic Journal of the IGPL 32 (2):334-351.
    In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (IoT). The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  6
    Communal Beingness and Affect: An Exploration of Trauma in an Ex-industrial Community.Valerie Walkerdine - 2010 - Body and Society 16 (1):91-116.
    The article explores the place of affect in community relations with respect to trauma following the closure of a steelworks for a working-class community in the South Wales valleys in 2002. A review of sociological approaches to community demonstrates the poor handling of relational and affective aspects which, it is argued, are central to the way in which community relations were formed and provided a safe and containing skin against the uncertainty of industrial production. Using psychoanalytic approaches to affect which (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  39.  12
    Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept.Markel Sainz, Iñaki Garitano, Mikel Iturbe & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (4):461-472.
    Specifically tailored industrial control systems attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks, new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes and presents (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The Rise of Golden Dawn: Ideology and Organization in an Industry of Private Protection in Contemporary Greece.Mattia Zulianello - 2015 - Governare la Paura. Journal of Interdisciplinary Studies 8 (1).
    In this paper I analyze a case of extreme response to need of security in the landscape of advanced democracies: the role of Golden Dawn in the management and reproduction of the profound socio-economic crisis in Greece. I argue that the keys behind the success of such a party are to be found in two distinct but self-reinforcing elements: its organizational strength and its anti-system ideology. The most significant organizational structures and activities which transformed Golden Dawn into a quasi-mafia style (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  12
    The Information Revolution in the Post-Industrial Society: Dangers in Political Processes.Olga Kravchuk, Nataliia Shoturma, Ganna Grabina, Iryna Myloserdna, Vitalii Vedenieiev & Anastasiia Shtelmashenko - 2022 - Postmodern Openings 13 (4):113-126.
    The relevance of the study lies in the fact that the information and computer revolution has made it possible to create and include in the system of social circulation such information flows, which are currently sufficient to ensure the most rational use of nature, demographic, economic, industrial, agricultural and spiritual and cultural development of mankind. The phenomenon of the information revolution is the result of two parallel processes that can develop throughout history: an increase in the role and volume of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. The Sniper and the Psychopath: A Parable in Defense of the Weapons Industry.Duncan MacIntosh - 2023 - In Daniel Schoeni, Tobias Vestner & Kevin Govern (eds.), Ethical Dilemmas in the Global Defense Industry. Oxford University Press. pp. 47-78.
    This chapter discusses the fundamental question of the defense industry’s role and legitimacy for societies. It begins with a parable of a psychopath doing something self-serving that has beneficial moral consequences. Analogously, it is argued, the defense industry profiting by selling weapons that can kill people makes it useful in solving moral problems not solvable by people with ordinary moral scruples. Next, the chapter argues that while the defense industry is a business, it is also implicated in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  18
    Participants’ awareness of ethical compliance, safety and protection during participation in pharmaceutical industry clinical trials: a controlled survey.Gerardo González-Saldivar, René Rodríguez-Gutiérrez, Jose Luis Viramontes-Madrid, Alejandro Salcido-Montenegro, Neri Alejandro Álvarez-Villalobos, Victoria González-Nava & José Gerardo González-González - 2019 - BMC Medical Ethics 20 (1):2.
    The rapid increase of industry-sponsored clinical research towards developing countries has led to potentially complex ethical issues to assess. There is scarce evidence about the perception of these participants about the ethical compliance, security, and protection. We sought to evaluate and contrast the awareness and perception of participants and non-participants of industry-sponsored research trials on ethical, safety, and protection topics. A Cases-control survey conducted at twelve research sites in México. Previous and current participants of ISRT as well as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  44.  6
    Women workers in the mondragon system of industrial cooperatives.Clara Elcorobairutia & Sally L. Hacker - 1987 - Gender and Society 1 (4):358-379.
    A feminist analysis of the Basque Mondragon system of industrial cooperatives suggests that women fare somewhat better in cooperatives than in private firms in employment, earnings, and job security. Market phenomena and the family as basic economic unit affect women workers negatively, as does increasing professionalism in the technical core of the system. Similarities in gender stratification and segregation in capitalist, socialist, and cooperative workplaces call into question the ability of all three to deal adequately with gender equality. Full workplace (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  20
    The Impact of the Financial Crisis on Nonfinancial Firms: The Case of Brazilian Corporations and the “Double Circularity” Problem in Transnational Securities Litigation.Érica Gorga - 2015 - Theoretical Inquiries in Law 16 (1):131-182.
    This Article discusses the impact of the international financial crisis on Brazilian capital markets. While the banking industry was not severely affected, leading nonfinancial corporations experienced severe financial turmoil. Two Brazilian corporations cross-listed in the United States - Sadia S.A. and Aracruz Celulose S.A. - suffered billion-dollar losses when the Brazilian real unexpectedly plummeted in relation to the dollar. Despite earlier disclosure that these companies had engaged only in pure hedging activity, these great losses were found to be the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  60
    Embedding CSR Values: The Global Footwear Industry’s Evolving Governance Structure.Suk-Jun Lim & Joe Phillips - 2008 - Journal of Business Ethics 81 (1):143-156.
    Many transnational corporations and international organizations have embraced corporate social responsibility to address criticisms of working and environmental conditions at subcontractors' factories. While CSR 'codes of conduct' are easy to draft, supplier compliance has been elusive. Even third-party monitoring has proven an incomplete solution. This article proposes that an alteration in the supply chain's governance, from an arms-length market model to a collaborative partnership, often will be necessary to effectuate CSR. The market model forces contractors to focus on price and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  47.  17
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  19
    Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as an important (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    Responding to the problem of ‘food security’ in animal cruelty policy debates: building alliances between animal-centred and human-centred work on food system issues.Brodie Evans & Hope Johnson - 2020 - Agriculture and Human Values 37 (1):161-174.
    Research on ethical issues within food systems is often human-centric. As a consequence, animal-centric policy debates where regulatory decisions about food are being made tend to be overlooked by food scholars and activists. This absence was notable in the recent debates around Australia’s animal live export industry. Using Foucault’s tools, we explore how ‘food security’ is conceptualised and governed within animal cruelty policy debates about the live export trade. The problem of food security produced in these debates shaped Indonesians (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  10
    Optimization of management processes in the electric power industry based on mathematical modeling.Nikolay Dmitrievich Dmitriev, Dmitriy Grigoryevich Rodionov & Sergey Alekseevich Zhiltsov - 2021 - Kant 38 (1):17-23.
    The paper deals with the problems in the electric power industry, do not allow us to ensure a sufficient level of competitiveness of the industry and each individual subject of the electric power industry, the threatens national security, in particular, the economic security of the state, and creates barriers to maintaining the sustainable development of territories. It is proposed to use the economic and mathematical modeling allowed us to determine the high importance of human resources in the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 994