Results for 'Security-by-experiment'

993 found
Order:
  1.  22
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  75
    Human Experiments and National Security: The Need to Clarify Policy.Jonathan D. Moreno - 2003 - Cambridge Quarterly of Healthcare Ethics 12 (2):192-195.
    On September 4, 2001, press reports indicated that the Defense Intelligence Agency of the U.S. Department of Defense planned to reproduce a strain of anthrax virus suspected of being held in Russian laboratories. According to the same reports, the Central Intelligence Agency, under the auspices of Project Clear Vision, is engaged in building replicas of bomblets believed to have been developed by the former Soviet Union. These small bombs were designed to disperse biological agents, including anthrax. Government attorneys were said (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  3.  30
    Beyond food security: women’s experiences of urban agriculture in Cape Town.David W. Olivier & Lindy Heinecken - 2017 - Agriculture and Human Values 34 (3):743-755.
    Urban agriculture is an important source of food and income throughout Africa. The majority of cultivators on the continent are women who use urban agriculture to provide for their family. Much research on urban agriculture in Africa focuses on the material benefits of urban agriculture for women, but a smaller body of literature considers its social and psychological empowering effects. The present study seeks to contribute to this debate by looking at the ways in which urban agriculture empowers women on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Edmund Husserl: Experience by Itself is Not Science.A. P. Bird - 2021 - Cantor's Paradise (00):00.
    Husserl came over to philosophy from mathematics and he devoted many years to the formulation of a firm foundation for Philosophy that could even secure the status of "science" for it. But unlike some of his contemporaries (like Frege and Russell), he did not seek salvation for philosophy in the mathematical method. He argued philosophy (like any other field of study) should pay attention to uninterpreted basic experience and this would lead the way to understanding the essence of things. Essence, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  33
    Experience, Narrative, and Ethical Deliberation.by Cheryl Misak - 2008 - Ethics 118 (4):614-632.
  6.  19
    Les réseaux sociaux : un espoir pour une régulation efficace des acteurs économiques et financiers.Bouchra By & Hmaittane - 2014 - Éthique Publique 16 (2).
    La croissance de la taille des entreprises multinationales et de leur sphère d’influence, conjuguée à l’incapacité des États et des organisations transnationales à réguler leurs activités, a fait naître le besoin d’une nouvelle forme de régulation. Une première approche consiste en la structuration et l’organisation d’un mouve­ment citoyen. Toutefois, si certaines expériences ont été un succès , ce mode de régulation peut être détourné ou récupéré par ceux-là mêmes qu’il tente de réguler. Une deuxième approche suggère l’autorégulation des marchés économique (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. The clinical case of desire.Jane Doe & M. D. Commentary by Rosemary H. Balsam - 2019 - In Stephanie Brody & Frances Arnold (eds.), Psychoanalytic perspectives on women and their experience of desire, ambition and leadership. New York: Routledge, Taylor & Francis Group.
  8. #HerStory: The Psychological Well-Being, Lived Experiences, and Challenges Faced by Female Police Officers.Jayra Blanco, Ella Marie Doloque, Shelwina Ruth Bonifacio, Galilee Jordan Ancheta, Charles Brixter Sotto Evangelista, Janelle Jose, Jericho Balading, Andrea Mae Santiago, Liezl Fulgencio, Christian Dave Francisco & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 7 (1):20-32.
    Police officers are vital to maintaining security and the continuity of national functions. Thus, Police officers are more exposed to different kinds of psychological concerns. However, a female in this kind of profession, based on various studies, experienced higher levels of stress because of other factors. Further, the primary goal of this study is to investigate the psychological well-being, lived experiences, challenges, and coping mechanisms of female police officers. Employing the Interpretative Phenomenological Analysis, the findings of this study were: (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  51
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  10.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Real Heroes Don't Wear Capes: The Lived Experience and Challenges Faced by Preschool Teachers Amidst the Blended Learning.Timy Joy Juliano, Caryl Joy Barandino, Regelyn Curam, Kaycee Khyle Pasco, Ken Andrei Torrero & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 7 (1):166-173.
    Due to the COVID-19 pandemic, preschool teachers must quickly adjust to online education. During COVID-19, teachers have been forced to embrace technology. This study investigates the lived experiences and challenges of preschool teachers. Employing the Interpretative Phenomenological Analysis, the findings of this study were: It was found that managing parent expectations and dealing with challenging parent behavior were among the sources of stress for preschool teachers. This fear of being judged or criticized by parents could influence their teaching practices and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  7
    The Schenley Experiment: A Social History of Pittsburgh's First Public High School by Jake Oresick.Laura Gabrion - 2018 - Education and Culture 34 (1):87-89.
    In November 1916, John Dewey’s address to the National Education Association, entitled “Nationalizing Education,” appeared in the Journal of Education. Dewey’s fervent plea called upon educators to support American public education and one of its primary goals, that “every pupil recognizes all of the factors which have gone into our [national] being.”1 He cautioned against the alternative, stating: “In short, unless our education is nationalized in a way that recognizes the peculiarity of our nationalism in its internationalism, we shall breed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  19
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  26
    Doctrine as security? A systematic theological critique of the operational theological framework of the controversial South African neo-Pentecostal prophets.Collium Banda - 2021 - HTS Theological Studies 77 (4):1-10.
    This research article uses the theoretical framework of doctrine as believer's security to critique the theological framework behind the controversial activities reported amongst some South African neo-Pentecostal prophets, which include feeding congregants with grass, spraying them with insecticides and sexual violation of women congregants. The framework of the article falls within the discipline of systematic theology by raising the importance for South African Christians to develop a critical doctrinal framework for protecting themselves from controversial NPPs. The following main question (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  11
    Ethical Security Studies: A New Research Agenda.Jonna Nyman & Anthony Burke (eds.) - 2016 - Routledge.
    At a time of grave ethical failure in global security affairs, this is the first book to bring together emerging theoretical debates on ethics and ethical reasoning within security studies. In this volume, working from a diverse range of perspectives—poststructuralism, liberalism, feminism, just war, securitization, and critical theory—leading scholars in the field of security studies consider the potential for ethical visions of security, and lay the ground for a new field: "ethical security studies". These ethical (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  5
    Forum on S. Zabala, "Why only art can save us".ed by D. Angelucci & D. Angelucci With S. Zabala - 2020 - Lebenswelt. Aesthetics and Philosophy of Experience 15:114-154.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  2
    Common Foreign, Security, and Defense Policy.Ramses A. Wessel - 2015 - In Dennis Patterson (ed.), A Companion to European Union Law and International Law. Wiley-Blackwell. pp. 394–412.
    The Common Foreign and Security Policy (CFSP) objectives are an integral part of the overall objectives of the European Union and the policy area has developed from a purely intergovernmental form of cooperation in the days of the European political cooperation to an area in which the member states have increasingly accepted new forms of institutionalization. CFSP decisions are taken by the General Affairs Council, consisting of the ministers for foreign affairs of the member states. In spite of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  36
    ‘Doing Dignity Work’: Indian Security Guards’ Interface with Precariousness.Ernesto Noronha, Saikat Chakraborty & Premilla D’Cruz - 2020 - Journal of Business Ethics 162 (3):553-575.
    Increasing global competition has intensified the use of informal sector workforce worldwide. This phenomenon is true with regard to India, where 92% of the workers hold precarious jobs. Our study examines the dynamics of workplace dignity in the context of Indian security guards deployed as contract labour by private suppliers, recognising that security guards’ jobs were marked by easy access, low status, disrespect and precariousness. The experiences of guards serving bank ATMs were compared with those working in large (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  27
    Deconstructing homegardens: food security and sovereignty in northern Nicaragua.Karie Boone & Peter Leigh Taylor - 2016 - Agriculture and Human Values 33 (2):239-255.
    Development scholars and practitioners are promoting food security, food sovereignty, and the localization of food systems to prepare for the projected negative impacts of climate change. The implementation of biodiverse homegardens is often seen as a way not only to localize food production but also as a strategy in alignment with a food sovereignty agenda. While much scholarship has characterized and critiqued food security and sovereignty conceptualizations, relatively little research has examined people’s lived experiences in order to test (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  61
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  19
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  7
    Review: Allan Franklin. Shifting Standards: Experiments in Particle Physics in the Twentieth Century. [REVIEW]Review by: Vitaly Pronskikh - 2015 - Philosophy of Science 82 (4):727-730.
  23. Transmutation of species. Notebook b, 1837-1838. Notebook c, 1838. Notebook d, 1838. Notebook e, 1838-1839 / [all] transcribed and edited by David Kohn. Torn apart notebook, 1839-1841 / transcribed and edited by Sydney Smith & David Kohn. Summer 1842 / transcribed and edited by David Kohn. Zoology notes, edinburgh notebook, 1837-1839. Questions & experiments, 1839-1844. [REVIEW]Both] Transcribed & Edited by Paul H. Barrett - 1987 - In Charles Darwin (ed.), Charles Darwin's Notebooks, 1836-1844: Geology, Transmutation of Species, Metaphysical Enquiries. Cornell University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  24.  34
    Precarious Professionals: (in)Secure Identities and Moral Agency in Neocolonial Context.Joanne Jones & Kelly Thomson - 2017 - Journal of Business Ethics 146 (4):747-770.
    We contribute to the literature on ethics in the professions by theorizing how global mobility precipitates professional insecurity and constrained moral agency. We present our findings of a study of accountants migrating to Canada. Using postcolonial theory and relational/poststructuralist theories of identity and ethics, we contrast the experiences of marginalized and privileged migrant accountants to show how those with “diverse” social identities are not recognized by professionals in Canada and must seek recognition from Canadian colleagues, employers, and clients to reconstitute (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  25.  78
    Picture, image and experience. [REVIEW]Sonia Sedivy - 2001 - Philosophical Review 110 (3):472-475.
    Robert Hopkins’s Picture, Image and Experience aims to provide an account of pictorial representation that vindicates the intuitions of the many, namely that pictorial representation is a deeply visual phenomenon, that an explanation of pictorial representation needs to be based on an explanation of our experience of pictures, and that there must be some sense in the idea that pictures resemble their objects. Hopkins proposes that we can show what is correct in these intuitions by explaining pictures as representations that (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   85 citations  
  26. Part III. An emerging America.. Emerging technology and America's economy / excerpt: from "How will machine learning transform the labor market?" by Erik Brynjolfsson, Daniel Rock, and Prasanna Tambe ; Emerging technology and America's national security.Excerpt: From "Information: The New Pacific Coin of the Realm" by Admiral Gary Roughead, Emelia Spencer Probasco & Ralph Semmel - 2020 - In George P. Shultz (ed.), A hinge of history: governance in an emerging new world. Stanford, California: Hoover Institution Press, Stanford University.
     
    Export citation  
     
    Bookmark  
  27.  8
    FORUM on M.M. Merritt, Cambridge Elements: The Philosophy of Immanuel Kant. The Sublime.ed by Giulia Milli - 2023 - Lebenswelt: Aesthetics and Philosophy of Experience 20.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  97
    Does Experience Have Phenomenal Properties?Geoffrey Lee - 2016 - Philosophical Topics 44 (2):201-230.
    What assumptions are built into the claim that experience has “phenomenal properties,” and could these assumptions turn out to be false? I consider the issue specifically for the similarity relations between experiences: for example, experiences of different shades of red are more similar to each other than an experience of red and an experience of green. It is commonly thought that we have a special kind of epistemic access to experience that is more secure than our access to the external (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  15
    Bringing the National Security Agency into the Classroom: Ethical Reflections on Academia-Intelligence Agency Partnerships.Kathleen M. Vogel, Sean S., Colleen S., Paul Jones, Gwendolynne Reid & Christopher Kampe - 2019 - Science and Engineering Ethics 25 (3):869-898.
    Academia-intelligence agency collaborations are on the rise for a variety of reasons. These can take many forms, one of which is in the classroom, using students to stand in for intelligence analysts. Classrooms, however, are ethically complex spaces, with students considered vulnerable populations, and become even more complex when layering multiple goals, activities, tools, and stakeholders over those traditionally present. This does not necessarily mean one must shy away from academia-intelligence agency partnerships in classrooms, but that these must be conducted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  27
    Bringing the National Security Agency into the Classroom: Ethical Reflections on Academia-Intelligence Agency Partnerships.Christopher Kampe, Gwendolynne Reid, Paul Jones, S. Colleen, S. Sean & Kathleen M. Vogel - 2019 - Science and Engineering Ethics 25 (3):869-898.
    Academia-intelligence agency collaborations are on the rise for a variety of reasons. These can take many forms, one of which is in the classroom, using students to stand in for intelligence analysts. Classrooms, however, are ethically complex spaces, with students considered vulnerable populations, and become even more complex when layering multiple goals, activities, tools, and stakeholders over those traditionally present. This does not necessarily mean one must shy away from academia-intelligence agency partnerships in classrooms, but that these must be conducted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  29
    U.S. Responses To Japanese Wartime Inhuman Experimentation After World War Ii: National Security and Wartime Exigency.Howard Brody, Sarah E. Leonard, Jing-bao Nie & Paul Weindling - 2014 - Cambridge Quarterly of Healthcare Ethics 23 (2):220-230.
    In 1945–46, representatives of the U.S. government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the United States, influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the United States played an equally key role in concealing information about (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  32.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  33.  15
    Forum on Samir Gandesha - Johan Hartle, "Aesthetic Marx".ed by M. Farina - S. Marino & J. Hartle With S. Gandesha - 2019 - Lebenswelt. Aesthetics and Philosophy of Experience 13 (13).
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  8
    Review: Richard Sorabji, Gandhi and the Stoics: Modern Experiments on Ancient Values. [REVIEW]Review by: Charles A. Goodman - 2014 - Ethics 124 (2):436-440,.
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  10
    Northern Ireland’s Interregnum. Anna Burns’s Depiction of a (Post)-Troubles State of (In)security.Ryszard Bartnik - 2021 - Text Matters - a Journal of Literature, Theory and Culture 11:64-83.
    This paper aims to present the main contours of Burns’s literary output which, interestingly enough, grows into a personal understanding of the collective mindset of -Troubles Northern Ireland. It is legitimate, I argue, to construe her fiction as a body of work shedding light on certain underlying mechanisms of sectarian violence. Notwithstanding the lapse of time between 1998 and 2020, the Troubles’ toxic legacy has indeed woven an unbroken thread in the social fabric of the region. My reading of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  22
    “Si no comemos tortilla, no vivimos:” women, climate change, and food security in central Mexico.Beth A. Bee - 2014 - Agriculture and Human Values 31 (4):607-620.
    In recent years, it has become clear that food security is intimately related to complex environmental, social, political, and economic issues. Even though several studies document the impact of climate on food production and agriculture, a growing segment of research examines how climate change impacts food systems and associated livelihoods. Furthermore, while women play a crucial role in providing food security for their families, little research exists that examines the nexus among gender relations, climate change, and household food (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  55
    Review: Michael Brady, Emotional Insight: The Epistemic Role of Emotional Experience. [REVIEW]Review by: Michael Milona - 2015 - Ethics 125 (2):567-571,.
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  6
    Kumusha and masalads: (inter)generational foodways and urban food security in Zimbabwe.Sara F. Brouwer - 2022 - Agriculture and Human Values 40 (2):761-775.
    Understandings of urban foodways in Zimbabwe and other African countries have been dominated by food security frameworks. The focus on material scarcity and measurable health outcomes within these frameworks has often obscured the socio-cultural dimension of foodways and the historical and political structures that have shaped, and continue to shape, everyday relationships with food among different groups of urban residents in cities. Addressing these often-overlooked aspects, this paper looks at intergenerational contestations over foodways in a midsized high-density Zimbabwean town. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  33
    Ethics and Phishing Experiments.David B. Resnik & Peter R. Finn - 2018 - Science and Engineering Ethics 24 (4):1241-1252.
    Phishing is a fraudulent form of email that solicits personal or financial information from the recipient, such as a password, username, or social security or bank account number. The scammer may use the illicitly obtained information to steal the victim’s money or identity or sell the information to another party. The direct costs of phishing on consumers are exceptionally high and have risen substantially over the past 12 years. Phishing experiments that simulate real world conditions can provide cybersecurity experts (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Self-hood and the Flow of Experience.Barry Dainton - 2012 - Grazer Philosophische Studien 84 (1):161-200.
    Analytic philosophy in the 20 th century was largely hostile territory to the self as traditionally conceived, and this tradition has been continued in two recent works: Mark Johnston’s Surviving Death , and Galen Strawson’s Selves . I have argued previously that it is perfectly possible to combine a naturalistic worldview with a conception of the self as a subject of experience , a thing whose only essential attribute is a capacity for unifi ed and continuous experience. I argue here (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  41.  7
    Increasing a patient's sense of security in the hospital: A theory of trust and nursing action.Patricia S. Groves, Jacinda L. Bunch & Francis Kuehnle - 2023 - Nursing Inquiry 30 (4):e12569.
    Having a decreased sense of security leads to unnecessary suffering and distress for patients. Establishing trust is critical for nurses to promote a patient's sense of security, consistent with trauma‐informed care. Research regarding nursing action, trust, and sense of security is wide‐ranging but fragmented. We used theory synthesis to organize the disparate existing knowledge into a testable middle‐range theory encompassing these concepts in hospitals. The resulting model illustrates how individuals are admitted to the hospital with some predisposition (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  13
    Experiments with Non/Violence: King's Stride Toward Pragmatism.Andrew Stone Porter - 2021 - American Journal of Theology and Philosophy 42 (3):35-56.
    In The American Evasion of Philosophy, Cornel West writes, "The social movement led by Martin Luther King, Jr., represents the best of what the political dimension of prophetic pragmatism is all about." Yet West hastens to clarify that King himself "was not a prophetic pragmatist." King, West implies, did not accept that the truth-value of a proposition is correlative to its success in securing desired ends in action—the view that, as West paraphrases William James, "truth is a species of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  12
    Assessment of the Immediate and Potential Long-Term Effects of COVID-19 Outbreak on Socioeconomics, Agriculture, Security of Food and Dietary Intake in Nigeria.Richard Akinwumi Oyeyinka, Kamilu Kolade Bolarinwa, Oluwakemi Adeola Obayelu & Abiodun Elijah Obayelu - 2021 - Food Ethics 6 (1):1-22.
    Nigeria agriculture, food security and dietary intake have not been exempted from the disruptions in countless sectors around the world due to the outbreak of COVID-19. The country first experienced the outbreak on February 27, 2020, and the experience since then has shown negative effects not only on the socioeconomic conditions but also on agriculture, food security and dietary intake. Long term in-depth analysis of the effects of this pandemic on food security and dietary intake using quantitative (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  11
    Exploiting multimodal biometrics for enhancing password security.Konstantinos Karampidis - 2024 - Logic Journal of the IGPL 32 (2):293-305.
    Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  43
    Gender, livestock assets, resource management, and food security: Lessons from the SR-CRSP. [REVIEW]Corinne Valdivia - 2001 - Agriculture and Human Values 18 (1):27-39.
    North Sumatra and West Java in Indonesia, the Andes of Bolivia and Peru, Western Province, the Coast and Machakos in Kenya, were Small Ruminant Collaborative Research Support Program (SR-CRSP) sites in which the role of small ruminants was studied and where technological interventions were designed. In all cases the target groups were poor rural households that could maintain sheep, goats, or South American camelids. The objective was to increase the welfare of families through the use of small ruminant technologies. Access (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  46.  14
    The Chemical Promise: Experiment and Mysticism in the Chemical Philosophy, 1550-1800: Selected Essays of Allen G. Debus.Allen G. Debus - 2006 - Science History Publications.
    There are some who would question the need to republish papers that have already appeared elsewhere. Walter Pauel once said that scholars should think in terms of books rather than research papers since the latter become lost in the literature. When he told me this year ago I was not entirely convinced. Surely the young scholar must publish papers to secure his academic position. In addition, throughout his career he attends conferences many of which will require the publication of his (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  92
    Dewey's art as experience : The psychological background.Richard Shusterman - 2010 - Journal of Aesthetic Education 44 (1):pp. 26-43.
    In lieu of an abstract, here is a brief excerpt of the content:Dewey's Art as ExperienceThe Psychological BackgroundRichard Shusterman (bio)IThe year 2009 marks the 150th anniversary of John Dewey's birth and also the 75th anniversary of the publication of his aesthetic masterpiece Art as Experience—a book that has been extremely influential within the field of aesthetics, not only in philosophical aesthetics and aesthetic education but also in the arts themselves.1 I am honored to commemorate this double Deweyan anniversary with an (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  48.  33
    Inductivism in Practice: Experiment in John Herschel’s Philosophy of Science.Aaron D. Cobb - 2012 - Hopos: The Journal of the International Society for the History of Philosophy of Science 2 (1):21-54.
    The aim of this work is to elucidate John F. W. Herschel’s distinctive contribution to nineteenth-century British inductivism by exploring his understanding of experimental methods. Drawing on both his explicit discussion of experiment in his Preliminary Discourse on Natural Philosophy and his published account of experiments he conducted in the domain of electromagnetism, I argue that the most basic principle underlying Herschel’s epistemology of experiment is that experiment enables a particular kind of lower-level experimental understanding of phenomena. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  45
    Poetry as Experience.Philippe Lacoue-Labarthe - 1999 - Stanford University Press.
    Lacoue-Labarthe's Poetry as Experience addresses the question of a lyric language that would not be the expression of subjectivity. In his analysis of the historical position of Paul Celan's poetry, Lacoue-Labarthe defines the subject as the principle that founds, organizes, and secures both cognition and action—a principle that turned, most violently during the twentieth century, into a figure not only of domination but of the extermination of everything other than itself. This thoroughly universal, abstract, and finally suicidal subject eradicates all (...)
  50. Government Policy Experiments and Informed Consent.Douglas MacKay & Averi Chakrabarti - 2019 - Public Health Ethics 12 (2):188-201.
    Governments are increasingly making use of field experiments to evaluate policy interventions in the spheres of education, public health and welfare. However, the research ethics literature is largely focused on the clinical context, leaving investigators, institutional review boards and government agencies with few resources to draw on to address the ethical questions they face regarding such experiments. In this article, we aim to help address this problem, investigating the conditions under which informed consent is required for ethical policy research conducted (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 993