Results for 'leakage'

57 found
Order:
  1.  23
    Information leakage from logically equivalent frames.Shlomi Sher & Craig R. M. McKenzie - 2006 - Cognition 101 (3):467-494.
  2. Carbon Leakage and the Argument from No Difference.Matthew Rendall - 2015 - Environmental Values 24 (4):535-52.
    Critics of carbon mitigation often appeal to what Jonathan Glover has called ‘the argument from no difference’: that is, ‘If I don’t do it, someone else will’. Yet even if this justifies continued high emissions by the industrialised countries, it cannot excuse business as usual. The North’s emissions might not harm the victims of climate change in the sense of making them worse off than they would otherwise be. Nevertheless, it receives benefits produced at the latter’s expense, with the result (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  18
    Urgency, leakage, and the relative nature of information processing in decision-making.Jennifer S. Trueblood, Andrew Heathcote, Nathan J. Evans & William R. Holmes - 2021 - Psychological Review 128 (1):160-186.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  20
    Flux Leakage Tests for the Marinov Motor.David Dameron - 2000 - Apeiron 7 (3-4):155.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  48
    The Politics of Carbon Leakage and the Fairness of Border Measures.Robyn Eckersley - 2010 - Ethics and International Affairs 24 (4):367-393.
    It is possible to design fair border measures that address carbon leakage, are consistent with the leadership responsibilities of developed countries, do not penalize developing countries, and ensure that consumers take some responsibility for the emissions outsourced to developing countries.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  55
    Leakage from a Catholic Parish. [REVIEW]John F. Dwyer - 1943 - Thought: Fordham University Quarterly 18 (1):189-190.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  23
    Socio‐cultural analysis of personal information leakage in Japan.Yohko Orito & Kiyoshi Murata - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):161-171.
    PurposeThe purpose of this paper is to analyse incidents of personal information leakage in Japan based on Japanese socio‐cultural characteristics of information privacy and to consider how best to develop an effective personal information protection policy that conforms to Japanese situations as well as to the global requirement of personal information protection.Design/methodology/approachAfter describing recent incidents of personal information leakage in Japan, the paper examines the defects of the Act on Protection of Personal Information that permit these incidents to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  33
    Unilateral Carbon Taxes, Border Tax Adjustments and Carbon Leakage.David Weisbach, Todd Munson, Gita Khun Jush, Sam Kortum, Ian Foster & Joshua Elliott - 2013 - Theoretical Inquiries in Law 14 (1):207-244.
    We examine the impact of a unilateral carbon tax in developed countries, focusing on the expected size of carbon leakage and the effects on leakage of border tax adjustments. We start by analyzing the problem using a simple two-country, three-good general equilibrium model to develop intuitions. We then simulate the expected size of the effects using a new, open-source, computable general equilibrium model. We analyze the extent of emissions reductions from a carbon tax in countries that made commitments (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  21
    A theory of utility conditionals: Paralogical reasoning from decision-theoretic leakage.Jean-François Bonnefon - 2009 - Psychological Review 116 (4):888-907.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  10.  13
    ‘Science without Scientists’: DIYbiology and institutional leakage.Massimiliano Simons & Winnie Poncelet - unknown
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  30
    Existence and Global Exponential Stability of Pseudo Almost Periodic Solutions for Neutral Type Quaternion-Valued Neural Networks with Delays in the Leakage Term on Time Scales.Yongkun Li & Xiaofang Meng - 2017 - Complexity:1-15.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  17
    A delay decomposition approach for robust dissipativity and passivity analysis of neutral-type neural networks with leakage time-varying delay.Gnaneswaran Nagamani, Thirunavukkarasu Radhika & Pagavathi Balasubramaniam - 2016 - Complexity 21 (5):248-264.
  13.  32
    Modeling and correcting for linear spatial leakage effects in MEG seed-based functional connectivity mapping.Wens Vincent, Marty Brice, Mary Alison, Bourguignon Mathieu, Op De Beeck Marc, Goldman Serge, Van Bogaert Patrick, Peigneux Philippe & De Tiège Xavier - 2014 - Frontiers in Human Neuroscience 8.
  14.  8
    Russell's American Lecture Courses.Kenneth Blackwell - 1986 - Russell: The Journal of Bertrand Russell Studies 6:263-278.
    Leakage of employment income is a pressing issue in the economic development of regional and remote communities. It can draw income away from regional economies but also inject new revenue from outside. Using Australian Bureau of Statistics 2011 census employment data by place of usual residence and place of work, we identify for all 17 Local Government Areas (LGAs) of the Northern Territory (NT), workers commuting out of and into each LGA. Using summary graphs and geospatial visualizations we find (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  16
    Editor's Notes.Kenneth Blackwell - 1986 - Russell: The Journal of Bertrand Russell Studies 6:263-278.
    Leakage of employment income is a pressing issue in the economic development of regional and remote communities. It can draw income away from regional economies but also inject new revenue from outside. Using Australian Bureau of Statistics 2011 census employment data by place of usual residence and place of work, we identify for all 17 Local Government Areas (LGAs) of the Northern Territory (NT), workers commuting out of and into each LGA. Using summary graphs and geospatial visualizations we find (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  16.  17
    An Essay on the Foundations of Geometry.Kenneth Blackwell - 1986 - Russell: The Journal of Bertrand Russell Studies 6:263-278.
    Leakage of employment income is a pressing issue in the economic development of regional and remote communities. It can draw income away from regional economies but also inject new revenue from outside. Using Australian Bureau of Statistics 2011 census employment data by place of usual residence and place of work, we identify for all 17 Local Government Areas (LGAs) of the Northern Territory (NT), workers commuting out of and into each LGA. Using summary graphs and geospatial visualizations we find (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  17.  23
    Evacuation Traffic Management under Diffusion of Toxic Gas Based on an Improved Road Risk Level Assessment Method.Zheng Liu, Xingang Li & Xiaojing Chen - 2019 - Complexity 2019:1-11.
    Toxic gas leakage has diffusion characteristics and thus dynamically affects surrounding zones. Most of current evacuation traffic management models set the road risk level as a static value, which is related to the distance to the hazard source, or a dynamic value, which is determined by the toxic gas concentration. However, the toxic gas propagation direction is not considered, and this may lead some evacuees driving from less dangerous regions to higher dangerous regions. To address the shortcomings of traditional (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  86
    Mediated Interaction in the Digital Age.John B. Thompson - 2020 - Theory, Culture and Society 37 (1):3-28.
    In The Media and Modernity, Thompson develops an interactional theory of communication media that distinguishes between three basic types of interaction: face-to-face interaction, mediated interaction, and mediated quasi-interaction. In the light of the digital revolution and the growth of the internet, this paper introduces a fourth type: mediated online interaction. Drawing on Goffman’s distinction between front regions and back regions, Thompson shows how mediated quasi-interaction and mediated online interaction create new opportunities for the leakage of information and symbolic content (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  19.  37
    Apparent amnesia on experimental memory tests in dissociative identity disorder: An exploratory study.Madelon L. Peters, Seger A. Uyterlinde, John Consemulder & Onno van der Hart - 1998 - Consciousness and Cognition 7 (1):27-41.
    Dissociative identity disorder (DID; called multiple personality disorder in DSMIII-R) is a psychiatric condition in which two or more identity states recurrently take control of the person's behavior. A characteristic feature of DID is the occurrence of apparently severe amnestic symptoms. This paper is concerned with experimental research of memory function in DID and focuses on between-identity transfer of newly learned neutral material. Previous studies on this subject are reviewed and a pilot study with four subjects is described. This study (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  51
    Introduction: Scientific History.Susanne Hoeber Rudolph & Robert B. Pippin - unknown
    In his inaugural lecture at Cambridge as Regius Professor of Modern History in 1895, Lord Acton urged that the historian deliver moral judgments on the figures of his research. Acton declaimed: I exhort you never to debase the moral currency or to lower the standard of rectitude, but to try others by the final maxim that governs your own lives and to suffer no man and no cause to escape the undying penalty which history has the power to inflict on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  21.  17
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  33
    National greenhouse-gas accounting for effective climate policy on international trade.Astrid Kander, Magnus Jiborn, Daniel Moran & Thomas Wiedmann - 2015 - Nature Climate Change 5 (5):431-435.
    National greenhouse-gas accounting should reflect how countries’ policies and behaviours affect global emissions. Actions that contribute to reduced global emissions should be credited, and actions that increase them should be penalized. This is essential if accounting is to serve as accurate guidance for climate policy. Yet this principle is not satisfied by the two most common accounting methods. Production-based accounting used under the Kyoto Protocol does not account for carbon leakage — the phenomenon of countries reducing their domestic emissions (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  41
    Emergency Evacuation of Hazardous Chemical Accidents Based on Diffusion Simulation.Jiang-Hua Zhang, Hai-Yue Liu, Rui Zhu & Yang Liu - 2017 - Complexity:1-16.
    The recent rapid development of information technology, such as sensing technology, communications technology, and database, allows us to use simulation experiments for analyzing serious accidents caused by hazardous chemicals. Due to the toxicity and diffusion of hazardous chemicals, these accidents often lead to not only severe consequences and economic losses, but also traffic jams at the same time. Emergency evacuation after hazardous chemical accidents is an effective means to reduce the loss of life and property and to smoothly resume the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  16
    A comparison of mental arithmetic performance in time and frequency domains.Anmar Abdul-Rahman - 2022 - Frontiers in Psychology 13.
    The Heisenberg-Gabor uncertainty principle defines the limits of information resolution in both time and frequency domains. The limit of resolution discloses unique properties of a time series by frequency decomposition. However, classical methods such as Fourier analysis are limited by spectral leakage, particularly in longitudinal data with shifting periodicity or unequal intervals. Wavelet transformation provides a workable compromise by decomposing the signal in both time and frequency through translation and scaling of a basis function followed by correlation or convolution (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  37
    Market Fairness: The Poor Country Cousin of Market Efficiency.Michael J. Aitken, Angelo Aspris, Sean Foley & Frederick H. de B. Harris - 2018 - Journal of Business Ethics 147 (1):5-23.
    Both fairness and efficiency are important considerations in market design and regulation, yet many regulators have neither defined nor measured these concepts. We develop an evidencebased policy framework in which these are both defined and measured using a series of empirical proxies. We then build a systems estimation model to examine the 2003–2011 explosive growth in algorithmic trading on the London Stock Exchange and NYSE Euronext Paris. Our results show that greater AT is associated with increased transactional efficiency and reduced (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  7
    Application Research of Key Frames Extraction Technology Combined with Optimized Faster R-CNN Algorithm in Traffic Video Analysis.Zhi-Guang Jiang & Xiao-Tian Shi - 2021 - Complexity 2021:1-11.
    The intelligent transportation system under the big data environment is the development direction of the future transportation system. It effectively integrates advanced information technology, data communication transmission technology, electronic sensing technology, control technology, and computer technology and applies them to the entire ground transportation management system to establish a real-time, accurate, and efficient comprehensive transportation management system that works on a large scale and in all directions. Intelligent video analysis is an important part of smart transportation. In order to improve (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  10
    On the Theory and Application of Third Person Analysis in the Practice of Psychotherapy.Lauren Lawrence - 1990 - Journal of Mind and Behavior 11 (1):97-104.
    This paper critques a new mathod which I have termed third person analysis and gives perspective on its range and application in clinical practice. Third person analysis turns the analysand into a narrator who will speak of herself in the third person. It is believed that the basic analytic principle inherent in narration can be employed in the form of third person analysis with a wide variety of patients. This new form of psychotherapy provides the analysand with the necessary tool (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  22
    St. Albans Family Enterprises.José L. Ruiz-Alba, Ignacio Ferrero & Massimiliano Matteo Pellegrini - 2017 - Journal of Business Ethics Education 14:307-313.
    This case study can serve as an instrument to help students and practitioners develop their ethical decision-making ability, in particular practical wisdom within a virtue ethics framework. St. Albans Family Enterprises is a group of companies with three business lines: petrol stations, flower exportation and women´s fashion retail establishments, with around 300 employees and 20 stores in London, Liverpool, Manchester, Edinburgh and Bristol. Apparently, an alleged leakage of sensitive information took place at the Head Office, involving several employees who (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  30
    ESP in the ganzfeld: Analysis of a debate.John Palmer - 2003 - Journal of Consciousness Studies 10 (6-7):6-7.
    This paper reviews the debate over the evidence for ESP provided by experiments using the ganzfeld technique, a simple method used to induce a mild altered state of consciousness. The quantitative literature review technique called meta-analysis has played a prominent role in this controversy. The first question addressed by the reviewer is whether the data establish that ESP in the ganzfeld is replicable. Issues discussed include the effect of multiple analyses, the 'file-drawer' problem and statistical errors. The second question asks, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  24
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 sites mentioned (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  17
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and evolutionary learning. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  52
    A Pinning Actor-Critic Structure-Based Algorithm for Sizing Complex-Shaped Depth Profiles in MFL Inspection with High Degree of Freedom.Zhenning Wu, Yiming Deng & Lixing Wang - 2021 - Complexity 2021:1-12.
    One of the most efficient nondestructive methods for pipeline in-line inspection is magnetic flux leakage inspection. Estimating the size of the defect from MFL signal is one of the key problems of MFL inspection. As the inspection signal is usually contaminated by noise, sizing the defect is an ill-posed inverse problem, especially when sizing the depth as a complex shape. An actor-critic structure-based algorithm is proposed in this paper for sizing complex depth profiles. By learning with more information from (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  1
    Exploring the Limits of Autonomy.G. Blackall - 2012 - Hastings Center Report 42 (3):16-18.
    Mr. Galanas, an eighty‐six‐year‐old man, intentionally shot himself in the chest and abdomen. Surprisingly, the bullet damaged only his distal pancreas and part of his colon, requiring a diverting colostomy to prevent leakage of bowel fluids into his abdomen. After being admitted, he lies intubated in the intensive care unit awaiting surgery to repair his colon. He is responsive but does not demonstrate clear decision‐making capacity. He grudgingly accepts pain medications but refuses antibiotics and antidepressants. He has a living (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  6
    Exploring the Limits of Autonomy.M. J. Green - 2012 - Hastings Center Report 42 (3):16-18.
    Mr. Galanas, an eighty‐six‐year‐old man, intentionally shot himself in the chest and abdomen. Surprisingly, the bullet damaged only his distal pancreas and part of his colon, requiring a diverting colostomy to prevent leakage of bowel fluids into his abdomen. After being admitted, he lies intubated in the intensive care unit awaiting surgery to repair his colon. He is responsive but does not demonstrate clear decision‐making capacity. He grudgingly accepts pain medications but refuses antibiotics and antidepressants. He has a living (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  21
    Visuo-Motor Affective Interplay: Bonding Scenes Promote Implicit Motor Pre-dispositions Associated With Social Grooming–A Pilot Study.Olga Grichtchouk, Jose M. Oliveira, Rafaela R. Campagnoli, Camila Franklin, Monica F. Correa, Mirtes G. Pereira, Claudia D. Vargas, Isabel A. David, Gabriela G. L. Souza, Sonia Gleiser, Andreas Keil, Vanessa Rocha-Rego & Eliane Volchan - 2022 - Frontiers in Psychology 13.
    Proximity and interpersonal contact are prominent components of social connection. Giving affective touch to others is fundamental for human bonding. This brief report presents preliminary results from a pilot study. It explores if exposure to bonding scenes impacts the activity of specific muscles related to physical interaction. Fingers flexion is a very important component when performing most actions of affectionate contact. We explored the visuo-motor affective interplay by priming participants with bonding scenes and assessing the electromyographic activity of the fingers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  5
    El impasse de la resistencia. La intersección entre Foucault y Deleuze a propósito de la salida del poder.Cristóbal Durán Rojas & Iván Torres Apablaza - 2020 - Hybris, Revista de Filosofí­A 11 (2):107-128.
    This paper tries to propose a reading focused mainly on some of Foucault’s late works, developed since the first volume of his Histoire de la sexualité, from 1976. The aim of our reading tends to note that the distance between Foucault and Deleuze, even marked in an explicit rupture after the publication of that book, is not so much due to Foucault's “fascination” with power, or to his peremptory challenge of desire and its leakage power, or its supposed abandonment (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  8
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  7
    Application Research of Intelligent Classification Technology in Enterprise Data Classification and Gradation System.Lina Yu, Chunwei Wang, Huixian Chang, Sheng Shen, Fang Hou & Yingwei Li - 2020 - Complexity 2020:1-9.
    Classification and gradation system adopts different security protection schemes for different types of data by implementing classification and gradation management of data, which is an important pretechnical means for data security protection and prevention of data leakage. This paper introduces artificial intelligence classification, machine learning, and other means to learn and train enterprise documents according to the characteristics of enterprise sensitive data. The generated training model can intelligently identify and classify file streams, improving work efficiency and accuracy of classification (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  5
    Users’ Payment Intention considering Privacy Protection in Cloud Storage: An Evolutionary Game-Theoretic Approach.Jianguo Zheng & Jinming Chen - 2021 - Complexity 2021:1-15.
    To solve the current privacy leakage problems of cloud storage services, research on users’ payment intention for cloud storage services with privacy protection is extremely important for improving the sustainable development of cloud storage services. An evolutionary game model between cloud storage users and providers that considers privacy is constructed. Then, the model’s evolutionary stability strategies via solving the replication dynamic equations are analyzed. Finally, simulation experiments are carried out for verifying and demonstrating the influence of model parameters. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  35
    Information and friend segregation for online social networks: a user study.Javed Ahmed, Serena Villata & Guido Governatori - 2019 - AI and Society 34 (4):753-766.
    Online social networks captured the attention of the masses by offering attractive means of sharing personal information and developing social relationships. People expose personal information about their lives on OSNs. This may result in undesirable consequences of users’ personal information leakage to an unwanted audience and raises privacy concerns. The issue of privacy has received a significant attention in both the research literature and the mainstream media. In this paper, we present results of an empirical study that measure users’ (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  27
    Market Fairness: The Poor Country Cousin of Market Efficiency.Frederick H. de B. Harris, Sean Foley, Angelo Aspris & Michael J. Aitken - 2018 - Journal of Business Ethics 147 (1):5-23.
    Both fairness and efficiency are important considerations in market design and regulation, yet many regulators have neither defined nor measured these concepts. We develop an evidencebased policy framework in which these are both defined and measured using a series of empirical proxies. We then build a systems estimation model to examine the 2003–2011 explosive growth in algorithmic trading on the London Stock Exchange and NYSE Euronext Paris. Our results show that greater AT is associated with increased transactional efficiency and reduced (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  19
    DNA dataveillance: protecting the innocent?Anna Vartapetiance Salmasi & Lee Gillam - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):270-288.
    PurposeThe purpose of this paper is to discuss the UK National DNA Database and some of the controversies surrounding it with reference to legal and ethical issues, focusing particularly on privacy and human rights. Governance of this database involves specific exemptions from the Data Protection Act, and this gives a rise to concerns regarding both the extent of surveillance on the UK population and the possibility for harm to all citizens. This is of wider importance since every current citizen, and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  44.  15
    Twenty-First Century "Eugenics"?: The Enduring Legacy.Shelley L. Smith - 2016 - Perspectives in Biology and Medicine 59 (2):156-171.
    In her 2001 book Building a Better Race, Wendy Kline argues that the end of World War II did not spell the demise of eugenics; instead, proponents of eugenics were flexible enough to adapt, increasingly emphasizing “positive eugenics” and social responsibility. When the earlier attempt at quarantine failed, with a leakage of “immorality” to white, middle-class women, eugenicists moved on to another public health–focused metaphor, that of preventive medicine. Emphasizing nurture as well as nature preserved the end goal of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  17
    In the Shadow of Biological Warfare: Conspiracy Theories on the Origins of COVID-19 and Enhancing Global Governance of Biosafety as a Matter of Urgency.Jing-Bao Nie - 2020 - Journal of Bioethical Inquiry 17 (4):567-574.
    Two theories on the origins of COVID-19 have been widely circulating in China and the West respectively, one blaming the United States and the other a highest-level biocontainment laboratory in Wuhan, the initial epicentre of the pandemic. Both theories make claims of biological warfare attempts. According to the available scientific evidence, these claims are groundless. However, like the episodes of biological warfare during the mid-twentieth century, the spread of these present-day conspiracy theories reflects a series of longstanding and damaging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  16
    Exploring the Limits of Autonomy.Rebecca L. Volpe, Benjamin H. Levi, George F. Blackall & Michael J. Green - 2012 - Hastings Center Report 42 (3):16-18.
    Mr. Galanas, an eighty‐six‐year‐old man, intentionally shot himself in the chest and abdomen. Surprisingly, the bullet damaged only his distal pancreas and part of his colon, requiring a diverting colostomy to prevent leakage of bowel fluids into his abdomen. After being admitted, he lies intubated in the intensive care unit awaiting surgery to repair his colon. He is responsive but does not demonstrate clear decision‐making capacity. He grudgingly accepts pain medications but refuses antibiotics and antidepressants. He has a living (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  7
    3D Visualization Monitoring and Early Warning of Surface Deformation in Subsidence Area Based on GIS.Lei Gao, Yuanwen Song & Bo Zhao - 2021 - Complexity 2021:1-16.
    Due to the large-scale mining of mineral resources, the surface strata in many areas have collapsed and even developed into deformation and subsidence. Based on the conventional geotechnical deformation monitoring technology, the surface deformation prediction and disaster caused by the conventional geotechnical deformation monitoring technology can be avoided. In this paper, based on GIS, combined with the analysis of surface settlement, the surface settlement, slope value, curvature deformation value, horizontal displacement, and corresponding horizontal deformation formula are comprehensively analyzed and studied. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  55
    Abundant nature's long-term openness to humane biocultural designs.Robert B. Glassman - 2009 - Zygon 44 (2):355-388.
    Not by Genes Alone excellently explains Peter J. Richerson and Robert Boyd's important ideas about human gene-culture co-evolution to a broader audience but remains short of a larger vision of civilization. Several decades ago Ralph Burhoe had seen that fertile possibility in Richerson and Boyd's work. I suggest getting past present reductionistic customs to a scientific perspective having an integral place for virtue. Subsystem agency is part of this view, as is the driving role of abundance, whose ultimate origins are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  6
    Amyloid fibrils act as a reservoir of soluble oligomers, the main culprits in protein deposition diseases.Alessandra Bigi, Roberta Cascella, Fabrizio Chiti & Cristina Cecchi - 2022 - Bioessays 44 (11):2200086.
    Amyloid fibril formation plays a central role in the pathogenesis of a number of neurodegenerative diseases, including Alzheimer and Parkinson diseases. Transient prefibrillar oligomers forming during the aggregation process, exhibiting a small size and a large hydrophobic surface, can aberrantly interact with a number of molecular targets on neurons, including the lipid bilayer of plasma membranes, resulting in a fatal outcome for the cells. By contrast, the mature fibrils, despite presenting generally a high hydrophobic surface, are endowed with a low (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  13
    Operational Safety Risk Assessment for the Water Channels of the South-to-North Water Diversion Project Based on TODIM-FMEA.Huimin Li, Li Ji, Feng Li, Hairui Li, Qingguo Sun, Zhihong Li, Hongmei Yan, Wei Guan, Lunyan Wang & Ying Ma - 2020 - Complexity 2020:1-15.
    The South-to-North Water Diversion Project consists of long-distance water delivery channels and a complicated geological environment along the way. To deal with the operation safety of the water conveyance channels in the middle route of the South-to-North Water Diversion Project, this study analyzes six failure modes: structural cracks, poor water delivery during ice periods, instability of canal slopes, material aging, abnormal leakage, and foundation defects. Based on FMEA, a multigranularity language evaluation method that can be converted into interval intuitionistic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 57