Results for 'Security'

990 found
Order:
  1. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  2. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  3. Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3):264-276.
    The U.S. military is developing augmented reality (AR) capabilities for use on the battlefield as a means of achieving greater situational awareness. The superimposition of digital data—designed to expand surveillance, enhance geospatial understanding, and facilitate target identification—onto a live view of the battlefield has important implications for virtuous conduct in war: Can the soldier exercise practical wisdom while integrated into a system of militarized legibility? Adopting a virtue ethics perspective, I argue that AR disrupts the soldier’s immersion in the scene (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. The ethics of care: a feminist approach to human security.Fiona Robinson - 2011 - Philadelphia: Temple University Press.
    Introduction -- The ethics of care and global politics -- Rethinking human security -- 'Women's work' : the global care and sex economies -- Humanitarian intervention and global security governance -- Peacebuilding and paternalism : reading care through postcolonialism -- Health and human security : gender, care and HIV/AIDS -- Gender, care, and the ethics of environmental security -- Conclusion. Security through care.
    Direct download  
     
    Export citation  
     
    Bookmark   25 citations  
  5. Who is targeted by the council's sanctions? The UN Security Council and the principle of proportionality.Daniëlla Dam-de Jong - 2021 - In Ulf Linderfalk & Eduardo Gill-Pedro (eds.), Revisiting proportionality in international and European law: interests and interest- holders. Leiden, The Netherlands: Koninklijke Brill NV.
     
    Export citation  
     
    Bookmark  
  6. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  7.  35
    ‘Rescaling’ alternative food systems: from food security to food sovereignty.Navé Wald & Douglas P. Hill - 2016 - Agriculture and Human Values 33 (1):203-213.
    In this paper, we critically interrogate the benefits of an interdisciplinary and theoretically diverse dialogue between ‘local food’ and ‘alternative food networks’ and outline how this dialogue might be enriched by a closer engagement with discourses of food sovereignty and the politics of scale. In arguing for a shift towards a greater emphasis on food sovereignty, we contend that contemporary discourses of food security are inadequate for the ongoing task of ensuring a just and sustainable economy of food. Further, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  8. Matters of Trust as Matters of Attachment Security.Andrew Kirton - 2020 - International Journal of Philosophical Studies 28 (5):583-602.
    I argue for an account of the vulnerability of trust, as a product of our need for secure social attachments to individuals and to a group. This account seeks to explain why it is true that, when we trust or distrust someone, we are susceptible to being betrayed by them, rather than merely disappointed or frustrated in our goals. What we are concerned about in matters of trust is, at the basic level, whether we matter, in a non-instrumental way, to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  9. (1 other version)Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11 (1):56-76.
    Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable assumptions. In light of persisting reasonable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10.  93
    The Moral and Political Philosophy of Immigration: Liberty, Security, and Equality.José Jorge Mendoza - 2016 - Lexington Books.
    José Jorge Mendoza argues that the difficulty with resolving the issue of immigration is primarily a conflict over competing moral and political principles and is, at its core, a problem of philosophy. This book brings into dialogue various contemporary philosophical texts that deal with immigration to provide some normative guidance to immigration policy and reform.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  11. Reasons for action: making a difference to the security of outcomes.Mattias Gunnemyr & Caroline Torpe Touborg - 2022 - Philosophical Studies 180 (1):333-362.
    In this paper, we present a new account of teleological reasons, i.e. reasons to perform a particular action because of the outcomes it promotes. Our account gives the desired verdict in a number of difficult cases, including cases of overdetermination and non-threshold cases like Parfit’s famous _Drops of water._ The key to our account is to look more closely at the metaphysics of causation. According to Touborg (_The dual nature of causation_, 2018), it is a necessary condition for causation that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  53
    Biometric Technology and Ethics: Beyond Security Applications.Andrea North-Samardzic - 2020 - Journal of Business Ethics 167 (3):433-450.
    Biometric technology was once the purview of security, with face recognition and fingerprint scans used for identification and law enforcement. This is no longer the case; biometrics is increasingly used for commercial and civil applications. Due to the widespread diffusion of biometrics, it is important to address the ethical issues inherent to the development and deployment of the technology. This article explores the burgeoning research on biometrics for non-security purposes and the ethical implications for organizations. This will be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  13.  56
    Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14.  22
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  13
    Business Entities and the State Who Should Provide Security from Crime?Don E. Scheid - 1997 - Public Affairs Quarterly 11 (2):163-182.
  16.  36
    Rethinking the Alternatives: Food Sovereignty as a Prerequisite for Sustainable Food Security.Ronald Byaruhanga & Ellinor Isgren - 2023 - Food Ethics 8 (2):1-20.
    The concept of food sovereignty is primarily taken as an alternative to the prevailing neoliberal food security model. However, the approach has hitherto not received adequate attention from policy makers. This could be because the discourse is marked by controversies and contradictions, particularly regarding its ability to address the challenges of feeding a rapidly growing global population. In response to these criticisms, this paper argues that the principles of food sovereignty, such as democratic and transparent food systems, agroecology, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  33
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  37
    U.S. Responses To Japanese Wartime Inhuman Experimentation After World War Ii: National Security and Wartime Exigency.Howard Brody, Sarah E. Leonard, Jing-bao Nie & Paul Weindling - 2014 - Cambridge Quarterly of Healthcare Ethics 23 (2):220-230.
    In 1945–46, representatives of the U.S. government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the United States, influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the United States played an equally key role in concealing information about (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  19.  2
    Unpacking “the surprise chain”: the governance of food security during the COVID-19 pandemic in Melbourne, Australia.Rachel Carey & Maureen Murphy - forthcoming - Agriculture and Human Values:1-14.
    Food systems are being affected by multiple shocks related to climate change, the COVID-19 pandemic and geopolitical events. Food prices and food insecurity are rising globally as a result, raising questions about the effective governance of food security during shocks. This paper critically examines the governance of food security in Melbourne, Australia during a major food system shock, the COVID-19 pandemic. It draws on document analysis and 34 stakeholder interviews with 41 participants from government, industry and civil society (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  45
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  60
    Precommitment Regimes for Intervention: Supplementing the Security Council.Allen Buchanan & Robert O. Keohane - 2011 - Ethics and International Affairs 25 (1):41-63.
    As global governance institutions proliferate and become more powerful, their legitimacy is subject to ever sharper scrutiny. Yet what legitimacy means in this context and how it is to be ascertained are often unclear. In a previous paper in this journal, we offered a general account of the legitimacy of such institutions and a set of standards for determining when they are legitimate. In this paper we focus on the legitimacy of the UN Security Council as an institution for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  5
    Digital technology and on-farm responses to climate shocks: exploring the relations between producer agency and the security of food production.Carol Richards, Rudolf Messner & Vaughan Higgins - forthcoming - Agriculture and Human Values:1-15.
    Recent research into climate shocks and what this means for the on-farm production of food revealed mixed and unanticipated results. Whilst the research was triggered by a series of catastrophic, climate related disruptions, Australian beef producers interviewed for the study downplayed the immediate and direct impacts of climate shocks. When considering the changing nature of production under shifting climatic conditions, producers offered a commentary on the digital technology and data which interconnected with climate solutions deriving from both on and off (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  21
    Farm-level pathways to food security: beyond missing markets and irrational peasants.Sidney Madsen - 2021 - Agriculture and Human Values 39 (1):135-150.
    Development projects in Sub-Saharan Africa propose to alleviate hunger in rural areas by introducing new agricultural practices and technologies, yet there is limited empirical evidence of how an agricultural intervention can lead farming households to transition to food security. Research on food security pathways considers agricultural interventions that increase farmers’ income to be particularly effective for reducing food insecurity. Consistent with this stance, Malawian agricultural policy aims to address hunger by encouraging smallholder farmers to intensify and commercialize maize (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  65
    Evolutionary Debunking Arguments, Explanationism and Counterexamples to Modal Security.Christopher Noonan - forthcoming - Erkenntnis.
    According to one influential response to evolutionary debunking arguments against moral realism, debunking arguments fail to undermine our moral beliefs because they fail to imply that those beliefs are insensitive or unsafe. The position that information about the explanatory history of our belief must imply that our beliefs are insensitive or unsafe in order to undermine those beliefs has been dubbed “Modal Security”, and I therefore label this style of response to debunking arguments the “modal security response”. An (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  29
    Tracking and Targeting: Sociotechnologies of (In)security.Jutta Weber, Karolina Follis & Lucy Suchman - 2017 - Science, Technology, and Human Values 42 (6):983-1002.
    This introduction to the special issue of the same title sets out the context for a critical examination of contemporary developments in sociotechnical systems deployed in the name of security. Our focus is on technologies of tracking, with their claims to enable the identification of those who comprise legitimate targets for the use of violent force. Taking these claims as deeply problematic, we join a growing body of scholarship on the technopolitical logics that underpin an increasingly violent landscape of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  26.  52
    Are maternal reflective functioning and attachment security associated with preadolescent mentalization?Anna Maria Rosso, Paola Viterbori & Alda M. Scopesi - 2015 - Frontiers in Psychology 6:149441.
    This study investigated the impact of maternal reflective functioning (RF) and attachment security on children’s mentalization. The Adult Attachment Interview (AAI) was administered to mothers in a sample of 41 mother–preadolescent dyads. AAI transcripts were rated in terms of the Berkeley AAI System ( Main and Goldwyn, 1998 ) and the Reflective Functioning Scale (RFS; Fonagy et al., 1998 ). Preadolescent mentalization was assessed using a semi-structured interview adapted from O’Connor and Hirsch (1999) and also by analyzing mental-state talk (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27. A survey on the economical-social effective factors of peace of mind and social security on female postgraduate students majoring in demography in tehran city.Ebadati Nazarlou Somayeh Kamran Feridoun - 2010 - Social Research (Islamic Azad University Roudehen Branch) 3 (6):43-56.
  28. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 4252--709.
  29.  23
    The abandonment of Australians in India: an analysis of the right of entry as a security right in the age of COVID-19.Diego S. Silva - 2022 - Monash Bioethics Review 40 (1):94-109.
    In May 2021, when the Delta variant of SARS-CoV2 was wreaking havoc in India, the Australian Federal Government banned its citizens and residents who were there from coming back to Australia for 14 days on penalty of fines or imprisonment. These measures were justified on the grounds of protecting the broader Australian public from potentially importing the Delta strain, which officials feared would then seed a local outbreak. Those Australians stranded in India, and their families and communities back home, claimed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  88
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  31. The role of global studies in the development of a sustainable security system.Ilya V. Ilyin & Kristina S. Leonova - 2022 - In Alexander N. Chumakov, Alyssa DeBlasio & Ilya V. Ilyin (eds.), Philosophical Aspects of Globalization: A Multidisciplinary Inquiry. Boston: BRILL.
     
    Export citation  
     
    Bookmark  
  32.  10
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental data (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  30
    Rethinking the Just Intelligence Theory of National Security Intelligence Collection and Analysis: The Principles of Discrimination, Necessity, Proportionality and Reciprocity.Seumas Miller - 2021 - Social Epistemology 35 (3):211-231.
    In this article, it is argued that the constitutive principles of Just War Theory and the jus ad bellum/jus in bello duality do not transfer all that well to national security intelligence activity...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. The False Promise of Collective Security Through Preventive War.Neta C. Crawford - 2007 - In Henry Shue & David Rodin (eds.), Preemption: Military Action and Moral Justification. Oxford University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  35. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  57
    Bourdieu, International Relations, and European security.Trine Villumsen Berling - 2012 - Theory and Society 41 (5):451-478.
    This article takes the failure to grasp fully the paradigmatic case of European security after the Cold War as an example of how International Relations (IR) would benefit from reformulating not only its empirical research questions but also several of its central conceptual building blocks with the aid of Bourdieusian sociology. The separation between theory and practice and the overemphasis on military power and state actors blind IR from seeing the power struggles that reshaped European security. Instead, a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  37
    Competing Concerns: Balancing Human Rights and National Security in US Economic Aid Allocation.Evan W. Sandlin - 2016 - Human Rights Review 17 (4):439-462.
    This paper theorizes that the effect of human rights violations on US economic aid is conditioned by the salience of US national security concerns. National security concerns will be more salient in situations where recipients contribute to maintaining US security and in temporal eras when the USA is perceived as being under increased external threat. As the relational and temporal salience of national security increases, any negative effect of human rights violations on US economic aid should (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  14
    Morals, Materials, and Technoscience: The Energy Security Imaginary in the United States.Jessica M. Smith & Abraham S. D. Tidwell - 2015 - Science, Technology, and Human Values 40 (5):687-711.
    This article advances recent scholarship on energy security by arguing that the concept is best understood as a sociotechnical imaginary, a collective vision for a “good society” realized through technoscientific-oriented policies. Focusing on the 1952 Resources for Freedom report, the authors trace the genealogy of energy security, elucidating how it establishes a morality of efficiency that orients policy action under the guise of security toward the liberalizing of markets in resource states and a robust program of energy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  17
    The Human and the Social: a Comparison of the Discourses of Human Development, Human Security and Social Quality. Des Gasper - 2011 - International Journal of Social Quality 1 (1):91-108.
    This paper presents a structured comparison of the social quality approach with the UNDP-led 'human development' approach and its sister work on 'human security'. Through clarification of their respective foci, roles and underlying theoretical and value assumptions, the paper suggests that partnership of the social quality approach with these 'human' approaches appears possible and relevant for each side.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40. War pictures: digital surveillance from foreign theater to homeland security front.Garrett Stewart - 2014 - In David LaRocca (ed.), The philosophy of war films. Lexington: University Press of Kentucky.
     
    Export citation  
     
    Bookmark  
  41. Part VII. Towards renewed political life and citizenship: 19. electronic voting and computer security.Stephan Brunessaux - 2010 - In Bernard Reber & Claire Brossaud (eds.), Digital cognitive technologies: epistemology and the knowledge economy. Hoboken, NJ: Wiley.
     
    Export citation  
     
    Bookmark  
  42.  22
    Ethics and the Future of Spying: Technology, National Security and Intelligence Collection.Jai Galliott & Warren Reed (eds.) - 2016 - Routledge.
    This volume examines the ethical issues generated by recent developments in intelligence collection and offers a comprehensive analysis of the key legal, moral and social questions thereby raised. Intelligence officers, whether gatherers, analysts or some combination thereof, are operating in a sea of social, political, scientific and technological change. This book examines the new challenges faced by the intelligence community as a result of these changes. It looks not only at how governments employ spies as a tool of state and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  19
    War on the Couch: The Emotionology of the New International Security Paradigm.Vanessa Pupavac - 2004 - European Journal of Social Theory 7 (2):149-170.
    The emotional state of war-affected populations has become a central concern for international policy-makers in the last decade. Growing interest in war trauma is influenced by contemporary Anglo-American emotionology, or emotional norms, which tends to pathologize ordinary responses to distress, including anger related to survival strategies. The article critically analyses the ascendancy of a therapeutic security paradigm in international politics, which seeks to explain the prevailing political, economic and social conditions in terms of cycles of emotional dysfunctionalism. The article (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. The legitimacy of the military, private military and security companies, and just war theory.James Pattison - 2012 - European Journal of Political Theory 11 (2):131-154.
    The legitimacy of the military is frequently overlooked in standard accounts of jus ad bellum. Accordingly, this paper considers how the military should be organized. It proposes a normative conception of legitimacy – the ‘Moderate Instrumentalist Approach’ – that outlines the qualities that a military should possess. It then assesses the three leading ways of organizing the military according to this approach: the use of private military and security companies (PMSCs), a conscripted force and the all-volunteer force (AVF). The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  22
    The Morality of Private War: The Challenge of Private Military and Security Companies.James Pattison - 2014 - Oxford University Press.
    The private military industry has been growing rapidly since the end of the Cold War. The Morality of Private War uses normative political theory to assess the leading moral arguments for and against the use of private military and security companies.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  38
    Discourses on Countering Violent Extremism: The Strategic Interplay Between Fear and Security After 9/11.Michael Stohl, Benjamin Smith & Musa Al-Gharbi - forthcoming - Critical Studies on Terrorism.
    This article explores the construction of extremism in media discourse, the factors driving specific constructions and the implications of these constructions for counterterrorism policy. We contend that extremism has predominantly and increasingly been framed as a security issue. This article explores the implications of this practice through the framework of securitisation. We measure the average intensity of security framing in 38,616 articles found in three major US newspapers, New York Times, Wall Street Journal and Los Angeles Times, between (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  20
    Spiritual Awakening of the Personality as key to Spiritual Security in the Context of Postmodernism.Halyna Shevchenko, Milena Bezuhla, Tetiana Antonenko & Iryna Safonova - 2021 - Postmodern Openings 12 (1):185-200.
    The article presents a new view on the problem of educating the spiritual security of the personality from the positions of axiological, culturological, civilizational, systemic, and anthropological approaches, on which the research methodology is based. The article describes the basic concepts of research: spirituality, culture, spiritual awakening, spiritual security, and presents the author’s definition of the concept of spiritual security of the personality. The article describes the cultural ideals of coziness in different countries of the world, which (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  49
    When is a Sale Not a Sale? The Riddle of Athenian Terminology for Real Security Revisited.Edward M. Harris - 1988 - Classical Quarterly 38 (02):351-.
    In Athens during the late Classical and Hellenistic periods, it was customary for a man who was borrowing a large sum of money to pledge some property as security for the repayment of his loan. To show that this property was legally encumbered, a flat slab of stone, called a horos, was set up, and an inscription, indicating the nature of the lien on the property, was inscribed on the horos. These horoi served to warn third parties that the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  30
    Social capital dimensions in household food security interventions: implications for rural Uganda.Haroon Sseguya, Robert E. Mazur & Cornelia B. Flora - 2018 - Agriculture and Human Values 35 (1):117-129.
    We demonstrate that social capital is associated with positive food security outcomes, using survey data from 378 households in rural Uganda. We measured food security with the Household Food Insecurity Access Scale. For social capital, we measured cognitive and structural indicators, with principal components analysis used to identify key factors of the concept for logistic regression analysis. Households with bridging and linking social capital, characterized by membership in groups, access to information from external institutions, and observance of norms (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  13
    Climate Adaptation Limits and the Right to Food Security.Ivo Wallimann-Helmer, Laurens M. Bouwer, Christian Huggel & Sirkku Juhola - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 109-115.
    Avoiding severe impacts from anthropogenic climate change requires not only substantial reductions in greenhouse gas emissions but also further implementation of adaptation measures. In many regions with smallholder farming systems adaptation can help ensure food security despite significantly changing climatic conditions. However, the space for adaptation measures has limits. In this paper, we investigate hard and soft adaptation limits and discuss their relevance to food security in smallholder farming food systems. We argue that soft adaptation limits can be (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 990