Results for 'Terrorist Networks'

976 found
Order:
  1.  49
    Positioning Theory and Terrorist Networks.Robert E. Schmidle - 2010 - Journal for the Theory of Social Behaviour 40 (1):65-78.
    This paper makes use of a new development in social psychology, Positioning Theory, the study of the way rights and duties are ascribed, attributed and justified to and by individuals in local social groups. It links this theory with a generally Vygotsky inspired approach to understanding the means by which people are brought into terrorist networks. Focusing on the use of the Internet as a device to bring mentor and novice together, the unique role of chat rooms and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  12
    Is the Role of Ideologists Central in Terrorist Networks? A Social Network Analysis of Indonesian Terrorist Groups.Mirra Noor Milla, Joevarian Hudiyana, Wahyu Cahyono & Hamdi Muluk - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  56
    On Terrorism and the Just War.Alan S. Rosenbaum - 2003 - International Journal of Applied Philosophy 17 (2):173-196.
    In my article I defend the claim that terrorism is morally indefensible, irrespective of the religious or political circumstances and motives behind the actions of its agents and sponsors. My argument is based on the indefeasible presupposition of modern civilization and our human rights culture that, like the prohibition against murder in the law of crimes, the deliberate killing of innocent civilian non-combatants—the principle target of terrorists—destroys the cardinal value of the sacrosanctity of all individual human life by making a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4.  92
    Misreading Islamist Terrorism: The “War Against Terrorism” and Just‐War Theory.Joseph M. Schwartz - 2004 - Metaphilosophy 35 (3):273-302.
    The Bush administration's military war on terrorism is a blunt, ineffective, and unjust response to the threat posed to innocent civilians by terrorism. Decentralized terrorist networks can only be effectively fought by international cooperation among police and intelligence agencies representing diverse nation‐states, including ones with predominantly Islamic populations. The Bush administration's allegations of a global Islamist terrorist threat to the national interests of the United States misread the decentralized and complex nature of Islamist politics. Undoubtedly there exists (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  1
    Network aesthetics.Patrick Jagoda - 2016 - London: University of Chicago Press.
    The term “network” is now applied to everything from the Internet to terrorist-cell systems. But the word’s ubiquity has also made it a cliché, a concept at once recognizable yet hard to explain. Network Aesthetics, in exploring how popular culture mediates our experience with interconnected life, reveals the network’s role as a way for people to construct and manage their world—and their view of themselves. Each chapter considers how popular media and artistic forms make sense of decentralized network metaphors (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  36
    Rape and Sexual Violence as Torture and Genocide in the Decisions of International Tribunals: Transjudicial Networks and the Development of International Criminal Law.Sergey Y. Marochkin & Galina A. Nelaeva - 2014 - Human Rights Review 15 (4):473-488.
    International criminal tribunals established by the UN Security Council in the 1990s have been widely acclaimed as active participants in the modern system of dynamic criminal justice. One of their best known achievements is the prosecution of rape and sexual assaults. The International Criminal Tribunal for the Former Yugoslavia (ICTY) and the International Criminal Tribunal for Rwanda (ICTR) set an example for other tribunals to follow. By interpreting a variety of international laws, the community of international legal professionals has been (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. The Terrorist Threat: World Risk Society Revisited.Ulrich Beck - 2002 - Theory, Culture and Society 19 (4):39-55.
    This article differentiates between three different axes of conflict in world risk society. The first axis is that of ecological conflicts, which are by their very essence global. The second is global financial crises, which, in a first stage, can be individualized and nationalized. And the third, which suddenly broke upon us on September 11th, is the threat of transnational terror networks, which empowers governments and states. Two sets of implications are drawn: first, there are the political dynamics of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  8. The Political Economy of Terrorism.Walter Enders & Todd Sandler - 2011 - Cambridge University Press.
    The Political Economy of Terrorism presents a widely accessible political economy approach to the study of terrorism. It applies economic methodology – theoretical and empirical – combined with political analysis and realities to the study of domestic and transnational terrorism. In so doing, the book provides both a qualitative and quantitative investigation of terrorism in a balanced up-to-date presentation that informs students, policy makers, researchers and the general reader of the current state of knowledge. Included are historical aspects, a discussion (...)
     
    Export citation  
     
    Bookmark   2 citations  
  9. Gender Differences in Posttraumatic Stress Symptoms after a Terrorist Attack: A Network Approach.Marianne S. Birkeland, Ines Blix, Øivind Solberg & Trond Heir - 2017 - Frontiers in Psychology 8.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10.  35
    Terrorists and witches: popular ideas of evil in the early modern period.Johannes Dillinger - 2004 - History of European Ideas 30 (2):167-182.
    In the early modern period (16?18th centuries), churches and state administrations alike strove to eradicate Evil. Neither they nor society at large accepted a conceptual differentiation between crime and sin. The two worst kinds of Evil early modern societies could imagine were organized arson and witchcraft. Although both of them were delusions, they nevertheless promoted state building. Networks of itinerant street beggars were supposed to have been paid by foreign powers to set fire in towns and villages. These vagrant (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  13
    Virality: Contagion Theory in the Age of Networks.Tony D. Sampson - 2012 - Univ of Minnesota Press.
    In this thought-provoking work, Tony D. Sampson presents a contagion theory fit for the age of networks. Unlike memes and microbial contagions, _Virality_ does not restrict itself to biological analogies and medical metaphors. It instead points toward a theory of contagious assemblages, events, and affects. For Sampson, contagion is not necessarily a positive or negative force of encounter; it is how society comes together and relates. Sampson argues that a biological knowledge of contagion has been universally distributed by way (...)
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  12.  59
    Civilians, terrorism, and deadly serious conventions.Jeremy Waldron - unknown
    This paper asks how we should regard the laws and customs of armed conflict, and specifically the rule prohibiting the targeting of civilians. What view should we take of the moral character and significance of such rules? Some philosophers have suggested that they are best regarded as useful conventions. This view is sometimes motivated by a "deep moral critique" of the rule protecting civilians: Jeff McMahan believes for example that the existing rules protect some who ought to be liable to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  13. Globalization, Terrorism, and Democracy: 9/11 and its Aftermath.Douglas Kellner - unknown
    Globalization has been one of the most hotly contested phenomena of the past two decades. It has been a primary attractor of books, articles, and heated debate, just as postmodernism was the most fashionable and debated topic of the 1980s. A wide and diverse range of social theorists have argued that today's world is organized by accelerating globalization, which is strengthening the dominance of a world capitalist economic system, supplanting the primacy of the nation-state by transnational corporations and organizations, and (...)
     
    Export citation  
     
    Bookmark   2 citations  
  14.  43
    Style Management: Images of Global Counter-Terrorism at the United Nations.Isobel Roele - 2022 - Law and Critique 33 (3):273-297.
    Models of global governance abound: expert governance, networked governance, algorithmic governance, and old-fashioned juridico-political governance vie for explanatory power. This article takes up style as a way of analysing configurations of governance that do not readily fit a particular model of governance. Style is particularly revealing when it comes to deliberately unspecified or over-specified, genre-busting, and bet-hedging ways of imagining governance. The UN’s use of the phrase ‘convening power’ is a case in point. This article looks at how the UN (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  21
    The Effect of Social Network Size on Hashtag Adoption on Twitter.Iris Monster & Shiri Lev-Ari - 2018 - Cognitive Science 42 (8):3149-3158.
    Propagation of novel linguistic terms is an important aspect of language use and language change. Here, we test how social network size influences people's likelihood of adopting novel labels by examining hashtag use on Twitter. Specifically, we test whether following fewer Twitter users leads to more varied and malleable hashtag use on Twitter, because each followed user is ascribed greater weight and thus exerts greater influence on the following user. Focusing on Dutch users tweeting about the terrorist attack in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  13
    Whose Body Is It? Technolegal Materialization of Victims’ Bodies and Remains after the World Trade Center Terrorist Attacks.Victor Toom - 2016 - Science, Technology, and Human Values 41 (4):686-708.
    This article empirically analyzes how victims’ remains were recovered, identified, repatriated, and retained after the World Trade Center terrorist attacks of September 11, 2001. It does so by asking the question whose body is it. This question brings to the fore issues related to personhood and ownership: how are anonymous and unrecognizable bodily remains given back an identity; and who has ownership of or custody over identified and unidentified human remains? It is in this respect that the article engages (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  18
    The Role of Transnational Norm Entrepreneurs in the U.S. "War on Terrorism".Catherine Powell - 2004 - Theoretical Inquiries in Law 5 (1):47-80.
    One of the most visible symbols of the debate over human rights and national security in the context of the U.S. "War on Terrorism" has been the detainment of Taliban and Al Qaeda fighters at the U.S. naval base in Guantanamo Bay, Cuba, following the U.S. war in Afghanistan. The controversy concerning the fate of the nearly 600 prisoners demonstrates the emergence of new modes of democratic deliberation over how to strike the balance between rights and security. These new modes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  18
    Transforming the Ich-Du to the Ich-Es: The Migrant as “Terrorist” in Kabir Khan’s New York and Kamila Shamsie’s Home Fire.Minu Susan Koshy - 2021 - Text Matters - a Journal of Literature, Theory and Culture 11:97-105.
    Terror narratives have been characterized by a dialogism where the “normative” I—i.e. the “non-threatening mainstream”—defines and delineates subjects whose identity is centred on their location in the terror network. This is especially so in the case of Asian migrants who settle down in Western countries, as their very identity as Asian locates them at a precarious point in the real or imagined “terror network.” The migrant is no longer the Du, but the Es, imparting an identity to the Ich, where (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  36
    Crossing the Rubicon: Understanding Cyber Terrorism in the European Context.Emerald M. Archer - 2014 - The European Legacy 19 (5):606-621.
    The first decade of the twenty-first century introduced a cultural shift where terrorism is concerned by making new technologies such as computers and networks available as both tools and targets for exploitation. The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. Using cyber technologies has many benefits for the user and the potential of causing more damage (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Combating Al Qaeda's Splinters: Mishandling Suicide Terrorism.Scott Atran - unknown
    The past three years saw more suicide attacks than the last quarter century. Most of these were religiously motivated. While most Westerners have imagined a tightly coordinated transnational terrorist organization headed by Al Qaeda, it seems more likely that nations under attack face a set of largely autonomous groups and cells pursuing their own regional aims. Repeated suicide actions show that massive counterforce alone does not diminish the frequency or intensity of suicide attack. Like pounding mercury with a hammer, (...)
     
    Export citation  
     
    Bookmark  
  21.  61
    The morality of preventive detention for suspected terrorists; possibilities and limits for a liberal society.Alec D. Walen - unknown
  22.  33
    Governance Hotspots: Challenges We Must Confront in the Post-September 11 World.Saskia Sassen - 2002 - Theory, Culture and Society 19 (4):233-244.
    Moving on after September 11 will require more than just eliminating organized terrorist networks and providing humanitarian aid, crucial as these two interventions are. There is a much larger landscape of multiple devastations in the global south that the global north cannot escape. While socio-economic devastation may not cause terrorism directly, it does promote extreme responses, such as trafficking in people, and can facilitate recruitment of young people for terrorist activity, both random and organized. These multiple devastations (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  11
    Classics and Complexity in Walden 's “Spring”.M. D. Usher - 2019 - Arion 27 (1):113-152.
    In lieu of an abstract, here is a brief excerpt of the content: Classics and Complexity in Walden’s “Spring” M. D. USHER In 1843, two years before Henry Thoreau built his cabin at Walden Pond, the Fitchburg Railroad laid down tracks through the woods near the Pond for its line connecting Boston to Fitchburg. The original Fitchburg Line, at 54 miles long, was, until 2010, the longest run in the present -day MBTA Commuter Rail system. And it is one of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  34
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  40
    Boko Haram Sharia Reasoning and Democratic Vision in Pluralist Nigeria.Benson O. Igboin - 2012 - International Studies. Interdisciplinary Political and Cultural Journal 14 (1):75-93.
    In the decade since Al-Qaeda, led by the late Osama Bin Laden, attacked America, there has been a resurgence in the debate about the relationship between religion and politics. The global Islamic terrorist networks and their successful operations against various targets around the globe increasingly draw attention to what constitutes the core values of Islamic extremism: the logic of evangelistic strategy, the import and relevance of its spiritual message and consideration of the composite view of life that does (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  20
    Pakistan’s counterterrorism strategy: A critical overview.Naeem Ahmed - 2016 - Journal of Social Sciences and Humanities 55 (2):1-16.
    This paper is an effort to critically evaluate Pakistan’s counterterrorism strategy, based on both military and non-military means. The paper argues that the counterterrorism strategy of Pakistan has proved ineffective and counter-productive to combat the homegrown threat of terrorism, unleashed by militant sectarian groups, following the Takfiri ideology. Although Pakistan’s Military claims that the latest on-going security operations, Zarb-e-Azb in North Waziristan and Khyber-II in Khyber Agency, have succeeded in clearing most of the area, however, the matter of fact is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Commentary: A Failure of Imagination.Scott Atran - unknown
    Intelligence estimates based on models keyed to frequency and recency of past occurrences make people less secure even if they predict most harmful events. The U.S. presidential commission on WMDs, the 9/11 commission, and Spain's comisión 11-M have condemned the status quo mentality of the intelligence community, which they see as being preoccupied with today's “current operations” and tactical requirements, and inattentive to tomorrow's far-ranging problems and strategic solutions. But the overriding emphasis in these commissions' recommendations is on further vertically (...)
     
    Export citation  
     
    Bookmark  
  28.  41
    Administrative Law and the Public's Health.Eleanor D. Kinney - 2002 - Journal of Law, Medicine and Ethics 30 (2):212-223.
    Today, public health regulation at all levels faces unprecedented challenges both at home and abroad. The September 11, 2001 attacks on New York and Washington, D.C., by the Al Qaeda terrorist network and the anthrax bioterrorism that followed shortly thereafter have put public health regulation at the forefront of homeland security. The anthrax scare, in particular, has greatly tested the American public health system, calling into question whether the United States and its component states and localities are prepared to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  21
    Philosophy, Terror, and Biopolitics.Cristian Iftode - 2012 - Public Reason 4 (1-2):229-39.
    The general idea of this investigation is to emphasize the elusiveness of the concept of terrorism and the pitfalls of the so-called “War on Terror” by way of confronting, roughly, the reflections made in the immediate following of 9/11 by Habermas and Derrida on the legacy of Enlightenment, globalization and tolerance, with Foucault’s concept of biopolitics seen as the modern political paradigm and Agamben’s understanding of “the state of exception” in the context of liberal democratic governments. The main argument will (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  54
    Mark Osiel: The End of Reciprocity: Terror, Torture and the Law of War: Cambridge University Press, 2009, pp. 1–667. [REVIEW]Seumas Miller - 2014 - Criminal Law and Philosophy 8 (3):659-669.
    Mark Osiel’s The End of Reciprocity: Terror, Torture and the Law of War provides detailed discussions of a number of important moral and legal issues arising for the United States in its ongoing response to the threats posed by the Al Qaeda terrorist network.Thanks to Andrew Alexandra for comments on this paper. The material in the first section of this critical review is derived from a short review of this book I wrote for the International Harvard Review vol. 31 (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  31. Attention and counter-framing in the Black Lives Matter movement on Twitter.Colin Klein, Ritsaart Reimann, Ignacio Ojea Quintana, Marc Cheong, Marinus Ferreira & Mark Alfano - 2022 - Humanities and Social Sciences Communications 9 (367).
    The social media platform Twitter platform has played a crucial role in the Black Lives Matter (BLM) movement. The immediate, flexible nature of tweets plays a crucial role both in spreading information about the movement’s aims and in organizing individual protests. Twitter has also played an important role in the right-wing reaction to BLM, providing a means to reframe and recontextualize activists’ claims in a more sinister light. The ability to bring about social change depends on the balance of these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  45
    Disclosing false identity through hybrid link analysis.Tossapon Boongoen, Qiang Shen & Chris Price - 2010 - Artificial Intelligence and Law 18 (1):77-102.
    Combating the identity problem is crucial and urgent as false identity has become a common denominator of many serious crimes, including mafia trafficking and terrorism. Without correct identification, it is very difficult for law enforcement authority to intervene, or even trace terrorists’ activities. Amongst several identity attributes, personal names are commonly, and effortlessly, falsified or aliased by most criminals. Typical approaches to detecting the use of false identity rely on the similarity measure of textual and other content-based characteristics, which are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  33.  48
    Dissimulation.Matthew King - 2020 - Angelaki 25 (6):108-121.
    Patterns in contemporary conflict highlight the failures of traditional views of the relationship between humanity and technology. This paper proposes that modern conflict is characterized by something called “dissimulation,” referring to numerous phenomena together emphasizing the inadequacies of conceiving man as the overseeing creator of technological advancement. It shows rather that man, particularly man in conflict, is always already implicated and concealed within complex technological networks and mediums, wherein humanity is just another player amongst others. This paper diagnoses and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  18
    Detection of extremist messages in web resources in the Kazakh language.Shynar Mussiraliyeva & Milana Bolatbek - 2023 - Lodz Papers in Pragmatics 19 (2):415-425.
    Currently, the Internet information and communication network has become an integral part of human life. People use social networks such as Twitter, VKontakte, Facebook, etc., to establish global contacts, exchange opinions, gain knowledge, etc. The active participation of not only individual users, but also information organizations in the entire world space makes it necessary to develop measures that correspond to modern trends in the development of information and communication technologies to ensure national security, in particular, the organization of events (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  36
    On the Illegitimate Use of Force: The Neo-Jacobins of Europe.Hakkı Taş - 2014 - The European Legacy 19 (5):556-567.
    While in Western discourse terrorism first referred to the “Reign of Terror” imposed by the Jacobin state in France, in recent decades it has become increasingly associated with non-state actors. Studies on the undertheorized concept of “state terrorism” have by and large neglected its role in liberal democratic states. In this essay I attempt to re-establish the link between the state and terror by challenging the Weberian definition of the state as holding “the monopoly of the legitimate use of physical (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  36
    Biopolitics.Alexander V. Oleskin - 2008 - Proceedings of the Xxii World Congress of Philosophy 50:517-523.
    Biopolitics, originally interpreted as the subfield of political science focusing on biological (evolutionary) factors involved in political behavior, has faced conceptual and organizational differences during the forty-year period of its development. It has recently been redefined as the totality of all applications of biology to social and political concepts, problems and practical issues and concerns. In these new terms, biopolitics represents a promising interdisciplinary area of research, whose potential with respect to political philosophy and political science is exemplified by its (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  8
    Specific features and procpects for development of electronic government in the PRC at the beginning of the XXI century.K. V. Kasparyan & M. V. Rutkovskaya - forthcoming - Philosophical Problems of IT and Cyberspace.
    The article is devoted to the analysis of features of functioning of the digital government in the Chinese State in the first decades of the 21-st century and the perspectives of its further development. In this work the authors give a brief description of the essence of phenomenon of digital government in general. The article explores the specific features of this process in the People’s Republic of China in the third millennium. This research examines the influence of functioning of e-government (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  56
    Who Watches the Watchers? Towards an Ethic of Surveillance in a Digital Age.Eric Stoddart - 2008 - Studies in Christian Ethics 21 (3):362-381.
    The essay considers contemporary surveillance strategies from a Christian ethical perspective. It discusses first surveillance as a form of speech in the light of biblical themes of truthfulness, then draws on principles of subsidiarity and solidarity. Surveillance is dignified as human work whilst its dehumanizing outcomes are challenged. It is concluded that surveillance must contribute to human dignity and that accountability for data must follow a revised model of subsidiarity, appropriate to network rather than linear socio-political relationships. Mutual responsibility for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash, Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  31
    Muslims in Spain. The Case of Maghrebis in Alicante.Yolanda Aixela Cabre - 2007 - Journal for the Study of Religions and Ideologies 6 (17):84-100.
    The aim of this article is to describe the social networks of the Maghrebis in Alicante, some of the problems they face in their daily life, and the role played by the “mosque” as a place not only of prayer but also of mutual help and support. At the same time, the analysis shows that Islamophobia has increased in the city, as it has done in other places in Spain and Europe following the Al-Qaeda terrorist attacks, with the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  41.  13
    Специфические черты и перспективы развития электронного правительства в кнр в начале XXI столетия.К. В Каспарян & М. В Рутковская - 2022 - Философские Проблемы Информационных Технологий И Киберпространства 2:61-83.
    The article is devoted to the analysis of features of functioning of the digital government in the Chinese State in the first decades of the 21-st century and the perspectives of its further development. In this work the authors give a brief description of the essence of phenomenon of digital government in general. The article explores the specific features of this process in the People’s Republic of China in the third millennium. This research examines the influence of functioning of e-government (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  43
    Simply complexity: a clear guide to complexity theory.Neil F. Johnson - 2007 - Oxford: Oneworld. Edited by Neil F. Johnson.
    What exactly is complexity science? Two's company, three is complexity ; Disorder rules, OK? ; Chaos and all that jazz ; Mob mentality ; Getting connected -- What can complexity science do for me? Forecasting financial markets ; Tackling traffic networks and climbing the corporate ladder ; Looking for Mr./Mrs. Right ; Coping with conflict : next-generation wars and global terrorism -- Catching a cold, avoiding super-flu and curing cancer ; The mother of all complexities : our nanoscale quantum (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  43.  46
    Performing the Union: The Prüm Decision and the European dream.Barbara Prainsack & Victor Toom - 2013 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 44 (1):71-79.
    In 2005, seven European countries signed the so-called Prüm Treaty to increase transnational collaboration in combating international crime, terrorism and illegal immigration. Three years later, the Treaty was adopted into EU law. EU member countries were now obliged to have systems in place to allow authorities of other member states access to nationally held data on DNA, fingerprints, and vehicles by August 2011. In this paper, we discuss the conditions of possibility for the Prüm network to emerge, and argue that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  16
    On Geoscapes and the Google Caliphate.Benjamin H. Bratton - 2009 - Theory, Culture and Society 26 (7-8):329-342.
    When advanced technologies of globalization that are closely associated with secular cosmopolitics are opportunistically employed by fundamentalist politico-theologies for their own particular purposes, an essential irresolution of territory, jurisdiction and programmatic projection is revealed. Where some may wish to identify an ideal correspondence between a global political sphere into which multiple differences might be adjudicated and the visual, geographic representation of a single planetary space, this conjunction is dubious and highly conditional. Instead multiple territorial projections and competing claims on space (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  15
    Public perceptions about the police’s use of facial recognition technologies.Gustavo Mesch & Inbal Lam - forthcoming - AI and Society:1-11.
    The police’s use of facial recognition technologies allows them to verify identification in real-time by mapping facial features into indicators that can be compared with other data stored in its database or in online social networks. Advances in facial recognition technologies have changed law enforcement agencies’ operations, improving their ability to identify suspects, investigate crimes, and deter criminal behavior. Most applications are used in tracking and identifying potential terrorists, searching for abducted and missing persons, and security surveillance at airports, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  61
    A Reply to My Critics.Carol C. Gould - 2006 - Radical Philosophy Today 4:277-291.
    In response to critical discussions of her Globalizing Democracy and Human Rights by William McBride, Omar Dahbour, Kory Schaff, and David Schweickart, Gould grants that globalization and U.S. Empire are intertwined, but she argues that this does not refute that global and transnational interconnections and networks are developing that are in need of substantive democracy. Gould further seeks to clarify two main interpretive misunderstandings of her critics. First, even though she rejects “all affected” as a criterion for determining the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  15
    The Urban 'Battlespace'.Stephen Graham - 2009 - Theory, Culture and Society 26 (7-8):278-288.
    Sustaining the military targeting of the everyday sites and spaces of urban life in the contemporary period is a new constellation of military doctrine and theory. In this the spectre of state-vs-state military conflict is seen to be in radical retreat. Instead, the new doctrine is centred around the idea that a wide spectrum of global insurgencies and ambient threats now operates across the social, technical, political, cultural and financial networks which straddle transnational scales while simultaneously penetrating the everyday (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  59
    Lifestyle and rights: A neo-secular conception of human dignity.Ahmet Murat Aytaç - 2017 - Philosophy and Social Criticism 43 (4-5):495-502.
    The challenges facing the life-worlds of political societies in the Islamic world require a radical shift of perspective that can improve our understanding of the contemporary situation of human rights politics. Not only the classical formulation of secularism, which aims at liberating the public sphere from domination of ‘the sacred’, but also the political-theological approach, which addresses the problems of modernity within the context of a disguised and refurbished dominance of ‘the transcendence’, suffer from and share a basic insufficiency in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  8
    Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones.Jennifer Parisi & Gordon A. Gow - 2008 - Bulletin of Science, Technology and Society 28 (1):60-68.
    In recent years there has been concern among law enforcement and national security organizations about the use of “anonymous” prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates oppose such regulatory measures, arguing that there is little practical value in attempting to register prepaid mobile devices, and the issue raises important questions about a citizen's entitlement to anonymity (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  16
    Negative cosmopolitanism: cultures and politics of world citizenship after globalization.Eddy Kent & Terri Tomsky (eds.) - 2017 - Chicago: McGill-Queen's University Press.
    From climate change, debt, and refugee crises, to energy security, environmental disasters, and terrorism, the events that lead nightly newscasts and drive public policy demand a global perspective. In the twentieth century the world sought solutions through formal institutions of international governance such as like the United Nations, the International Criminal Court, and the World Bank, but present-day our responses to global realities are often more provisional, improvisational, and contingent. Tracing this uneven history in order to identify principal actors, contesting (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976