Results for 'Terrorist data'

972 found
Order:
  1. Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  23
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially when (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  40
    Terrorists’ Violence Threats and Coping Strategies: A Phenomenological Approach of Former FATA, Pakistan.Jan Alam, Nazir Ullah & Hidayat Rasool - 2023 - Human Affairs 33 (1):82-100.
    Terrorism is a global phenomenon that constantly challenges human survival. Based on the social structure, human beings adopt different strategies to overcome its negative consequences on their mind and behavior. Coping strategies and those processes essential for adjustment and survival illustrate how individuals perceive, consider, deal with, and realize a stressful situation in the era of terrorism. The study focuses on exploring coping strategies and avoidance of terrorism impacts. This research study was qualitatively designed to explore the coping strategies adaptation (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  9
    Looking for Mohammed: Data Screening in Search of Terrorists.Ralf Groetker - 2004 - In Georg Meggle, Andreas Kemmerling & Mark Textor (eds.), Ethics of Terrorism & Counter-Terrorism. De Gruyter. pp. 301-318.
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  14
    The Tendency of Terrorist Organizations to Explosive Attacks: An Institutional Theory Perspective.Lanjun Luo & Chao Qi - 2022 - Frontiers in Psychology 13:747967.
    Focusing on the tendency of terrorist organizations to explosive attack, this article applied the institutional theory as the basis to explain the inherent logic of attack type similarity from the perspective of mimetic, coercive, and normative isomorphism. Subsequently, the study conducted an empirical analysis of the data onto 1825 terrorist organizations recorded in the Global Terrorism Database with the logistic regression method. The results show that: (1) Terrorist organizations will learn from pre-existing terrorist organizations' experiences, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  14
    Terrorism research and the diffusion of ideas.Edna O. F. Reid - 1993 - Knowledge, Technology & Policy 6 (1):17-37.
    The diffusion of ideas about contemporary terrorism is analyzed using a sociology of science methodology. One of the most common means of creating understandings of a phenomenon is the development and diffusion of ideas that influence the positions adopted by a wide range of actors, including government bureaucrats and decision makers, legislative and corporate bodies, and the public. How did terrorism researchers interact with these actors to construct, maintain, and modify the development and perception of contemporary terrorism? How were the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  25
    Terrorist Violence and Popular Mobilization: The Case of the Spanish Transition to Democracy.Paloma Aguilar & Ignacio Sánchez-Cuenca - 2009 - Politics and Society 37 (3):428-453.
    The hypothesis that terrorism often emerges when mass collective action declines and radicals take up arms to compensate for the weakness of a mass movement has been around for some time; however, it has never been tested systematically. In this article the authors investigate the relationship between terrorist violence and mass protest in the context of the Spanish transition to democracy. This period is known for its pacts and negotiations between political elites, but in fact, it was accompanied by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8. The paradox of terrorism in civil war.Stathis N. Kalyvas - 2004 - The Journal of Ethics 8 (1):97-138.
    A great deal of violence in civil wars is informed by the logic of terrorism: violence tends to be used by political actors against civilians in order to shape their political behavior. I focus on indiscriminate violence in the context of civil war: this is a type of violence that selects its victims on the basis of their membership in some group and irrespective of their individual actions. Extensive empirical evidence suggests that indiscriminate violence in civil war is informed by (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  9.  17
    Who Are the Terrorists? A Disproportionate Response to Muslim Extremism.Anas Askar & Amin Asfari - 2023 - Philosophy in the Contemporary World 29 (1):117-146.
    This paper argues that the nature of terrorism has remained unchanged despite perceived shifts. Over four decades of data collected in America show that right-wing violence has consistently posed the most pernicious threat. Despite media claims of objectivity and neutrality, we contend that law enforcement and the media targeted the Muslim community while being aware that the real threat emanates from the activities of right-wing groups. Employing Islamophobia as our conceptual framework and critical theory as our philosophical lens, we (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. The Political Economy of Terrorism.Walter Enders & Todd Sandler - 2011 - Cambridge University Press.
    The Political Economy of Terrorism presents a widely accessible political economy approach to the study of terrorism. It applies economic methodology – theoretical and empirical – combined with political analysis and realities to the study of domestic and transnational terrorism. In so doing, the book provides both a qualitative and quantitative investigation of terrorism in a balanced up-to-date presentation that informs students, policy makers, researchers and the general reader of the current state of knowledge. Included are historical aspects, a discussion (...)
     
    Export citation  
     
    Bookmark   2 citations  
  11. A utilitarian argument against torture interrogation of terrorists.Jean Maria Arrigo - 2004 - Science and Engineering Ethics 10 (3):543-572.
    Following the September 2001 terrorist attacks on the United States, much support for torture interrogation of terrorists has emerged in the public forum, largely based on the “ticking bomb” scenario. Although deontological and virtue ethics provide incisive arguments against torture, they do not speak directly to scientists and government officials responsible for national security in a utilitarian framework. Drawing from criminology, organizational theory, social psychology, the historical record, and my interviews with military professionals, I assess the potential of an (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  12.  15
    Gendered Views in a Feminist State: Swedish Opinions on Crime, Terrorism, and National Security.Isabella Nilsen, Eva-Karin Olsson & Charlotte Wagnsson - 2020 - Gender and Society 34 (5):790-817.
    Gender differences have been observed regarding many political and social issues, yet we lack comprehensive evidence on differences in perceptions on a wide range of security issues increasingly important to voters: military threats, criminality, and terrorism. Previous research suggests that when women are highly politically mobilized, as they are in Sweden, gender differences in political opinion are large. On the other hand, Swedish politicians have worked hard to reduce gender stereotypical thinking. This prompts the question: Are there gender differences in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. the Moral Logic and Growth of Suicide Terrorism.Scott Atran - unknown
    Suicide attack is the most virulent and horrifying form of terrorism in the world today. The mere rumor of an impending suicide attack can throw thousands of people into panic. This occurred during a Shi‘a procession in Iraq in late August 2005, causing hundreds of deaths. Although suicide attacks account for a minority of all terrorist acts, they are responsible for a majority of all terrorism-related casualties, and the rate of attacks is rising rapidly across the globe. During 2000–2004, (...)
     
    Export citation  
     
    Bookmark   5 citations  
  14. Systematically Unsystematic Violence: On the Definition and Moral Status of Terrorism.Michael Baur - 2006 - In Kem Crimmins & Herbert De Vriese (eds.), The Reason of Terror: Philosophical Responses to Terrorism. Peeters. pp. 3-32.
    Shortly after the bus and subway bombings in London on July 7, 2005, United Nations Secretary General Kofi Annan called upon world leaders to reach consensus on a definition of terrorism, one that would facilitate 'moral clarity' and underwrite the United Nations convention against terrorism. The Secretary General's plea to world leaders help to highlight the practical significance and urgency of having a workable definition of terrorism. For the task of defining terrorism is not only theoretically or academically important; it (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  14
    The impact of a terrorist attack: Survivors’ health, functioning and need for support following the 2019 Utrecht tram shooting 6 and 18 months post-attack. [REVIEW]Mark W. G. Bosmans, Carolien Plevier, Francoise Schutz, Lise E. Stene, C. Joris Yzermans & Michel L. A. Dückers - 2022 - Frontiers in Psychology 13.
    BackgroundExtremely violent events such as terrorist attacks and mass shootings form a severe risk for the health and wellbeing of affected individuals. In this study based on a public health monitor, we focus on the health impact of the Utrecht tram shooting, which took place in the morning of March 18th 2019. A lone gunman opened fire on passengers within a moving tram. Four people died, and six people were injured in this attack. The attack resulted in nationwide commotion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  44
    Discursive representation of Boko Haram terrorism in selected Nigerian newspapers.Ayo Osisanwo - 2016 - Discourse and Communication 10 (4):341-362.
    Studies on terrorism with bias towards Boko Haram have mainly been carried out from non-linguistic fields. The few linguistics-related studies that have examined the media reportage of the BH activities, with emphasis on the discourse and linguistic strategies deployed in the representations, have not been sufficient. This study, therefore, identifies the linguistic and discourse strategies deployed by selected newspapers in representing the BH and other social actors. For data, headline and overline stories are purposively sampled from four newspapers, published (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  19
    Big data surveillance across fields: Algorithmic governance for policing & regulation.Anthony Amicelle - 2022 - Big Data and Society 9 (2).
    While the academic separation of policing and regulation is still largely operative, points of convergence are more significant than ever in the digital age, starting with concomitant debates about algorithms as a new figure of power. From the policing of illegal activities to the regulation of legal ones, the algorithmization of such critical social ordering practices has been the subject of growing attention. These burgeoning discussions are focused on one common element: big data surveillance. In accordance with such similarities (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  20
    Counter-narrative strategies in deradicalisation: A content analysis of Indonesia’s anti-terrorism laws.Joko Setiyono & Sulaiman Rasyid - 2022 - HTS Theological Studies 78 (1):8.
    This article analysed the Indonesian government’s strategy in eradicating terrorism and radicalism. This study was designed with quantitative methods within the framework of normative legal research using anti-terrorism-related regulations as the sample. Data analysis was carried out with content analysis to identify the conception of terrorism, radicalism and deradicalisation in the legislation. The research found that most of Indonesia’s counter-terrorism regulations associate terrorism with criminal actions. However, regulatory developments also present a decreasing association between terrorism and acts of violence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  8
    Police epistemic culture and boundary work with judicial authorities and forensic scientists: the case of transnational DNA data exchange in the EU.Helena Machado & Rafaela Granja - 2019 - New Genetics and Society 38 (3):289-307.
    The exchange of forensic DNA data is seen as an increasingly important tool in criminal investigations into organised crime, control strategies and counter-terrorism measures. On the basis of a set of interviews with police professionals involved in the transnational exchange of DNA data between EU countries, this paper examines how forensic DNA evidence is given meaning within the various different ways of constructing a police epistemic culture, it is, a set of shared values concerning valid knowledge and practices (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  44
    Disclosing false identity through hybrid link analysis.Tossapon Boongoen, Qiang Shen & Chris Price - 2010 - Artificial Intelligence and Law 18 (1):77-102.
    Combating the identity problem is crucial and urgent as false identity has become a common denominator of many serious crimes, including mafia trafficking and terrorism. Without correct identification, it is very difficult for law enforcement authority to intervene, or even trace terrorists’ activities. Amongst several identity attributes, personal names are commonly, and effortlessly, falsified or aliased by most criminals. Typical approaches to detecting the use of false identity rely on the similarity measure of textual and other content-based characteristics, which are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. Metaphorizing Violence in the UK and Brazil: A Contrastive Discourse Dynamics Study.Lynne Cameron, Ana Pelosi & Heloísa Pedroso de Moraes Feltes - 2014 - Metaphor and Symbol 29 (1):23-43.
    A cross-linguistic/cultural study of verbal metaphor compares responses to terrorism in the UK (N = 96) and to urban violence in Brazil (N = 11). Focus groups discussed how violence changes perceptions of risk, decisions of daily life, and attitudes to others. Metaphor vehicles were identified in transcribed data, then grouped together semantically; 15 vehicle groupings were used with similar frequencies, 16 groupings more in UK data, 14 more in Brazil data. Systematic and framing metaphors were found (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  10
    State of urgency: Surveillance, power, and algorithms in France’s state of emergency.Kyle Kubler - 2017 - Big Data and Society 4 (2).
    The recent terrorist attacks and ongoing state of emergency in France have brought questions of police surveillance into the public spotlight, making it increasingly important to understand how police attain data from citizens. Since 2005, the French police have been using IBM’s computer program, i2 Analyst’s Notebook, to aggregate information and craft criminal narratives. This technology serves to quickly connect suspects with crimes, looking for as many associations as possible, ranking and visualizing them based on level of importance. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24. Hunting For Humans: On Slavery as the Basis of the Emergence of the US as the World’s First Super Industrial State or Technocracy and its Deployment of Cutting-Edge Computing/Artificial Intelligence Technologies, Predictive Analytics, and Drones towards the Repression of Dissent.Miron Clay-Gilmore - manuscript
    This essay argues that Huey Newton’s philosophical explanation of US empire fills an epistemological gap in our thinking that provides us with a basis for understanding the emergence and operational application of predictive policing, Big Data, cutting-edge surveillance programs, and semi-autonomous weapons by US military and policing apparati to maintain control over racialized populations historically and in the (still ongoing) Global War on Terror today – a phenomenon that Black Studies scholars and Black philosophers alike have yet to demonstrate (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  32
    The Right to Know and the Right Not to Know: Genetic Privacy and Responsibility.Ruth Chadwick, Mairi Levitt & Darren Shickle (eds.) - 2014 - Cambridge University Press.
    The privacy concerns discussed in the 1990s in relation to the New Genetics failed to anticipate the relevant issues for individuals, families, geneticists and society. Consumers, for example, can now buy their personal genetic information and share it online. The challenges facing genetic privacy have evolved as new biotechnologies have developed, and personal privacy is increasingly challenged by the irrepressible flow of electronic data between the personal and public spheres and by surveillance for terrorism and security risks. This book (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  26.  98
    Recombinant identities: Biometrics and narrative bioethics.Btihaj Ajana - 2010 - Journal of Bioethical Inquiry 7 (2):237-258.
    In recent years, there has been a growing interest in finding stronger means of securitising identity against the various risks presented by the mobile globalised world. Biometric technology has featured quite prominently on the policy and security agenda of many countries. It is being promoted as the solution du jour for protecting and managing the uniqueness of identity in order to combat identity theft and fraud, crime and terrorism, illegal work and employment, and to efficiently govern various domains and services (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  27. Hate Speech on Social Media.Elizabeth A. Park & Amos Guiora - 2017 - Philosophia 45 (3):957-971.
    This essay expounds on Raphael Cohen-Almagor’s recent book, Confronting the Internet’s Dark Side, Moral and Social Responsibility on the Free Highway, and advocates placing narrow limitations on hate speech posted to social media websites. The Internet is a limitless platform for information and data sharing. It is, in addition, however, a low-cost, high-speed dissemination mechanism that facilitates the spreading of hate speech including violent and virtual threats. Indictment and prosecution for social media posts that transgress from opinion to inciteful (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28. Las elecciones de 9 de marzo de 2008 en España.Lucia Picarella - 2008 - Aposta 39:2.
    This article describes in detail the general elections of 2008 in Spain. His interest is not only in the exhaustive presentation of data, but also in the viewpoint of the author's own: it is policy analysis Spanish made from Italy. The position of the observer facilitates a more aseptic of events that account for the elections in which, for the second consecutive time, Zapatero was the most voted. In the text we can compare the electoral strategies of the two (...)
    No categories
     
    Export citation  
     
    Bookmark  
  29.  21
    The discursive construction of ‘Tunisianité’.Fethi Helal - 2019 - Discourse and Communication 13 (4):415-436.
    This study investigates the discursive construction of the idea of tunisianité in a sample of 41 articles published in the national press in the wake of the Arab Spring. Using analytical categories developed within the discourse-historical approach, the analysis indicates three general, strongly secularist, representations of tunisianité. One of these, which can be called essentialist, claims an unmistakable ethnolinguistic connection to a glorified pre-Arabo-Islamic classicism which goes back to the foundation of Carthage. A second and a more dominant one construes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  27
    Loss of Trust May Never Heal. Institutional Trust in Disaster Victims in a Long-Term Perspective: Associations With Social Support and Mental Health.Siri Thoresen, Marianne S. Birkeland, Tore Wentzel-Larsen & Ines Blix - 2018 - Frontiers in Psychology 9:372586.
    Natural disasters, technological disasters, and terrorist attacks have an extensive aftermath, often involving society’s institutions such as the legal system and the police. Victims’ perceptions of institutional trustworthiness may impact their potential for healing. This cross-sectional study investigates institutional trust, health, and social support in victims of a disaster that occurred in 1990. We conducted face-to-face interviews with 184 survivors and bereaved, with a 60% response rate 26 years after the disaster. Levels of trust in the police and in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  31
    RETRACTED: When Words Hurt: Affective Word Use in Daily News Coverage Impacts Mental Health.Jolie B. Wormwood, Madeleine Devlin, Yu-Ru Lin, Lisa Feldman Barrett & Karen S. Quigley - 2018 - Frontiers in Psychology 9:370118.
    Media exposure influences mental health symptomology in response to salient aversive events, like terrorist attacks, but little has been done to explore the impact of news coverage that varies more subtly in affective content. Here, we utilized an existing data set in which participants self-reported physical symptoms, depressive symptoms, and anxiety symptoms, and completed a potentiated startle task assessing their physiological reactivity to aversive stimuli at three time points (waves) over a 9-month period. Using a computational linguistics approach, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  32.  15
    The history of Ukrainian Association of Researchers of Religion to the 25th anniversary of establising.Viktoriia Borodina & Ihor Kozlovskyi - 2021 - Ukrainian Religious Studies 92:166-175.
    In this issue, the founder of the Donetsk regional branch of the Ukrainian Association of Religious Studies, theologian, candidate of historical sciences, senior researcher of the Department of Religious Studies of the GS Skovoroda Institute of Philosophy of the National Academy of Sciences of Ukraine, President of the Center for Religious Studies member of the Expert Council on Freedom of Conscience and Religious Organizations under the Ministry of Culture of Ukraine, member of the Strategic Council under the Minister of Culture (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. A Semantics-Based Common Operational Command System for Multiagency Disaster Response.Linda Elmhadhbi, Mohamed-Hedi Karray, Bernard Archimède, J. Neil Otte & Barry Smith - 2022 - IEEE Transactions on Engineering Management 69 (6):3887 - 3901.
    Disaster response is a highly collaborative and critical process that requires the involvement of multiple emergency responders (ERs), ideally working together under a unified command, to enable a rapid and effective operational response. Following the 9/11 and 11/13 terrorist attacks and the devastation of hurricanes Katrina and Rita, it is apparent that inadequate communication and a lack of interoperability among the ERs engaged on-site can adversely affect disaster response efforts. Within this context, we present a scenario-based terrorism case study (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  24
    Adaptation patterns and consumer behavior as a dependency on terror.Aviad Tur-Sinai - 2014 - Mind and Society 13 (2):257-269.
    Terror may have dire implications for the public’s behavior. According to Kirschenbaum (J Homel Secur Emerg Manag 3(1/3):1–33, 2006), in order to minimize the expected impact of a terror incident the public has to adopt a “survival strategy”. According to the underlying research hypothesis of the study, the longer the terror incidents continue, the more the public accepts the possibility that it will be in this situation for the long term; therefore, the extent of its deviation from its ordinary consumer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  23
    Image and text relations in ISIS materials and the new relations established through recontextualisation in online media.Kevin Chai, Rebecca Lange, Sabine Tan, Kay L. O’Halloran & Peter Wignell - 2018 - Discourse and Communication 12 (5):535-559.
    This study takes a systemic functional multimodal social semiotic approach to the analysis and discussion of image and text relations in two sets of data. First, patterns of contextualisation of images and text in the online magazines Dabiq and Rumiyah produced by the Islamic extremist organisation which refers to itself as Islamic State are examined. The second data set consists of a sample of texts from Western online news and blog sites which include recontextualisations of images found in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  51
    Clinical Anecdotes: A Painful Lack of Wounds.Christopher Bailey - 2009 - Philosophy, Psychiatry, and Psychology 16 (3):223-224.
    In lieu of an abstract, here is a brief excerpt of the content:Clinical Anecdotes: A Painful Lack of WoundsChristopher Bailey (bio)Keywordsdepression, post-traumatic stress disorder (PTSD), evolution, fight-or-flight, veteran (treatment of)Colin came to me complaining of depression, which started after he got back from Iraq in 2005. Although he had served in the National Guard, he volunteered absolutely nothing about his time in Iraq as we spoke, instead focusing on other factors, like problems at his job and a family history of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  37.  50
    Norms and value based reasoning: justifying compliance and violation.Trevor Bench-Capon & Sanjay Modgil - 2017 - Artificial Intelligence and Law 25 (1):29-64.
    There is an increasing need for norms to be embedded in technology as the widespread deployment of applications such as autonomous driving, warfare and big data analysis for crime fighting and counter-terrorism becomes ever closer. Current approaches to norms in multi-agent systems tend either to simply make prohibited actions unavailable, or to provide a set of rules which the agent is obliged to follow, either as part of its design or to avoid sanctions and punishments. In this paper we (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  38.  25
    Sustaining Surveillance: The Importance of Information for Public Health.John G. Francis & Leslie P. Francis - 2021 - Springer Verlag.
    This book presents a comprehensive theory of the ethics and political philosophy of public health surveillance based on reciprocal obligations among surveillers, those under surveillance, and others potentially affected by surveillance practices. Public health surveillance aims to identify emerging health trends, population health trends, treatment efficacy, and methods of health promotion--all apparently laudatory goals. Nonetheless, as with anti-terrorism surveillance, public health surveillance raises complex questions about privacy, political liberty, and justice both of and in data use. Individuals and groups (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  28
    Islamic Education in England: Opportunities and Threats.İrfan Erdoğan - 2020 - Cumhuriyet İlahiyat Dergisi 24 (2):687-714.
    Our study aimed to investigate what Muslim families in England have the opportunity to have religious education for their children and to examine the institutions or structures that provide Islamic education opportunities. Document analysis as a qualitative method was adopted in our study. Academic books and articles related to the subject, statistical records, various re-ports provided by the state and private institutions, school curricula, school inspection reports, and law articles, and some court decisions constitute the main data sources. Maximum (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  17
    Illiberal Reactions to Higher Education.Evan Schofer, Julia C. Lerch & John W. Meyer - 2022 - Minerva 60 (4):509-534.
    Higher education has expanded at astonishing rates around the world. We seek to understand the oppositions that periodically arise, which may produce enrollment declines and/or imposition of political controls. The post-1945 growth of higher education was – to a greater extent than is often recognized – propelled by the liberal, and later neoliberal, international order. Oppositions arise from illiberal alternatives, which also may organize globally. The recent weakening of the global liberal order, associated with growing populism and nationalism, creates conditions (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41. Freelance Behavioural Scientist.Brian J. Gibbs - forthcoming - Behavioral and Brain Sciences.
    Lankford’s (2013) essential empirical argument, which is based on evidence such as psychological autopsies, is that suicide attacks are caused by suicidality. By operationalizing this causal claim in a hypothetical experiment, I show the claim to be provable, and I contend that its truth is supported by Lankford’s data. However, I question the success of his follow-on arguments about beauty and goodness.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance relatively unobtrusive. Video (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  53
    Connecting the Dots. Intelligence and Law Enforcement since 9/11.Mary Margaret Stalcup & Meg Stalcup - 2009 - Dissertation, University of California, Berkeley and San Francisco
    This work examines how the conceptualization of knowledge as both problem and solution reconfigured intelligence and law enforcement after 9/11. The idea was that more information should be collected, and better analyzed. If the intelligence that resulted was shared, then terrorists could be identified, their acts predicted, and ultimately prevented. Law enforcement entered into this scenario in the United States, and internationally. "Policing terrorism" refers to the engagement of state and local law enforcement in intelligence, as well as approaching terrorism (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  25
    Biometric Identification, Law and Ethics.Marcus Smith & S. R. M. Miller - unknown
    This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  14
    Public perceptions about the police’s use of facial recognition technologies.Gustavo Mesch & Inbal Lam - forthcoming - AI and Society:1-11.
    The police’s use of facial recognition technologies allows them to verify identification in real-time by mapping facial features into indicators that can be compared with other data stored in its database or in online social networks. Advances in facial recognition technologies have changed law enforcement agencies’ operations, improving their ability to identify suspects, investigate crimes, and deter criminal behavior. Most applications are used in tracking and identifying potential terrorists, searching for abducted and missing persons, and security surveillance at airports, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  19
    The relationship between media use and public opinion on immigrants and refugees: A Belgian perspective.Leen D’Haenens, Rozane De Cock, Willem Joris, Marlies Debrael, Koen Matthijs & David De Coninck - 2018 - Communications 43 (3):403-425.
    Belgium, and Europe in general, has seen a strong increase in the number of refugees arriving over the past three years. At the same time we also note an increasing polarization of Belgian public opinion on this subject. Among the main actors to shape this public opinion are news media, as they contribute to or combat stereotyping of (sub)groups in the population. The purpose of the current study is to analyze to which extent media consumption and trust have an impact (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  6
    Verifiable record of AI output for privacy protection: public space watched by AI-connected cameras as a target example.Yusaku Fujii - forthcoming - AI and Society:1-10.
    AI systems, which receive vast amounts of information including privacy information, are emerging. Protecting the privacy of the general public is an important issue for democracies. In this study, “Public space watched by AI- connected cameras” is taken as an example of an AI-system that is expected to be used for public purposes and has a relatively high privacy violation risk. It is defined as a wide public area where every point is monitored by multiple AI-connected street cameras. The following (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  44
    A cultural-psychological theory of contemporary islamic martyrdom.C. Dominik Güss, Ma Teresa Tuason & Vanessa B. Teixeira - 2007 - Journal for the Theory of Social Behaviour 37 (4):415–445.
    What political, economic, religious, and emotional factors are involved in a person's decision to kill civilians and military personnel through the sacrifice of his or her own life? Data for this research were secondary analyses of interviews with Islamic martyrs, as well as their leaders’ speeches. This investigation into the cultural-psychological explanations for Islamic martyrdom leads to a model explaining a person's decision to carry out the mission as resulting from a combination of four factors: the historical-cultural context, group (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  19
    Socio-economic determinants of subjective wellbeing toward Sustainable Development Goals: An insight from a developing country.Anas A. Salameh, Sajid Amin, Muhammad Hassan Danish, Nabila Asghar, Rana Tahir Naveed & Mubbasher Munir - 2022 - Frontiers in Psychology 13.
    One of the goals of happiness research is to identify the key factors that influence it. Therefore, the present research is designed to examine the determining factors of subjective wellbeing in Pakistan. The present research is conducted by collecting the data of 1,566 households in Punjab, Pakistan, using the ordered logit and tobit model. The findings of this research confirm that income, education, government effectiveness, no perceived corruption, and perceived institutional quality improve wellbeing, while lower trust in family and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  45
    Performing the Union: The Prüm Decision and the European dream.Barbara Prainsack & Victor Toom - 2013 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 44 (1):71-79.
    In 2005, seven European countries signed the so-called Prüm Treaty to increase transnational collaboration in combating international crime, terrorism and illegal immigration. Three years later, the Treaty was adopted into EU law. EU member countries were now obliged to have systems in place to allow authorities of other member states access to nationally held data on DNA, fingerprints, and vehicles by August 2011. In this paper, we discuss the conditions of possibility for the Prüm network to emerge, and argue (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 972