Results for 'aviation security'

989 found
Order:
  1.  19
    Aviation Security and the TSA's Behavior Detection: Why Effective Academic and Practitioner Dialogue Is Vital.Vincent Denault & Louise M. Jupe - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  11
    The Uncertainty of Aviation Safety and Aviation Security in Relation to Human Rights: Philosophical Aspects of Legal Definitions.Saulius Stonkus - 2024 - Filosofija. Sociologija 35 (2 Special).
    The article discusses the uncertainty of legal definitions of aviation safety and and aviation security, the implementation of which often result in certain restrictions of human rights. In the article, a hypothesis is made that, despite usually treated as well-known concepts, safety and security are not so clear and well-defined, often leaving the reader to guess at their precise meaning. The aim of this article is to identify the core features that characterise aviation safety and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  24
    You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners – Reduced Performance Level in Aviation Security with No Gender Effect.Jenny K. Krüger & Boris Suchan - 2016 - Frontiers in Psychology 7.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  25
    WNN-Based Prediction of Security Situation Awareness for the Civil Aviation Network.Zhijun Wu, Shaopu Ma & Lan Ma - 2015 - Journal of Intelligent Systems 24 (1):55-67.
    The security of the civil aviation network is closely related to flight safety. Security situation prediction is the advanced stage of situational awareness in the civil aviation network. In this article, a prediction approach of security situations for the air traffic management network is proposed on the basis of the wavelet neural network. The proposed approach adopts the wavelet theory and neural network, combining a time-series forecasting method for the prediction of security situations in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  15
    Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation.Iztok Prezelj - 2015 - International Studies. Interdisciplinary Political and Cultural Journal 17 (1):145-158.
    Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation. The paper’s results show (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  42
    Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model.Sophie Baeriswyl, Andreas Krause & Adrian Schwaninger - 2016 - Frontiers in Psychology 7:191272.
    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  8.  70
    A Preliminary Study Exploring the Value Changes Taking Place in the United States since the September 11, 2001 Terrorist Attack on the World Trade Center in New York. [REVIEW]Edward F. Murphy Jr, John D. Gordon & Aleta Mullen - 2004 - Journal of Business Ethics 50 (1):81 - 96.
    This study was a preliminary exploration of the value changes taking place in the United States since the September 11, 2001 terrorist attack on the World Trade Center in New York, which was a significant emotional event or cultural upheaval. Rokeach told us that "a person's total value system may undergo change as a result of socialization, therapy, or cultural upheaval..." (Rokeach, The Nature of Human Values, 1973, p. 37). The researchers explored the value changes of 500 aviation industry (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9.  46
    Allan A. Needell. Science, Cold War, and the American State: Lloyd V. Berkner and the Balance of Professional Ideals. xii + 404 pp., illus., bibl., index. Amsterdam: Harwood Academic Publishers, 2000. $60, £40 : $28, £19. [REVIEW]Zuoyue Wang - 2002 - Isis 93 (2):343-345.
    Lloyd Berkner , radio engineer and ionospheric physicist, was among a small circle of power brokers who helped bring American science and the American state closer together during World War II and the early years of the Cold War. In this exemplary biographical study, Allan Needell, a historian at the Smithsonian Institution's National Air and Space Museum, gives a well‐documented account of Berkner's life and career and a nuanced examination of how American scientists and engineers defined and balanced the interests (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  11. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  12. Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3):264-276.
    The U.S. military is developing augmented reality (AR) capabilities for use on the battlefield as a means of achieving greater situational awareness. The superimposition of digital data—designed to expand surveillance, enhance geospatial understanding, and facilitate target identification—onto a live view of the battlefield has important implications for virtuous conduct in war: Can the soldier exercise practical wisdom while integrated into a system of militarized legibility? Adopting a virtue ethics perspective, I argue that AR disrupts the soldier’s immersion in the scene (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13. Who is targeted by the council's sanctions? The UN Security Council and the principle of proportionality.Daniëlla Dam-de Jong - 2021 - In Ulf Linderfalk & Eduardo Gill-Pedro (eds.), Revisiting proportionality in international and European law: interests and interest- holders. Leiden, The Netherlands: Koninklijke Brill NV.
     
    Export citation  
     
    Bookmark  
  14. Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR, vol. 1304.Neil Otte, Brian Donohue & Barry Smith (eds.) - 2014 - CEUR.
    No categories
     
    Export citation  
     
    Bookmark  
  15.  36
    Rethinking the Alternatives: Food Sovereignty as a Prerequisite for Sustainable Food Security.Ronald Byaruhanga & Ellinor Isgren - 2023 - Food Ethics 8 (2):1-20.
    The concept of food sovereignty is primarily taken as an alternative to the prevailing neoliberal food security model. However, the approach has hitherto not received adequate attention from policy makers. This could be because the discourse is marked by controversies and contradictions, particularly regarding its ability to address the challenges of feeding a rapidly growing global population. In response to these criticisms, this paper argues that the principles of food sovereignty, such as democratic and transparent food systems, agroecology, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  35
    ‘Rescaling’ alternative food systems: from food security to food sovereignty.Navé Wald & Douglas P. Hill - 2016 - Agriculture and Human Values 33 (1):203-213.
    In this paper, we critically interrogate the benefits of an interdisciplinary and theoretically diverse dialogue between ‘local food’ and ‘alternative food networks’ and outline how this dialogue might be enriched by a closer engagement with discourses of food sovereignty and the politics of scale. In arguing for a shift towards a greater emphasis on food sovereignty, we contend that contemporary discourses of food security are inadequate for the ongoing task of ensuring a just and sustainable economy of food. Further, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  17.  93
    The Moral and Political Philosophy of Immigration: Liberty, Security, and Equality.José Jorge Mendoza - 2016 - Lexington Books.
    José Jorge Mendoza argues that the difficulty with resolving the issue of immigration is primarily a conflict over competing moral and political principles and is, at its core, a problem of philosophy. This book brings into dialogue various contemporary philosophical texts that deal with immigration to provide some normative guidance to immigration policy and reform.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  18. Reasons for action: making a difference to the security of outcomes.Mattias Gunnemyr & Caroline Torpe Touborg - 2022 - Philosophical Studies 180 (1):333-362.
    In this paper, we present a new account of teleological reasons, i.e. reasons to perform a particular action because of the outcomes it promotes. Our account gives the desired verdict in a number of difficult cases, including cases of overdetermination and non-threshold cases like Parfit’s famous _Drops of water._ The key to our account is to look more closely at the metaphysics of causation. According to Touborg (_The dual nature of causation_, 2018), it is a necessary condition for causation that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Secrecy beyond the state: governmentality, security and truth effects.Susanne Krasmann - 2023 - In William Walters & Martina Tazzioli (eds.), Handbook on governmentality. Northampton, MA: Edward Elgar Publishing.
     
    Export citation  
     
    Bookmark  
  20.  17
    Scientific and Technical Information, National Security, and the First Amendment: A Jurisprudential Inquiry.Robert F. Ladenson - 1987 - Public Affairs Quarterly 1 (2):1-20.
  21. Hunches in Bunches: Intelligence and National Security Decision-Making.Genevieve Lester, John Nagl & Montgomery McFate - 2024 - In Montgomery McFate (ed.), Dr. Seuss and the art of war: secret military lessons. Lanham: Rowman & Littlefield.
     
    Export citation  
     
    Bookmark  
  22.  17
    Aviation infrastructures in the Republic of China, 1920–37.Mary Augusta Brazelton - 2023 - History of Science 61 (1):102-120.
    This essay investigates technical aspects of the history of aviation in the Republic of China, focusing on the period between 1920 and 1937. It suggests that Chinese authors and administrators came to see the establishment of technical infrastructure as dependent on the education of personnel who could assume responsibility for maintaining and expanding Chinese aviation ventures, rather than on specific technologies or practices. Magazines and journals in the 1920s reflected concerns with the establishment of weather observation and reporting, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  18
    Multiple Roles of Grit in the Relationship Between Interpersonal Stress and Psychological Security of College Freshmen.Qingsong Yang, Mengxi Shi, Dandan Tang, Hai Zhu & Ke Xiong - 2022 - Frontiers in Psychology 13.
    Grit, as an important positive psychological quality, has rarely been studied for its role involved in the mechanism between stress and psychological security. This article explores the moderating and mediating role of grit in the relationship between interpersonal stress and psychological security of freshmen through two studies. In study 1, freshmen from several Chinese universities were recruited to complete a battery of questionnaire, including assessments about interpersonal stress, grit, and psychological security. The moderating effect analysis showed that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  13
    Business Entities and the State Who Should Provide Security from Crime?Don E. Scheid - 1997 - Public Affairs Quarterly 11 (2):163-182.
  25.  22
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Moral economy and knowledge production in a security bureaucracy: the case of the German officer for the protection of the constitution.Werner Schiffauer - 2020 - In Julia M. Eckert (ed.), The bureaucratic production of difference: ethos and ethics in migration administrations. Bielefeld: Transcript.
    No categories
     
    Export citation  
     
    Bookmark  
  27.  23
    The abandonment of Australians in India: an analysis of the right of entry as a security right in the age of COVID-19.Diego S. Silva - 2022 - Monash Bioethics Review 40 (1):94-109.
    In May 2021, when the Delta variant of SARS-CoV2 was wreaking havoc in India, the Australian Federal Government banned its citizens and residents who were there from coming back to Australia for 14 days on penalty of fines or imprisonment. These measures were justified on the grounds of protecting the broader Australian public from potentially importing the Delta strain, which officials feared would then seed a local outbreak. Those Australians stranded in India, and their families and communities back home, claimed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  2
    Unpacking “the surprise chain”: the governance of food security during the COVID-19 pandemic in Melbourne, Australia.Rachel Carey & Maureen Murphy - forthcoming - Agriculture and Human Values:1-14.
    Food systems are being affected by multiple shocks related to climate change, the COVID-19 pandemic and geopolitical events. Food prices and food insecurity are rising globally as a result, raising questions about the effective governance of food security during shocks. This paper critically examines the governance of food security in Melbourne, Australia during a major food system shock, the COVID-19 pandemic. It draws on document analysis and 34 stakeholder interviews with 41 participants from government, industry and civil society (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. (1 other version)Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11 (1):56-76.
    Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable assumptions. In light of persisting reasonable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  37
    U.S. Responses To Japanese Wartime Inhuman Experimentation After World War Ii: National Security and Wartime Exigency.Howard Brody, Sarah E. Leonard, Jing-bao Nie & Paul Weindling - 2014 - Cambridge Quarterly of Healthcare Ethics 23 (2):220-230.
    In 1945–46, representatives of the U.S. government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the United States, influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the United States played an equally key role in concealing information about (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  31.  88
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  60
    Precommitment Regimes for Intervention: Supplementing the Security Council.Allen Buchanan & Robert O. Keohane - 2011 - Ethics and International Affairs 25 (1):41-63.
    As global governance institutions proliferate and become more powerful, their legitimacy is subject to ever sharper scrutiny. Yet what legitimacy means in this context and how it is to be ascertained are often unclear. In a previous paper in this journal, we offered a general account of the legitimacy of such institutions and a set of standards for determining when they are legitimate. In this paper we focus on the legitimacy of the UN Security Council as an institution for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  33.  5
    Digital technology and on-farm responses to climate shocks: exploring the relations between producer agency and the security of food production.Carol Richards, Rudolf Messner & Vaughan Higgins - forthcoming - Agriculture and Human Values:1-15.
    Recent research into climate shocks and what this means for the on-farm production of food revealed mixed and unanticipated results. Whilst the research was triggered by a series of catastrophic, climate related disruptions, Australian beef producers interviewed for the study downplayed the immediate and direct impacts of climate shocks. When considering the changing nature of production under shifting climatic conditions, producers offered a commentary on the digital technology and data which interconnected with climate solutions deriving from both on and off (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  21
    Farm-level pathways to food security: beyond missing markets and irrational peasants.Sidney Madsen - 2021 - Agriculture and Human Values 39 (1):135-150.
    Development projects in Sub-Saharan Africa propose to alleviate hunger in rural areas by introducing new agricultural practices and technologies, yet there is limited empirical evidence of how an agricultural intervention can lead farming households to transition to food security. Research on food security pathways considers agricultural interventions that increase farmers’ income to be particularly effective for reducing food insecurity. Consistent with this stance, Malawian agricultural policy aims to address hunger by encouraging smallholder farmers to intensify and commercialize maize (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  17
    Rethinking the Logic of Security: Liberal Realism and the Recovery of American Political Thought.V. S. Tjalve & M. C. Williams - 2015 - Telos: Critical Theory of the Contemporary 2015 (170):46-66.
  36. A survey on the economical-social effective factors of peace of mind and social security on female postgraduate students majoring in demography in tehran city.Ebadati Nazarlou Somayeh Kamran Feridoun - 2010 - Social Research (Islamic Azad University Roudehen Branch) 3 (6):43-56.
  37. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 4252--709.
  38.  14
    Morals, Materials, and Technoscience: The Energy Security Imaginary in the United States.Jessica M. Smith & Abraham S. D. Tidwell - 2015 - Science, Technology, and Human Values 40 (5):687-711.
    This article advances recent scholarship on energy security by arguing that the concept is best understood as a sociotechnical imaginary, a collective vision for a “good society” realized through technoscientific-oriented policies. Focusing on the 1952 Resources for Freedom report, the authors trace the genealogy of energy security, elucidating how it establishes a morality of efficiency that orients policy action under the guise of security toward the liberalizing of markets in resource states and a robust program of energy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  24
    The Ethics of Neuroscience and National Security.Nicholas Evans - 2021 - Routledge.
    New advances in neuroscience promise innovations in national security, especially in the areas of law enforcement, intelligence collection, and armed conflict. But ethical questions emerge about how we can, and should, use these innovations. This book draws on the open literature to map the development of neuroscience, particularly through funding by the Defense Advanced Research Projects Agency, in certain areas like behavior prediction, behavior modification, and neuroenhancement, and its use in the creation of novel weapons. It shows how advances (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40. The Case for Basic Income: Freedom, Security, Justice.Jamie Swift & Elaine Power - unknown
     
    Export citation  
     
    Bookmark   1 citation  
  41.  52
    Are maternal reflective functioning and attachment security associated with preadolescent mentalization?Anna Maria Rosso, Paola Viterbori & Alda M. Scopesi - 2015 - Frontiers in Psychology 6:149441.
    This study investigated the impact of maternal reflective functioning (RF) and attachment security on children’s mentalization. The Adult Attachment Interview (AAI) was administered to mothers in a sample of 41 mother–preadolescent dyads. AAI transcripts were rated in terms of the Berkeley AAI System ( Main and Goldwyn, 1998 ) and the Reflective Functioning Scale (RFS; Fonagy et al., 1998 ). Preadolescent mentalization was assessed using a semi-structured interview adapted from O’Connor and Hirsch (1999) and also by analyzing mental-state talk (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  42.  39
    Assessing National Public Health Law to Prevent Infectious Disease Outbreaks: Immunization Law as a Basis for Global Health Security.Tsion Berhane Ghedamu & Benjamin Mason Meier - 2019 - Journal of Law, Medicine and Ethics 47 (3):412-426.
    Immunization plays a crucial role in global health security, preventing public health emergencies of international concern and protecting individuals from infectious disease outbreaks, yet these critical public health benefits are dependent on immunization law. Where public health law has become central to preventing, detecting, and responding to infectious disease, public health law reform is seen as necessary to implement the Global Health Security Agenda. This article examines national immunization laws as a basis to implement the GHSA and promote (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  50
    Military, arms control, and security aspects of nanotechnology.Jürgen Altmann & Mark A. Gubrud - 2004 - In Baird D. (ed.), Discovering the Nanoscale. IOS. pp. 269--277.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44. The role of global studies in the development of a sustainable security system.Ilya V. Ilyin & Kristina S. Leonova - 2022 - In Alexander N. Chumakov, Alyssa DeBlasio & Ilya V. Ilyin (eds.), Philosophical Aspects of Globalization: A Multidisciplinary Inquiry. Boston: BRILL.
     
    Export citation  
     
    Bookmark  
  45. The False Promise of Collective Security Through Preventive War.Neta C. Crawford - 2007 - In Henry Shue & David Rodin (eds.), Preemption: Military Action and Moral Justification. Oxford University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  46.  37
    Export Controls and the Tensions Between Academic Freedom and National Security.Samuel A. W. Evans & Walter D. Valdivia - 2012 - Minerva 50 (2):169-190.
    In the U.S.A., advocates of academic freedom—the ability to pursue research unencumbered by government controls—have long found sparring partners in government officials who regulate technology trade. From concern over classified research in the 1950s, to the expansion of export controls to cover trade in information in the 1970s, to current debates over emerging technologies and global innovation, the academic community and the government have each sought opportunities to demarcate the sphere of their respective authority and autonomy and assert themselves in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  10
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental data (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  30
    Rethinking the Just Intelligence Theory of National Security Intelligence Collection and Analysis: The Principles of Discrimination, Necessity, Proportionality and Reciprocity.Seumas Miller - 2021 - Social Epistemology 35 (3):211-231.
    In this article, it is argued that the constitutive principles of Just War Theory and the jus ad bellum/jus in bello duality do not transfer all that well to national security intelligence activity...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  32
    The Visiocracy of the Social Security Mobile App in Australia.Lyndal Sleep & Kieran Tranter - 2017 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 30 (3):495-514.
    This paper examines the forms of life established through the visual governance of the Australian social security mobile app —the Express Plus Centrelink app. It is argued that the app exceeds established accounts of juridical and administrative power. The app involves a seeing that is not public, a responding that is not writing and a de-materialisation of an institution and its disciplinary apparatus. It is argued that the app creates proto-literate subjects that are required to respond to a real-time (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  57
    Bourdieu, International Relations, and European security.Trine Villumsen Berling - 2012 - Theory and Society 41 (5):451-478.
    This article takes the failure to grasp fully the paradigmatic case of European security after the Cold War as an example of how International Relations (IR) would benefit from reformulating not only its empirical research questions but also several of its central conceptual building blocks with the aid of Bourdieusian sociology. The separation between theory and practice and the overemphasis on military power and state actors blind IR from seeing the power struggles that reshaped European security. Instead, a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 989