Results for 'security guaranty'

990 found
Order:
  1.  22
    Flexicurity Concept and Implementation of Lithuania Opportunities in Employment Policy (article in Lithuanian).Ingrida Mačernytė Panomariovienė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (3):1081-1099.
    Special “flexicurity” (English compound from “flexibility” and “security”) term has been used since the middle of the 1990’s. Most authors think that this phenomenon should be related to the success of Denmark and Netherlands, where after the enactment of appropriate acts (for example, “The Flexibility and Security Act” of the Netherlands and Act on the Distribution of Workers by Agents) and the operation of labor unions, the unemployment level was reduced significantly. However, as T. Wilthagen and F. Tros (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  13
    Istota i dylematy funkcjonowania Bankowego Funduszu Gwarancyjnego w kontekście stabilności systemu bankowego.Iwona Dorota Czechowska - 2012 - Annales. Ethics in Economic Life 15:251-259.
    System guarantying deposits in Poland was created during the economy transformation. Its founding was resulted from a tough situation in the bank sector, that is why it was supposed to be an antidotum to clients' problems connected with solvency of the collapsing banks and also with adjusting to the European community law. The aim of this work is to present The Bank Guarantee Fund, an institution belonging to a network of financial security, which main task is to protect the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  29
    ICT pollution and liability.Christer Magnusson - 2011 - Acm Sigcas Computers and Society 41 (1):48-53.
    To a large extent liability for ICT perils is still a grey area, even though an increasing number of information security researchers adopt economic approaches to highlight market mechanisms and externalities. That is why this article focuses on the need for increased awareness of externalities and liability among ICT professionals and their customers. This is critical to achieve in order to promote appropriate ICT technologies and services with comprehensible privacy and security protection. What is needed is a better (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  4.  46
    Reviewing the Final Function of the Disciplinary Institution of Shurta (Police) during Shiite Buyids Government Dominance on Baghdad.Haitham Shirkosh, Asghar Mahmoudabady & Asghar Forughi - 2013 - Asian Culture and History 5 (2):p66.
    During Abbasid Dynasty, Shurta Institution (Police) was one of the disciplinary and security systems whose duty was establishing order and security as well as fighting against the corrupt people and criminals i.e. Ayyaran. During the third period of Abbasid dynasty, which is known as Buyids era, the institution of Shurta experienced a number of changes in comparison with the first Abbasids periods, some of which were. the direct interference of the governors of buyids in appointing Sahib Al-Shurta (Shurta (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  5. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  6. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  7. (1 other version)Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11 (1):56-76.
    Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable assumptions. In light of persisting reasonable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  53
    Biometric Technology and Ethics: Beyond Security Applications.Andrea North-Samardzic - 2020 - Journal of Business Ethics 167 (3):433-450.
    Biometric technology was once the purview of security, with face recognition and fingerprint scans used for identification and law enforcement. This is no longer the case; biometrics is increasingly used for commercial and civil applications. Due to the widespread diffusion of biometrics, it is important to address the ethical issues inherent to the development and deployment of the technology. This article explores the burgeoning research on biometrics for non-security purposes and the ethical implications for organizations. This will be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9. Matters of Trust as Matters of Attachment Security.Andrew Kirton - 2020 - International Journal of Philosophical Studies 28 (5):583-602.
    I argue for an account of the vulnerability of trust, as a product of our need for secure social attachments to individuals and to a group. This account seeks to explain why it is true that, when we trust or distrust someone, we are susceptible to being betrayed by them, rather than merely disappointed or frustrated in our goals. What we are concerned about in matters of trust is, at the basic level, whether we matter, in a non-instrumental way, to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  10.  29
    Tracking and Targeting: Sociotechnologies of (In)security.Jutta Weber, Karolina Follis & Lucy Suchman - 2017 - Science, Technology, and Human Values 42 (6):983-1002.
    This introduction to the special issue of the same title sets out the context for a critical examination of contemporary developments in sociotechnical systems deployed in the name of security. Our focus is on technologies of tracking, with their claims to enable the identification of those who comprise legitimate targets for the use of violent force. Taking these claims as deeply problematic, we join a growing body of scholarship on the technopolitical logics that underpin an increasingly violent landscape of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  11.  74
    Artificial Intelligence and International Security: The Long View.Amandeep Singh Gill - 2019 - Ethics and International Affairs 33 (2):169-179.
  12. Reasons for action: making a difference to the security of outcomes.Mattias Gunnemyr & Caroline Torpe Touborg - 2022 - Philosophical Studies 180 (1):333-362.
    In this paper, we present a new account of teleological reasons, i.e. reasons to perform a particular action because of the outcomes it promotes. Our account gives the desired verdict in a number of difficult cases, including cases of overdetermination and non-threshold cases like Parfit’s famous _Drops of water._ The key to our account is to look more closely at the metaphysics of causation. According to Touborg (_The dual nature of causation_, 2018), it is a necessary condition for causation that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  18
    Multiple Roles of Grit in the Relationship Between Interpersonal Stress and Psychological Security of College Freshmen.Qingsong Yang, Mengxi Shi, Dandan Tang, Hai Zhu & Ke Xiong - 2022 - Frontiers in Psychology 13.
    Grit, as an important positive psychological quality, has rarely been studied for its role involved in the mechanism between stress and psychological security. This article explores the moderating and mediating role of grit in the relationship between interpersonal stress and psychological security of freshmen through two studies. In study 1, freshmen from several Chinese universities were recruited to complete a battery of questionnaire, including assessments about interpersonal stress, grit, and psychological security. The moderating effect analysis showed that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  15.  45
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  20
    Knowledge and Security.Pierre Le Morvan - 2016 - Philosophy 91 (3):411-430.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Uncertainty, Complexity, and Universal Basic Income: The Robust Implementation of the Right to Social Security.Otto Lehto - forthcoming - In Elena Pribytkova (ed.), In Search for a Social Minimum: Human Dignity, Poverty, and Human Rights. Cham: Springer.
    The complexity approach to political economy suggests that radical uncertainty is a necessary feature of a complex and evolving socioeconomic landscape. Radical uncertainty raises various adaptive challenges that are likely to escalate in the coming decades under the “Fourth Industrial Revolution.” It jeopardizes the wellbeing of ordinary citizens, whose welfare prospects, job opportunities, and income stream are rendered insecure. It also renders precarious the robust implementation of universal human rights, including the right to social security. In fact, it will (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  13
    The Logic of Masculinist Protection: Reflections on the Current Security State.Iris Marion Young - 2005 - In Marilyn Friedman (ed.), Women and Citizenship. New York, US: Oup Usa.
    Young’s essay draws attention to practices of citizenship that can arise under a government at war and explores the logic of the masculine role of protector. A government at war, which Young calls a “security regime,” protects its members in an overly aggressive fashion from external dangers as well as from internal dissension. A state acting as a security regime, however, threatens to undermine democratic practice by expecting uncritical obedience and submissiveness from its population. This role toward its (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  15
    Transformation of cultural values as a threat to cultural security.Nadezhda Nikolaevna Isachenko - forthcoming - Philosophy and Culture (Russian Journal).
    Values formed in culture, reflecting social relations, fulfilling a regulatory role, are defined as norms fixed in the culture of society. Moral norms that combine such properties of morality as normativity, imperativeness and evaluativeness act as significant foundations of culture. Values and norms enshrined in culture contribute to the integration and spiritual development of society The transformational processes taking place in modern society have influence on the value system. The relevance of this study is determined by the dialectic of emerging (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  22
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  65
    Evolutionary Debunking Arguments, Explanationism and Counterexamples to Modal Security.Christopher Noonan - forthcoming - Erkenntnis.
    According to one influential response to evolutionary debunking arguments against moral realism, debunking arguments fail to undermine our moral beliefs because they fail to imply that those beliefs are insensitive or unsafe. The position that information about the explanatory history of our belief must imply that our beliefs are insensitive or unsafe in order to undermine those beliefs has been dubbed “Modal Security”, and I therefore label this style of response to debunking arguments the “modal security response”. An (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  6
    Disturbing the discourse of ‘Victim’ : The effects and challenges of discourses in security, social suffering, and rights. 추지현 & 이현재 - 2021 - Korean Feminist Philosophy 36:61-101.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  13
    The tacit dimension of expertise: Professional vision at work in airport security.Chiara Bassetti - 2021 - Discourse Studies 23 (5):597-615.
    Whereas “professional vision” has been mostly analyzed in apprenticeship and other settings where knowledge is made explicit or reflected upon, I focus on how expertise tacitly plays out in task-oriented interaction among practitioners. The paper considers orientation both to the coworker’s and one’s own expertise in the collaborative accomplishment of airport security work. I show how screeners recruit action from colleagues in largely underspecified ways, based on shared access to the visibility field and expected professional vision. Requesting is tacitly (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  26
    (1 other version)Reparations — Legally Justified and Sine qua non for Global Justice, Peace and Security.Nora Wittmann - 2016 - Global Justice : Theory Practice Rhetoric 9 (2).
    The paper assesses current rising reparations claims for the Maafa/ Maangamizi from two angles. First, it explores the connectivity of reparations and global justice, peace and security. Second, it discusses how the claim is justified in international law. The concept of reparations in international law is also explored, revealing that reparations cannot be limited to financial compensation due to the nature of the damage and international law prescriptions. Comprehensive reparations based in international law require the removal of structures built (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  84
    Fallacies of the public goods theory and the production of security.Hans-Hermann Hoppe - 1989 - Journal of Libertarian Studies 9 (1):27-46.
  26.  10
    Framing Effects on Online Security Behavior.Nuria Rodríguez-Priego, René van Bavel, José Vila & Pam Briggs - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Ireland, Neutrality and European Security Integration. By Roisin Doherty.T. J. White - 2005 - The European Legacy 10 (5):556.
  28. Nozick on security and sustainability.Christopher Winch - 2008 - In Stephen Gough & Andrew Stables (eds.), Sustainability and security within liberal societies: learning to live with the future. New York: Routledge. pp. 70.
  29.  35
    The Global Politics of Health Security before, during, and after COVID-19.Andreas Papamichail - 2021 - Ethics and International Affairs 35 (3):467-481.
    The COVID-19 pandemic has been shaped by preexisting political, social, and economic relations and governance structures, and will remold these structures going forward. This review essay considers three books on global health politics written by Simon Rushton, Clare Wenham, and Jeremy Youde. Here, I explore what these books collectively and individually can tell us about these preexisting dynamics, the events of the first eighteen months of the COVID-19 pandemic, and possible future directions in the politics of global health. I argue (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  46
    Challenges in Implementing the Responsibility to Protect: The Security Council Veto and the Need for a Common Ethical Approach.Brian D. Lepard - 2021 - The Journal of Ethics 25 (2):223-246.
    In 2005 the member states of the United Nations recognized a “responsibility to protect” (“R2P”) victims of mass atrocities such as genocide, war crimes, and crimes against humanity. They acknowledged a special role for the U.N. Security Council in responding to these atrocities, including potentially authorizing military action using its extensive powers under Chapter VII of the U.N. Charter. However, the Council has very rarely been able to agree on appropriate action, and the five permanent Council members (“P5”), most (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  17
    Northern Ireland’s Interregnum. Anna Burns’s Depiction of a (Post)-Troubles State of (In)security.Ryszard Bartnik - 2021 - Text Matters - a Journal of Literature, Theory and Culture 11:64-83.
    This paper aims to present the main contours of Burns’s literary output which, interestingly enough, grows into a personal understanding of the collective mindset of -Troubles Northern Ireland. It is legitimate, I argue, to construe her fiction as a body of work shedding light on certain underlying mechanisms of sectarian violence. Notwithstanding the lapse of time between 1998 and 2020, the Troubles’ toxic legacy has indeed woven an unbroken thread in the social fabric of the region. My reading of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Fundamental Rights in the Eu Area of Freedom, Security and Justice.Sara Iglesias & Maribel González Pascual (eds.) - 2021 - Cambridge University Press.
    The development of the Area of Freedom, Security and Justice has transformed the European Union and placed fundamental rights at the core of EU integration and its principles of mutual recognition and trust. The impact of the AFSJ in the development of an EU standard of fundamental rights, which has come to the fore since the Treaty of Lisbon, is a topic of great theoretical and practical importance. This is the first systematic academic study of the AFSJ and its (...)
    No categories
     
    Export citation  
     
    Bookmark  
  33.  16
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  20
    Harm Reduction Policies Where Drugs Constitute a Security Issue.Monica Andrea Narvaez-Chicaiza - 2020 - Health Care Analysis 28 (4):382-390.
    There is strong evidence suggesting that harm reduction policies are able to reduce the adverse health and social consequences of drug use. However, in this article I will compare two different countries to demonstrate that some social aspects lead to the adoption or rejection of harm reduction policies. In this case, countries where drugs are seen as a security concern are less likely to adopt these harm reduction policies. For that purpose, I will compare Colombia and Uruguay’s political, normative, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  11
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber (...) Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  24
    When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?Awais Rashid, Sveta Milyaeva & Ola Michalec - 2022 - Big Data and Society 9 (1).
    Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption of big data technologies in critical infrastructures shapes understandings of risk management, we focus (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  19
    Technology: COVID-19 and the ‘New-Normal’ Lifestyle vs. Security Challenges.Visar Shehu & Adrian Besimi - 2020 - Seeu Review 15 (1):71-85.
    In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new technologies. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  18
    Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties.Rebecca Slayton - 2021 - Science, Technology, and Human Values 46 (1):81-111.
    Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter, anything? Why have information technologies proven difficult to govern? And what assurances can governance provide for the billions of people who rely on information technologies every day? Drawing together several distinct bodies of literature—including multiple strands of governance theory, actor–network theory, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  23
    9/11 and the Rise of Global Anti-Terrorism Law: How the Un Security Council Rules the World.Arianna Vedaschi & Kim Lane Scheppele (eds.) - 2021 - Cambridge University Press.
    Twenty years after the outbreak of the threat posed by international jihadist terrorism, which triggered the need for democracies to balance fundamental rights and security needs, 9/11 and the Rise of Global Anti-Terrorism Law offers an overview of counter-terrorism and of the interplay among the main actors involved in the field since 2001. This book aims to give a picture of the complex and evolving interaction between the international, regional and domestic levels in framing counter-terrorism law and policies. Targeting (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  10
    How Does Social Insurance Affect the Social Interactions of Rural Residents in China: Study on the Impact of Rural Formal Social Security System on Informal Social Security Mechanism.Ming Zhang, Lan Yuan, Zhanlian Ke, Juanfeng Jian, Hong Tan & Gangwu Lv - 2022 - Frontiers in Psychology 13.
    With the increasing mobility of the rural population in China and the growing number of residents moving to the cities for work or study, rural society is forming a pluralistic, interest-centered, “open” social networks relations that follows the modern rule of law contract. Based on Chinese General Social Survey data, the results of the empirical study finds that social insurance can significantly enhance the social interactions of rural residents in China, that is, formal social security system in rural areas (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  24
    The Ethics of Neuroscience and National Security.Nicholas Evans - 2021 - Routledge.
    New advances in neuroscience promise innovations in national security, especially in the areas of law enforcement, intelligence collection, and armed conflict. But ethical questions emerge about how we can, and should, use these innovations. This book draws on the open literature to map the development of neuroscience, particularly through funding by the Defense Advanced Research Projects Agency, in certain areas like behavior prediction, behavior modification, and neuroenhancement, and its use in the creation of novel weapons. It shows how advances (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Risking Our Security, or Securing Our Risk?: Neoimperialists Play With A Stacked Deck.Leigh M. Johnson - 2005 - Contretemps 4 (1):45-57.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  57
    Bourdieu, International Relations, and European security.Trine Villumsen Berling - 2012 - Theory and Society 41 (5):451-478.
    This article takes the failure to grasp fully the paradigmatic case of European security after the Cold War as an example of how International Relations (IR) would benefit from reformulating not only its empirical research questions but also several of its central conceptual building blocks with the aid of Bourdieusian sociology. The separation between theory and practice and the overemphasis on military power and state actors blind IR from seeing the power struggles that reshaped European security. Instead, a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  30
    An Improved Clustering Method for Detection System of Public Security Events Based on Genetic Algorithm and Semisupervised Learning.Heng Wang, Zhenzhen Zhao, Zhiwei Guo, Zhenfeng Wang & Guangyin Xu - 2017 - Complexity:1-10.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  22
    Biometrics: Enhancing Security or Invading Privacy? Executive Summary.Irish Council for Bioethics - 2010 - Jahrbuch für Wissenschaft Und Ethik 15 (1):383-390.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  81
    The Principled Case for Employing Private Military and Security Companies in Interventions for Human Rights Purposes.Deane-Peter Baker & James Pattison - 2011 - Journal of Applied Philosophy 29 (1):1-18.
    The possibility of using private military and security companies to bolster the capacity to undertake intervention for human rights purposes has been increasingly debated. The focus of such discussions has, however, largely been on practical issues and the contingent problems posed by private force. By contrast, this article considers the principled case for privatising humanitarian intervention. It focuses on two central issues. First, does outsourcing humanitarian intervention to private military and security companies pose some fundamental, deeper problems in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  67
    Epicurus, determinism and the security of knowledge.Kevin Magill - 1992 - Theoria 58 (2-3):183-196.
    The article criticises various interpretations of Epicurus's claim that belief in determinism is self-invalidating: -/- - 'The man who says that all things come to pass by necessity cannot criticise one who denies that all things come to pass by necessity, for he admits that this too happens of necessity.' - -/- especially Ted Honderich's argument that the real force of the Epicurean claim is that if belief acquisition is causally necessitated, we will be excluded from possible facts and inquiries (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  23
    A Foucauldian analysis of “A Neuroskeptic's Guide to Neuroethics and National Security”.Kyle Thomsen - 2010 - American Journal of Bioethics Neuroscience 1 (2):29-30.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  36
    Export Controls and the Tensions Between Academic Freedom and National Security.Samuel A. W. Evans & Walter D. Valdivia - 2012 - Minerva 50 (2):169-190.
    In the U.S.A., advocates of academic freedom—the ability to pursue research unencumbered by government controls—have long found sparring partners in government officials who regulate technology trade. From concern over classified research in the 1950s, to the expansion of export controls to cover trade in information in the 1970s, to current debates over emerging technologies and global innovation, the academic community and the government have each sought opportunities to demarcate the sphere of their respective authority and autonomy and assert themselves in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 990