Results for ' secure and safe society'

974 found
Order:
  1.  67
    Society under threat… but not from AI.Ajit Narayanan - 2013 - AI and Society 28 (1):87-94.
    25 years ago, when AI & Society was launched, the emphasis was, and still is, on dehumanisation and the effects of technology on human life, including reliance on technology. What we forgot to take into account was another very great danger to humans. The pervasiveness of computer technology, without appropriate security safeguards, dehumanises us by allowing criminals to steal not just our money but also our confidential and private data at will. Also, denial-of-service attacks prevent us from accessing the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  27
    Management of Economic Security in the High-Tech Sector in the Context of Post-Pandemic Modernization.Andriy Shtangret, Nataliia Korogod, Sofia Bilous, Nataliia Hoi & Yurii Ratushniak - 2021 - Postmodern Openings 12 (2).
    The accelerated rates of scientific and technological progress and the intellectualization of the main factors of production play a leading role in ensuring the economic recovery of national economies, in particular in the conditions of the existence of today's post-pandemic consequences. The technological development of the leading countries of economic development poses difficult tasks for other participants in the world economic space to avoid a significant lag, especially in today's post-pandemic society. For the countries of Eastern Europe, this task (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  36
    Intensification of Management of Economic Security of the Enterprise in the Post-Pandemic Space.Oleksandr Sylkin, Iryna Bosak, Viktoriia Homolska, Ihor Okhrimenko & Roman Andrushkiv - 2021 - Postmodern Openings 12 (1Sup1):302-312.
    Intensification of entrepreneurial activity in a post-pandemic space requires improved management both at the level of economic security and at the level of the entire enterprise. The expediency of the transition from the extensive type of development of the load management system is substantiated. The scientific approaches to the interpretation of the terms "intensification", "management" and "economic behaviour" are generalized. The attention is focused on the need to create a safe development environment for each enterprise. The expediency of interpreting (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  52
    Japanese risk society: trying to create complete security and safety using information and communication technology.Kiyoshi Murata & Yohko Orito - 2010 - Acm Sigcas Computers and Society 40 (3):38-49.
    The construction of a secure and safe society using information and communication technology is recognised as an urgent issue in Japan. This recognition is based on public fear about crime related to manufactured risk caused by modernisation or industrial civilisation. This fear has created a social atmosphere that has led to the rapid development and implementation of security systems using ICT, such as security cameras, smart IC cards and mobile phones, to establish security and safety in Japanese (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as morally important—for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  6.  15
    Societal Security Trust Issues in Australia during the COVID-19 Pandemic in 2020.Jowita Brudnicka-Żółtaniecka - 2022 - International Studies. Interdisciplinary Political and Cultural Journal 26 (2):69-85.
    In late December 2019 and early January 2020 the first cases of a new coronavirus occurred in Wuhan. It is a virus characterised by similarities to SARS and MERS. On January 25, 2020 the initial case of infection by SARS-CoV-2 caused the disease COVID-19 in an Australian patient who later died from it. During my PhD thesis defence in September 2018 I would not have thought that one of the possible security scenarios which I designed for the South Pacific region, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  43
    Legal Security from the Point of View of the Philosophy of Law.Gregorio Peces-Barba Martínez - 1995 - Ratio Juris 8 (2):127-141.
    . The author analyses the concept of legal security from its historical evolution to its main structural aspects. In the first part he argues that legal security is a historical and cultural concept of the modern world. He considers a series of factors which lead from the general concept of security generated by an ideological monism and the social rigidity characterizing the Middle Ages to the concept of legal security protected by the legal monism of the modern state, where legal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  22
    Vertical Security in the Megacity.Peter Adey - 2010 - Theory, Culture and Society 27 (6):51-67.
    By excavating the ambiguities of the helicopter’s machinic-prosthetic view, a perspective which may be distant and abstract, while also near and viscerally present, this article will explore how megacity security is increasingly waged and consumed. The article argues that megacity security marches to the rotator-beat of the police helicopter, fuelled by military technophilia and in a context of the biopolitical desertion of the megacities’ most vulnerable. The article takes three aspects, visually expressed and constituted through aerial-helicopter security. Drawing from several (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  39
    Computer security for the people.Jay Bloombecker - 1985 - Acm Sigcas Computers and Society 14 (1, 2, 3, 4):12-15.
  10. Bang Bang - A Response to Vincent W.J. Van Gerven Oei.Jeremy Fernando - 2011 - Continent 1 (3):224-228.
    On 22 July, 2011, we were confronted with the horror of the actions of Anders Behring Breivik. The instant reaction, as we have seen with similar incidents in the past—such as the Oklahoma City bombings—was to attempt to explain the incident. Whether the reasons given were true or not were irrelevant: the fact that there was a reason was better than if there were none. We should not dismiss those that continue to cling on to the initial claims of a (...)
     
    Export citation  
     
    Bookmark  
  11.  36
    Securing the Ties That Bind: A Response to Commentators.Thomas Donaldson & Thomas W. Dunfee - 2000 - Business and Society Review 105 (4):480-492.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  12.  34
    “Securing the Rational Foundations of Human Living:”The Pedagogical Nature of Human Law in St. Thomas Aquinas.Brian Jones - 2015 - New Blackfriars 96 (1065):602-620.
    Every form of government, whether by its action or inaction, encourages certain forms of behavior and discourages others. The moral well being of a society necessitates its consideration of civil law's legitimate role in shaping moral character. In this paper, I will attepmt to argue that the Thomistic account of civil law is not merely negative, but entails a positive pedagogy that seeks to nurture the moral virtue of its citizens, for both the viciously inclined and those who are (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  75
    Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI security practices attempt to fill (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart, François Ewald & Alessandro Fontana.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   95 citations  
  15.  1
    Humanitarian security as an educational project.Vitalii Mudrakov, Nataliia Liutko & Olena Hapchenko - 2025 - Filosofiya osvity Philosophy of Education 30 (2):56-70.
    The article is devoted to the disclosure of the concept of “humanitarian secu­rity” in its educational perspective as an educational project. The authors state the need to protect against hybrid Russian aggression by means of the humani­tarian sphere, emphasizing the humanitarian nature of hybrid Russian aggres­sion. Based on the peculiarities of understanding and defining the humanitar­ian sphere in Ukraine, education is defined as a key aspect of this security. The authors point out the need for and consider the possibility of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Liberalism, sustainability, security, learning : framing the issues.Stephen Gough & Andrew Stables - 2008 - In Stephen Gough & Andrew Stables, Sustainability and security within liberal societies: learning to live with the future. New York: Routledge. pp. 127.
     
    Export citation  
     
    Bookmark  
  17.  45
    Tratamiento Fiscal del Fondo de Previsión Social de la Sociedad Cooperativa Prestadora de Servicios de Personal (Outsourcing)(Taxation of Social Security Fund for the Cooperative Society Personal Service Lender).Miguel Eduardo Ramírez Castillo - 2012 - Daena 7 (2):10-23.
    Resumen. A la Sociedad Cooperativa, se le distingue por ser una sociedad mercantil con ciertas particularidades a diferencia de los demás tipos de sociedades, tan es así que se rige por su legislación especial. En los últimos años en México, se ha detectado un incremento de sociedades cooperativas dedicadas al suministro de personal, toda vez que el esquema fue considerado por algunos especialistas fiscales como una alternativa para las empresas que buscan disminuir sus cargas impositivas derivadas de las relaciones laborales. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  20
    A strategic vision of pakistan’s internal security dynamics.Ayaz Ahmed Khan - 2019 - Journal of Social Sciences and Humanities 58 (2):121-136.
    Present era can be categorized due to its speed of changes. Pakistani society got affected by worst kind of terrorism and extremism in last fifteen years. The root causes of prevailing security environment in Pakistan are multifaceted, complex and are derived from structural, as well as micro-level conditions. Objective of this research is to highlight the gaps in security doctrine of Pakistan. Both qualitative and quantitative methodology in the format of Knowledge Attitude and Practice is selected. Primary question of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  22
    The Security Council's Role in Fulfilling the Responsibility to Protect.Jennifer M. Welsh - 2021 - Ethics and International Affairs 35 (2):227-243.
    The principle of the responsibility to protect (RtoP) conceives of a broad set of measures that can be employed in preventing and responding to atrocity crimes. Nevertheless, the UN Security Council remains an important part of the implementation architecture, given what the International Commission on Intervention and State Sovereignty referred to as its authoritative position in international society as the “linchpin of order and stability.” As part of the roundtable “The Responsibility to Protect in a Changing World Order: Twenty (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  22
    Securities fraud in the international arena: Unilateral vs. multilateral enforcement of insider trading sanctions.Kurt Stanberry, Barbara Crutchfield George & Maria Ross - 1991 - Business and Society 30 (1):27-36.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  59
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual Organizations. The (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  22.  43
    Ethics education in prison: a pilot study on an ethics programme for offenders.Fikile M. Mnisi - 2019 - International Journal of Ethics Education 5 (1):83-96.
    Education is a fundamental process of human life with ethics having an important place in all areas of our life. It is thus important to incorporate ethics into education as a subject. Reports have indicated in how “teaching philosophy can enhance people’s capacity for critical thinking, encourage critical engagements with ideas of self, and improve interpersonal skills, with these being important transferable skills that could help prisoners to prosper once released”. This is in line with the South African prison system’s (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Feminist reactions to the contemporary security regime.Iris Marion Young - 2003 - Hypatia 18 (1):223 - 231.
    : The essay theorizes the logic of masculinist protection as an apparently benign form of male domination. It then argues that authoritarian government is often justified through a logic of masculinist protection, and that this is the form of justification for the security regime that has emerged in the United States since September 11, 2001. I argue that those who live under a security regime live within an oppressive protection racket. The paper ends by cautioning feminists not ourselves to adopt (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24.  53
    Security a la Mexicana: on the particularities of security governance in México’s War on Crime. [REVIEW]Keith Guzik - 2013 - Theory and Society 42 (2):161-187.
    Social scientists from different fields have identified security as a future-oriented mode of governance designed to preserve the social order from diverse types of global risk through international cooperation, militarization and privatization of the state security apparatus, surveillance technologies, community policing, and stigmatization of identities and behaviors deemed dangerous. This literature has largely been limited to English-speaking countries in the Global North, however, that are relatively “secure.”. To understand how security operates in a different context, this article focuses on (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  34
    Sustainable Institutions: How to Secure Values.Frank Hindriks - 2024 - The Journal of Ethics 28 (2):287-308.
    Social sustainability plays a prominent role in the United Nation’s Sustainable Development Goals, but a proper analysis of the concept is still lacking. According to a widespread conception, a system is sustainable when it is preserved or developed in a robust manner. I argue, however, that social sustainability is best understood in explicitly normative terms. Formulating suitable development goals requires a conception of the kind of society that is worth sustaining. I propose that, for a system to be socially (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The Impact of Social Security on the Security Policy of the Republic of North Macedonia.Marjan Gjurovski & Sibela Alimovska - 2023 - Religious dialogue and cooperation 4 (4):85-100.
    The concept of national security belongs to the so-called old, traditional approachesto security. Its focus is on the survival of the sovereign state, which is its territorialintegrity and political independence (sovereignty) protected by diplomatic, intelligenceand military capacities, which is ability to repel military aggression or respond successfully.It is therefore justifiably called the concept of state security. In the real socialist countries,state security meant the state of protection of the state from political crime, as wellas the security of the (socialist, communist) (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  17
    Security and Society: Reflections on Law, Order and Politics.R. N. Berki - 1986
    Direct download  
     
    Export citation  
     
    Bookmark  
  28. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an era of perpetual (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  10
    Book Reviews : Alternative Security: Living Without Nuclear Deterrence, Burns H. Weston, ed. 1990. Westview Press, Boulder, CO. ISBN: 0-8133-0629-9. $42.00 (hc. [REVIEW]Andrew Murray - 1991 - Bulletin of Science, Technology and Society 11 (1):32-33.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  27
    Communication Opportunities of Civil Society Institutions in Countering the Challenges of Post-Pandemic Postmodernity.Vasyl Marchuk, Liudmyla Pavlova, Hanna Ahafonova, Sergiy Vonsovych & Anna Simonian - 2021 - Postmodern Openings 12 (1Sup1):335-345.
    The modern world space, which is affected by the post-pandemic consequences, is noted by the globalization of society, the increasing role of citizenship in making important state and international decisions has become possible in the context of the information revolution and has its own characteristics of communication in information and communication networks. The importance and need for a thorough study of the chosen topic is that the widespread use of various forms and methods of civil communication, free access of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  17
    Chapter 9. Information Security in the Structure of the Security Complex.Сергій СТАВЧЕНКО - 2024 - Epistemological studies in Philosophy, Social and Political Sciences 1 (1):259-280.
    The essence of the security complex is revealed. Approaches to understanding the essence of information security are determined, in particular, as a state of security, as a type of public information legal relations, the direction of information relations within the limits of information legislation, the state of information (information environment of society, information development). The informational component of national security is considered. The institutional landscape of information security is described, which includes supranational international bodies and institutions and transnational corporations, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  24
    The Phenomenon of Security Within the Socio-Psychological Knowledge in the Era of Postmodernism.Olha Lazorko, Hryhorii Dzhahupov, Rafal Abramciow, Svitlana Symonenko, Olena Hrek & Tetiana Kostieva - 2022 - Postmodern Openings 13 (3):180-200.
    The relevance of the study of the socio-psychological phenomenon of personal security in the era of post-modernism is due to the real problems of today's society, which at the present stage of state development are characterized by acute interrelationships between the requirements of social security as a factor of socio-political and national security and the real state of mental existence. associated with indicators of social well-being of the individual. The aim of the article is to prove that the concept (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  21
    GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli, Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based provenance, quantum-resistant algorithms, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  26
    The Phenomenon of National Security within Postmodern Cultures: Interests, Values, Mentality.Leonid Kryvyzyuk, Bohdan Levyk, Svitlana Khrypko & Alla Ishchuk - 2021 - Postmodern Openings 12 (3):77-95.
    The article is devoted to defining the essence of security, particularly national security, its interpretation, main features, structure, and factors. The research focuses on the main concepts of the modern understanding of national security and defines national security according to recent research. The authors have performed a structural and functional analysis of the system of national security of Ukraine, which would be an adequate counteraction to threats to vital national interests. The article examines the multi-vector interpretation and representation of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. The Federal Loyalty-Security Program.Eleanor Bontecou & Robert K. Carr - 1956 - Science and Society 20 (4):358-359.
     
    Export citation  
     
    Bookmark  
  36.  99
    Community: Seeking Safety in an Insecure World.Zygmunt Bauman - 2013 - Wiley.
    'Community' is one of those words that feels good: it is good 'to have a community', 'to be in a community'. And 'community' feels good because of the meanings which the word conveys, all of them promising pleasures, and more often than not the kind of pleasures which we would like to experience but seem to miss. 'Community' conveys the image of a warm and comfortable place, like a fireplace at which we warm our hands on a frosty day. Out (...)
    Direct download  
     
    Export citation  
     
    Bookmark   56 citations  
  37.  23
    Testimony on computer security before the U.S. senate Subcommittee on oversight of government management of the commmittee on governmental affairs.Susan Hubbell Nycum - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):2-4.
  38.  29
    (In) secure times: Constructing white working-class masculinities in the late 20th century.Julia Marusza, Judi Addelston, Lois Weis & Michelle Fine - 1997 - Gender and Society 11 (1):52-68.
    This article documents a moment in history when poor and working-class white boys and men are struggling in their schools, communities, and workplaces against the “Other” as a means of framing identities. Drawing on two independent qualitative studies, the authors investigate distinct locations where poor and working-class boys and men invent, relate to, and distance from marginalized groups in an effort to create self. First the authors look at an ethnography of “the Freeway boys,” a community of urban white working-class (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  39.  22
    The Ethics of Arbitration in the Securities Industry.John R. Boatright - 1998 - Business and Society Review 99 (1):19-24.
  40. Misuse made plain: Evaluating concerns about neuroscience in national security.Kelly Lowenberg, Brenda M. Simon, Amy Burns, Libby Greismann, Jennifer M. Halbleib, Govind Persad, David L. M. Preston, Harker Rhodes & Emily R. Murphy - 2010 - American Journal of Bioethics Neuroscience 1 (2):15-17.
    In this open peer commentary, we categorize the possible “neuroscience in national security” definitions of misuse of science and identify which, if any, are uniquely presented by advances in neuroscience. To define misuse, we first define what we would consider appropriate use: the application of reasonably safe and effective technology, based on valid and reliable scientific research, to serve a legitimate end. This definition presents distinct opportunities for assessing misuse: misuse is the application of invalid or unreliable science, or (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  33
    Privacy made public: will national security be the end of individualism?Jennifer M. Fujawa - 2005 - Acm Sigcas Computers and Society 35 (1):4-4.
  42.  18
    A secure procedure for early career scientists to report apparent misconduct. [REVIEW]Alex Davis, Nils-Eric Sahlin, Barry Dewitt & Baruch Fischhoff - 2021 - Life Sciences, Society and Policy 17 (1):1-5.
    Early career scientists sometimes observe senior scientists engage in apparent scientific misconduct, but feel powerless to intervene, lest they imperil their careers. We propose a Secure Reporting Procedure that both protects them, when pursuing those concerns, and treats the senior scientists fairly. The proposed procedure is, we argue, consistent with the ethical principles of the scientific community, as expressed in the codes of its professional organizations. However, its implementation will require changes in procedures and regulations. Those efforts will be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  40
    Rethinking the Alternatives: Food Sovereignty as a Prerequisite for Sustainable Food Security.Ronald Byaruhanga & Ellinor Isgren - 2023 - Food Ethics 8 (2):1-20.
    The concept of food sovereignty is primarily taken as an alternative to the prevailing neoliberal food security model. However, the approach has hitherto not received adequate attention from policy makers. This could be because the discourse is marked by controversies and contradictions, particularly regarding its ability to address the challenges of feeding a rapidly growing global population. In response to these criticisms, this paper argues that the principles of food sovereignty, such as democratic and transparent food systems, agroecology, and local (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  45
    The development of guidelines for implementing information technology to promote food security.Stephen E. Gareau - 2004 - Agriculture and Human Values 21 (4):273-285.
    Food insecurity, and its extreme form, hunger, occur whenever the accessibility to an adequate supply of nutritional and safe foods becomes restricted or unpredictable. They are recurring problems in certain regions of the US, as well as in many parts of the world. According to nation-wide surveys conducted by the US Bureau of the Census, between 1996 and 1998 an estimated 9.7% of US households were classified as food insecure (6.2% being food insecure without evidence of hunger, and 3.5% (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  44
    The anthropocentrism thesis: (mis)interpreting environmental values in small-scale societies.David Samways - 2025 - Environmental Values 34 (1):25-42.
    In both radical and mainstream environmental discourses, anthropocentrism (human centredness) is inextricably linked to modern industrial society's drive to control and dominate nature and the generation of our current environmental crisis. Such environmental discourses frequently argue for a retreat from anthropocentrism and the establishment of a harmonious relationship with nature, often invoking the supposed ecological harmony of indigenous peoples and/or other small-scale societies. In particular, the beliefs and values of these societies vis-à-vis their natural environment are taken to be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  84
    The diminishing utility of economic growth: From maximizing security toward maximizing subjective well‐being.Ronald Inglehart - 1996 - Critical Review: A Journal of Politics and Society 10 (4):509-531.
    Abstract Twenty years ago, Tibor Scitovsky questioned the assumption, embedded in neoclassical economics, that human happiness will be augmented if the level of consumption either rises or becomes more uniform over time. Evidence from the 1990?1993 World Values Survey suggests that his doubts were well?founded: although economic gains apparently make a major contribution to subjective well?being as one moves from societies at the subsistence level to those with moderate levels of economic development, further economic growth seems to have little or (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  86
    Education in a global society: Meeting the needs of children in a socially toxic world.Karen E. Mayo - 2004 - World Futures 60 (3):217 – 223.
    The education of future generations of citizens is the one common theme that connects otherwise culturally, linguistically, ethnically, and politically diverse communities and countries in an increasingly global society. Social systems foster socially toxic environments, instilling a culture of fear while ignoring the importance of preparing youth for advanced citizenship in a global civil society. The author examines the role of education in relation to global events and explores the purposes of education in meeting the needs of tomorrow's (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  14
    (1 other version)Some discussions on critical information security issues in the artificial intelligence era.Vuong Quan Hoang, Viet-Phuong La, Hong-Son Nguyen & Minh-Hoang Nguyen - forthcoming - AI and Society:1-11.
    The rapid advancement of information technology platforms and programming languages has transformed the dynamics and development of human society. The cyberspace and associated utilities are expanding, leading to a gradual shift from real-world living to virtual life (also known as cyberspace or digital space). The expansion and development of natural language processing models and large language models demonstrate human-like characteristics in reasoning, perception, attention, and creativity, helping humans overcome operational barriers. Alongside the immense potential of artificial intelligence (AI) are (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Speaking Truth to Power. A Theory of Whistleblowing.Daniele Santoro & Manohar Kumar - 2018 - Cham: Springer. Edited by Manohar Kumar.
    Whistleblowing is the public disclosure of information with the purpose of revealing wrongdoings and abuses of power that harm the public interest. This book presents a comprehensive theory of whistleblowing: it defines the concept, reconstructs its origins, discusses it within the current ethical debate, and elaborates a justification of unauthorized disclosures. Its normative proposal is based on three criteria of permissibility: the communicative constraints, the intent, and the public interest conditions. The book distinguishes between two forms of whistleblowing, civic and (...)
  50.  28
    The Biopolitics of Sacrifice: Securing Infrastructure at the G20 Summit.Alessandra Renzi & Greg Elmer - 2013 - Theory, Culture and Society 30 (5):45-69.
    This article investigates infrastructure spending from a biopolitical perspective and rethinks its connections to emerging regimes of (in)securitization. Starting with a study of the organization and contestation of the G8/G20 summits in Toronto in June 2010, the analysis moves through the shifty territory of a governmental logic that is reconfiguring the body politics of civic participation, as well as the ways in which discourses on economic growth, property and public safety intertwine in the aftermath of the 2008 global financial crisis. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974