Results for 'IT security '

982 found
Order:
  1. Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  28
    Foucauldian security and the threat to democratic policy-making.Richard Togman - 2021 - Critical Review of International Social and Political Philosophy 24 (2):230-252.
    The exercise of power has radically changed in the modern era and is creating new challenges for democracy and democratic policy-making. Michel Foucault has introduced a whole new vocabulary to the understanding of governance which is critical to conceptualizing both the changing nature of power and its implications for democracy. Foucault articulates three fundamental ways in which the state has sought to maintain control of, act upon and maximize its capabilities through those under its charge: sovereign, discipline and security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4.  26
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market intermediaries to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  6. Modal Security.Justin Clarke-Doane & Dan Baras - 2019 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  7.  17
    Secure traveling salesman problem with intelligent transport systems features.Gloria Cerasela Crişan, Camelia-M. Pintea, Anisoara Calinescu, Corina Pop Sitar & Petrică C. Pop - forthcoming - Logic Journal of the IGPL.
    Meeting the security requests in transportation is nowadays a must. The intelligent transport systems represent the support for addressing such a challenge, due to their ability to make real-time adaptive decisions. We propose a new variant of the travelling salesman problem integrating security constraints inspired from ITSs. This optimization problem is called the secure TSP and considers a set of security constraints on its integer variables. Similarities with fuzzy logic are presented alongside the mathematical model of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  31
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  43
    Legal Security from the Point of View of the Philosophy of Law.Gregorio Peces-Barba Martínez - 1995 - Ratio Juris 8 (2):127-141.
    . The author analyses the concept of legal security from its historical evolution to its main structural aspects. In the first part he argues that legal security is a historical and cultural concept of the modern world. He considers a series of factors which lead from the general concept of security generated by an ideological monism and the social rigidity characterizing the Middle Ages to the concept of legal security protected by the legal monism of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  31
    Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks.Vikram Raju Reddicherla, Umashankar Rawat & Kumkum Garg - 2020 - Foundations of Science 25 (4):1125-1146.
    NEMO means Network Mobility which is the extension of Mipv6 and it is invented for accessing internet for the group of people when they are travelling in Vehicle as Network group. During handoff while exchanging Binding Updates between the Mobile Network Node, Correspondent Node and Home Agent, many security threats are present during those messages exchange. It may prone to several standard malicious attacks on the BU and Binding Acknowledgement. An efficient end-to-end security method is required to protect (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  48
    Social security and social welfare.Michael Adler - 2010 - In Peter Cane & Herbert M. Kritzer, The Oxford handbook of empirical legal research. New York: Oxford University Press. pp. 399--423.
    This article reviews empirical research on social security and social welfare law. It identifies the efforts needs to be carried out to promote empirical research in this area of law and outlines an empirical research agenda of topics that should be given priority. The UK defines social security as based on five key benefits viz. social/contributory, categorical/universal, tax-based, and occupational/means-tested. This article focuses on the primary model of administrative justice. It is a three-fold: bureaucratic rationality/accuracy and efficiency; professional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. Securing reliable evidence.Kent W. Staley - unknown
    : Evidence claims depend on fallible assumptions. Three strategies for making true evidence claims in spite of this fallibility are strengthening the support for those assumptions, weakening conclusions, and using multiple independent tests to produce robust evidence. Reliability itself, understood in frequentist terms, does not explain the usefulness of all three strategies; robustness, in particular, sometimes functions in a way that is not well-characterized in terms of reliability. I argue that, in addition to reliability, the security of evidence claims (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  14.  97
    Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI security (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  35
    Secured Financing of Intellectual Property Assets and the Reform of English Personal Property Security Law.Iwan Davies - 2006 - Oxford Journal of Legal Studies 26 (3):559-583.
    The past three decades have seen a decline in traditional industries in the United Kingdom and there has been a relative decline in the value of physical assets to the UK economy. At the same time, the value of intangible assets seen in intellectual property rights have increased considerably. As such, IP rights represent important assets for companies and often comprise the foundation for market dominance and continued profitability. There is a structural uncertainty in the law relating to the use (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  14
    Gendering security: The substantive representation of women in the Israeli parliament.Chen Friedberg & Reut Itzkovitch-Malka - 2018 - European Journal of Women's Studies 25 (4):419-439.
    The study focuses on the links between gender and national security in the legislative arena in Israel, considering whether men and women legislators prioritize security differently, alongside other thematic policy areas. The centrality of national security issues in Israeli politics makes it a good case study for these questions, as it enhances existing gendered stereotypes. The article examines two competing hypotheses. The first suggests that Israeli female legislators will mostly refrain from addressing national security policy issues, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17. Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  18.  65
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  20.  69
    Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
    This article motions to a real contradiction between online security and civil rights. It traverses semantic and conceptual elaborations of both security and human rights, narrowing their range to national security and human rather than civil rights, and suggests that the concept of security itself, whether online or not, is a rhetorical instrument in the hands of interested parties, mostly states and militaries. This instrument is used to undermine human rights precisely by means of its association (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  35
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  40
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. (Metasemantically) Securing Free Will.Jason Turner - 2013 - Australasian Journal of Philosophy 91 (2):295-310.
    Metasemantic security arguments aim to show, on metasemantic grounds, that even if we were to discover that determinism is true, that wouldn't give us reason to think that people never act freely. Flew's [1955] Paradigm Case Argument is one such argument; Heller's [1996] Putnamian argument is another. In this paper I introduce a third which uses a metasemantic picture on which meanings are settled as though by an ideal interpreter. Metasemantic security arguments are widely thought discredited by van (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  24. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  12
    Justice, sustainability, and security: global ethics for the 21st century.Eric A. Heinze (ed.) - 2013 - New York, NY: Palgrave-Macmillan.
    Justice, Sustainability, and Security not only enhances our knowledge of these issues, but it teases out our moral dimensions and offer prescriptions for how governments and global actors might craft their policies to better consider their effects on the global human condition.
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Suffering, Sympathy, and Security: Reassessing Rorty’s Contribution to Human Rights Theory.Kerri Woods - 2009 - Res Publica 15 (1):53-66.
    This article reassess Rorty’s contribution to human rights theory. It addresses two key questions: (1) Does Rorty sustain his claim that there are no morally relevant transcultural facts? (2) Does Rorty’s proposed sentimental education offer an adequate response to contemporary human rights challenges? Although both questions are answered in the negative, it is argued here that Rorty’s focus on suffering, sympathy, and security, offer valuable resources to human rights theorists. The article concludes by considering the idea of a dual (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  35
    Criminogenic Security of Law in the EU and Lithuanian Legislation.Viktoras Justickis & Vidmantas Egidijus Kurapka - 2009 - Jurisprudencija: Mokslo darbu žurnalas 117 (3):217-238.
    The study focuses on the phenomenon of crime-causing (criminogenic) law. It includes a review of related studies on such laws and their criminal side-effects, the change in the legislator’s liability for effects of enacted laws, and the effects of the legislator’s afflatus on the potential criminogenic effects of law. Of special concern are cases where the legislator is aware of the potential criminogenic side-effects of a new law but carelessly neglects them. The study evaluates the tool for detection of probable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  30
    Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  29. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  16
    Earth, gender and food security: Maria Zaloumis’ journey of feminising Agric-business in Zambia.Nelly Mwale - 2023 - HTS Theological Studies 79 (2):8.
    This article explores the interconnectedness of the earth, gender and food security in the Zambian context using the narrative of Maria Zaloumis (a female Zambian farmer) in the public sphere. It draws on a narrative research design by the restorying of Maria’s trajectory in Agric-business as informed by the African ecofeminist theory. The study shows that Maria was described as an emerging young farmer and an emblem of female entrepreneurship. Her trajectory mirrored the intersection of the earth, gender and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - 2025 - Critical Review of International Social and Political Philosophy 28 (2):286-306.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  13
    Security: a philosophical investigation.David A. Welch - 2022 - New York: University of Waterloo, University Press.
    How do we know when we are investing wisely in security? Answering this question requires investigating what things are worth securing (and why); what threatens them; how best to protect them; and how to think about it. Is it possible to protect them? How best go about protecting them? What trade-offs are involved in allocating resources to security problems? This book responds to these questions by stripping down our preconceptions and rebuilding an understanding of security from the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  73
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  91
    Security as a Selective Project.Alice Hills - 2009 - Studies in Social Justice 3 (1):79-97.
    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities, where the principal political weapons are coercion and intimidation, and territoriality is a significant facet of security’s physical dimension and exclusionary tendencies. Cities such as Baghdad and Basra are divided into ethnic or sectarian areas, and security’s referent object is an identity or group. Friction exists between the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  14
    Securing the Pandemic: Biopolitics, Capital, and COVID-19.Mark G. Kelly - 2023 - Foucault Studies 35:46-69.
    In this article, I consider the interoperation of twin contemporary governmental imperatives, fostering economic growth and ensuring biopolitical security, in the face of the COVID-19 pandemic. At a theoretical level, I thereby consider the question of the applicability of a Marxist analysis vis-à-vis a Foucauldian one in understanding state responses to the pandemic. Despite the apparent prioritization of preserving life over economic activity by governments around the world in this context, I will argue that the basic problem that COVID-19 (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  78
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   71 citations  
  37. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  38. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Perceptually Secured Knowledge.Elijah Chudnoff - 2025 - In Ori Beck & Farid Masrour, The Relational View of Perception: New Philosophical Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  3
    Humanitarian security as an educational project.Vitalii Mudrakov, Nataliia Liutko & Olena Hapchenko - 2025 - Filosofiya osvity Philosophy of Education 30 (2):56-70.
    The article is devoted to the disclosure of the concept of “humanitarian secu­rity” in its educational perspective as an educational project. The authors state the need to protect against hybrid Russian aggression by means of the humani­tarian sphere, emphasizing the humanitarian nature of hybrid Russian aggres­sion. Based on the peculiarities of understanding and defining the humanitar­ian sphere in Ukraine, education is defined as a key aspect of this security. The authors point out the need for and consider the possibility (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei, Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  2
    Family Security is a Legitimate Purpose to Achieve Human Security Spoken Legal Texts and Witnessing Human Studies- A Legal Scientific Study in the Light of the Purposes of Islamic Law.Abdulmalek Hussein Ali Altaj - forthcoming - Evolutionary Studies in Imaginative Culture:453-469.
    Praise be to Allah and peace and blessings be upon the Messenger of Allah and his family and companions, and after: This research tagged with: "Family security is a legitimate purpose to achieve human security" aims to show the importance of family security, and how the Sharia paid great attention to it, and stressed the need to maintain it in all psychological, health, physical, economic and moral fields as the family is the first basic social unit and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  44
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  32
    Food Security: One of a Number of ‘Securities’ We Need for a Full Life: An Australian Perspective.Quentin Farmar-Bowers - 2014 - Journal of Agricultural and Environmental Ethics 27 (5):811-829.
    Although agriculture in Australia is very productive, the current food supply systems in Australia fail to deliver healthy diets to all Australians and fail to protect the natural resources on which they depend. The operation of the food systems creates ‘collateral damage’ to the natural environment including biodiversity loss. In coming decades, Australia’s food supply systems will be increasingly challenged by resource price inflation and climate change. Australia exports more than half of its current agricultural production. Government and business are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Politics of Security: Towards a Political Phiosophy of Continental Thought.Michael Dillon - 1996 - Routledge.
    In this critique of security studies, with insights into the thinking of Heidegger, Foucault, Derrida, Levinas and Arendt, Michael Dillon contributes to the rethinking of some of the fundamentals of international politics developing what might be called a political philosophy of continental thought. Drawing on the work of Martin Heidegger, Politics of Security establishes the relationship between Heidegger's readical hermeneutical phenomenology and politics and the fundamental link between politics, the tragic and the ethical. It breaks new ground by (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  47.  26
    Security dilemma’ of pakistan in the context of afghanistan: A regional trilateral solution.Syed Shuja Uddin - 2016 - Journal of Social Sciences and Humanities 55 (2):89-100.
    Three inevitable realities instigate this study. Primarily, the goal of security in the region will most likely be accomplished just if as a minimum some level of cooperation is achieved between the major countries of the region. Second, Afghanistan cannot advance economically or enhance its security and administration independently without some cooperation from India and Pakistan. Third, although many strategists view the idea of Pak-India cooperation with distrust, there are many common grounds where both can gain considerable (...), governance, and economic advantages. Most of the existing studies are focused on the assumptions that how peace in the region will come. First view is about involvement of USA and European countries on one side and stake holders in Afghanistan on the other. Some believe in a trilateral pattern i.e. Western World, Afghan stake holders and Pakistan. Many also highlight the importance of support from neighboring countries like Iran, the Central Asian Republics, and China. This study highlights the significance of a trilateral solution in Afghanistan and the steps forward from this particular aspect. The possible answer to security dilemma of Pakistan in the context of Afghanistan is a solution within the region. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  18
    Securing Arithmetical Determinacy.Sebastian G. W. Speitel - 2024 - Ergo: An Open Access Journal of Philosophy 11.
    The existence of non-standard models of first-order Peano-Arithmetic (PA) threatens to undermine the claim of the moderate mathematical realist that non-mysterious access to the natural number structure is possible on the basis of our best arithmetical theories. The move to logics stronger than FOL is denied to the moderate realist on the grounds that it merely shifts the indeterminacy “one level up” into the meta-theory by, illegitimately, assuming the determinacy of the notions needed to formulate such logics. This paper argues (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49. Food security and biodiversity: can we have both? An agroecological analysis. [REVIEW]Michael Jahi Chappell & Liliana A. LaValle - 2011 - Agriculture and Human Values 28 (1):3-26.
    We present an extensive literature review exploring the relationships between food insecurity and rapid biodiversity loss, and the competing methods proposed to address each of these serious problems. Given a large and growing human population, the persistence of widespread malnutrition, and the direct and significant threats the expanding agricultural system poses to biodiversity, the goals of providing universal food security and protecting biodiversity seem incompatible. Examining the literature shows that the current agricultural system already provides sufficient food on a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  50.  36
    National Security Environments, Patriotism, and Japanese Public Opinion.Koji Kagotani - 2015 - Japanese Journal of Political Science 16 (1):96-113.
    This study examines Japanese reactions to neighboring countries’ behavior by addressing possible micro-motives, such as patriotism, the rational demand for national defense, and retrospective policy evaluation. This theoretical development leads to distinctive hypotheses from different motivations and directly tests them using macro-data . This research will apply this framework to Japanese politics and will show that foreign threats stimulate patriotism in the public mind and enhance political support for national leaders. It will also demonstrate that the Japanese public has no (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 982