Results for 'Security Practices'

970 found
Order:
  1.  78
    Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI (...) practices attempt to fill the gap and identify several shortcomings in diversity and participation. We found that these security practices are part of securitization processes aiming to support (commercial) development of general purpose AI systems whose trustworthiness can only be imperfectly tested instead of guaranteed. We conclude by offering several improvements to the current AI security practices. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  39
    CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices.Andrea M. Matwyshyn - 2009 - Journal of Business Ethics 88 (S4):579 - 594.
    Relying heavily on Thomas Dunfee's work, this article conducts an in-depth analysis of the relationship between law and business ethics in the context of corporate information security. It debunks the two dominant arguments against corporate investment in information security and explains why socially responsible corporate conduct necessitates strong information security practices. This article argues that companies have ethical obligations to improve information security arising out of a duty to avoid knowingly causing harm to others and, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  45
    Community food security: Practice in need of theory? [REVIEW]Molly D. Anderson & John T. Cook - 1999 - Agriculture and Human Values 16 (2):141-150.
    Practitioners and advocates of community food security (CFS) envision food systems that are decentralized, environmentally-sound over a long time-frame, supportive of collective rather than only individual needs, effective in assuring equitable food access, and created by democratic decision-making. These themes are loosely connected in literature about CFS, with no logical linkages among them. Clear articulation in a theoretical framework is needed for CFS to be effective as a guide for policy and action. CFS theory should delimit the level of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  4. A chaos-based robust software watermarking, information security practice and experience.Liu Fenlin, Lu Bin & Luo Xiangyang - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 3903--355.
     
    Export citation  
     
    Bookmark  
  5.  20
    Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories.Agnieszka M. Zbrzezny, Sabina Szymoniak & Miroslaw Kurkowski - 2022 - Logic Journal of the IGPL 30 (2):289-300.
    The paper presents a novel method for the verification of security protocols’ time properties. The new method uses a translation to satisfiability modulo theories problem. In our approach, we model protocol users’ behaviours using networks of synchronized timed automata. Suitably specified correctness properties are defined as a reachability property of some chosen states in an automata network. Then, the network of timed automata and the property are translated to an SMT problem and checked using an SMT-solver and a BMC (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  2
    Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3):264-276.
    The U.S. military is developing augmented reality (AR) capabilities for use on the battlefield as a means of achieving greater situational awareness. The superimposition of digital data—designed to expand surveillance, enhance geospatial understanding, and facilitate target identification—onto a live view of the battlefield has important implications for virtuous conduct in war: Can the soldier exercise practical wisdom while integrated into a system of militarized legibility? Adopting a virtue ethics perspective, I argue that AR disrupts the soldier’s immersion in the scene (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  1
    Security in the light of select philosophical and social concepts. Between theory and practice.Wojciech Gizicki - 2013 - Filosofija. Sociologija 24 (3).
    Security is one of the basic values in the life of an individual, society, nation, country, and also at the international level. However, modern security is composed of efficient utilization of the potential within diplomacy and strength, a balanced relationship between soft and hard power. This text aims at presenting an overview of security concepts included in the selected philosophical and social models. This involves bringing closer specific theories and practical actions based on them. Nowadays, this can (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  30
    Commentary: Security forces practices in Egypt.Virginia N. Sherry - 1993 - Criminal Justice Ethics 12 (2):2-44.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Private security and military companies and foreign fighters: possible interactions and potential practical implications.Iveta Hlouchova - 2018 - In Artur Gruszczak & Pawel Frankowski, Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  10.  14
    Securing recipiency in workplace meetings: Multimodal practices.Trini Stickle & Cecilia E. Ford - 2012 - Discourse Studies 14 (1):11-30.
    As multiparty interactions with single courses of coordinated action, workplace meetings place particular interactional demands on participants who are not primary speakers as they work to initiate turns and to interactively coordinate with displays of recipiency from co-participants. Drawing from a corpus of 26 hours of videotaped workplace meetings in a midsized US city, this article reports on multimodal practices – phonetic, prosodic, and bodily-visual – used for coordinating turn transition and for consolidating recipiency in these specialized speech exchange (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  15
    Good practices in designing a communication channel architecture for secure async flexible distributed collaboration.Rudolf Erdei, Daniela Delinschi, Oliviu Matei & Laura Andreica - 2024 - Logic Journal of the IGPL 32 (2):334-351.
    In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  33
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  55
    Women Peace and Security: Adrift in Policy and Practice.Laura Davis - 2019 - Feminist Legal Studies 27 (1):95-107.
    This comment reflects on how the Women, Peace and Security agenda has been translated into policy and put into practice by the European Union and the Democratic Republic of Congo. Although the WPS agenda has enabled many gains by women peacebuilders, this comment identifies important challenges from these two very different contexts. First, situating WPS policy areas within a broader feminist political economy analysis demonstrates how little influence the WPS agenda has across government. Second, the WPS agenda is being (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  17
    Ethical Security Studies: A New Research Agenda.Jonna Nyman & Anthony Burke (eds.) - 2016 - Routledge.
    At a time of grave ethical failure in global security affairs, this is the first book to bring together emerging theoretical debates on ethics and ethical reasoning within security studies. In this volume, working from a diverse range of perspectives—poststructuralism, liberalism, feminism, just war, securitization, and critical theory—leading scholars in the field of security studies consider the potential for ethical visions of security, and lay the ground for a new field: "ethical security studies". These ethical (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  34
    Generative AI Security: Theories and Practices.Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.) - 2024 - Springer Nature Switzerland.
    This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level (...), and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  19
    Theory and practice in Epicurean political philosophy: security, justice and tranquility.Javier Aoiz - 2023 - London: Bloomsbury Academic. Edited by Marcelo D. Boeri.
    The opponents of Epicureanism in antiquity, including Cicero, Plutarch and Lactantius, succeeded in establishing a famous cliché: the theoretical and practical disinterest of Epicurus and the Epicureans in political communities. However, this anti-Epicurean literature did not provide considerations of Epicurean political theory or the testimonies about Epicurean lifestyle. Therefore, the purpose of this book is to shed light on the contribution of Epicurean thought to political life in the ancient world. Incorporating the most up-to-date archaeological material, including papyri which have (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  38
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  30
    National Security Intelligence and Ethics.Seumas Miller, Mitt Regan & Patrick Walsh (eds.) - 2021 - Routledge.
    This volume examines the ethical issues that arise as a result of national security intelligence collection and analysis. Powerful new technologies enable the collection, communication, and analysis of national security data on an unprecedented scale. Data collection now plays a central role in intelligence practice, yet this development raises a host of ethical and national security problems, such as: privacy; autonomy; threats to national security and democracy by foreign states; and accountability for liberal democracies. This volume (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  57
    Security Assessment of Teachers' Right to Healthy and Safe Working Environment: Data from a Mass Written Survey (article in Lithuanian).Gediminas Merkys, Algimantas Urmonas & Daiva Bubelienė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):575-594.
    This paper presents the results of an empirical study that reflects monitoring and evaluation of the implementation of some legal acts on the labour of the Republic of Lithuania. The analysis of legal documents at the national and international level is provided. A review of cognate studies conducted by foreign and Lithuanian researchers is presented and the professional situation of a Lithuanian teacher from the employee rights perspective is highlighted. The professional activities contexts and sectors, wherein systematic violations of teachers’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. The Concept of Security.Jonathan Herington - 2012 - In Michael Selgelid & Christian Enemark, Ethical and Security Aspects of Infectious Disease Control: Interdisciplinary Perspectives. Ashgate.
    This chapter provides a philosophical analysis of the different meanings of “security” and, by so doing, identifies some key features of the concept of security. I begin by establishing a number of qualities which this chapter’s conceptual analysis should ideally possess. I then make an important distinction between security as a practice and security as a state of being, and argue that more attention should be paid to the latter if our goal is to interrogate the (...)
     
    Export citation  
     
    Bookmark   5 citations  
  21. Food security and the moral differences between climate mitigation and geoengineering: the case of biofuels and BECCS.Hanna Schübel & Ivo Wallimann-Helmer - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer, Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 71-76.
    Both biofuels and BECCS serve the purpose of reducing the concentration of carbon in the atmosphere, biofuels by reducing the quantity of CO2 newly added and BECCS by removing the CO2 already emitted. Both rely on the large-scale growth of biomass and hence compete with food production for arable land. Consequently, the implementation of both at large scales potentially endangers food security. Given this conflict and the need for climate action, this paper discusses whether there are differences between the (...)
     
    Export citation  
     
    Bookmark  
  22.  53
    Human Security and Citizenship in Finnish Religious Education: Rethinking Security Within the Human Rights Horizon.Gabriel O. Adebayo & Jan-Erik Mansikka - 2018 - Human Rights Review 19 (4):447-469.
    This paper discusses citizenship in Finnish religious education in relation to human security. It traces the characteristics of human security that connect citizenship, religion, and education in Finnish policy documents. The article focuses on basic education. Its data were analyzed employing qualitative content analysis. The findings indicate that citizenship in Finnish RE entails personal security concerns dealing with psychological and human rights issues. These are found to be essentially human security as conceptualized by the United Nations. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24.  14
    Nordic Societal Security: Convergence and Divergence.Sebastian Larsson & Mark Rhinard (eds.) - 2020 - New York: Routledge/Taylor & Francis Group.
    This book compares and contrasts publicly espoused security concepts in the Nordic region, and explores the notion of societal security. Outside observers often assume that Nordic countries take similar approaches to the security and safety of their citizens. This book challenges that assumption and traces the evolution of 'societal security', and its broadly equivalent concepts, in Sweden, Norway, Denmark and Finland. The notion of societal security is deconstructed and analysed in terms of its different meanings (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - 2025 - Critical Review of International Social and Political Philosophy 28 (2):286-306.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  22
    Theoretical, methodological and practical bases for creating job description of crisis assessment experts in terms of state security of ukraine.Bielai Serhii, Medvid Mykhaylo & Parkhomenko Oleksandr - 2017 - Science and Education: Academic Journal of Ushynsky University 23 (7):43-49.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  35
    The (Big) Data-security assemblage: Knowledge and critique.Tobias Blanke & Claudia Aradau - 2015 - Big Data and Society 2 (2).
    The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  28.  46
    The Importance of Care in the Theory and Practice of Human Security.Fiona Robinson - 2008 - Journal of International Political Theory 4 (2):167-188.
    This paper argues that human rights-based approaches to human security overlook the importance of caring values, relations of care, and care work in the achievement and long-term maintenance of human security. It outlines an alternative approach to the ethics of human security which combines a feminist ontological and normative position on the centrality of caring values and practices in sustaining life with a feminist account of the gendered political economy of contemporary globalisation. Moreover, it argues that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Securing the Empirical Value of Measurement Results.Kent W. Staley - 2020 - British Journal for the Philosophy of Science 71 (1):87-113.
    Reports of quantitative experimental results often distinguish between the statistical uncertainty and the systematic uncertainty that characterize measurement outcomes. This article discusses the practice of estimating systematic uncertainty in high-energy physics. The estimation of systematic uncertainty in HEP should be understood as a minimal form of quantitative robustness analysis. The secure evidence framework is used to explain the epistemic significance of robustness analysis. However, the empirical value of a measurement result depends crucially not only on the resulting systematic uncertainty estimate, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  30. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  31. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  29
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  29
    Expanding Universe: Grotian Moments in the Practice of the UN Security Council.Inger Österdahl - 2022 - Grotiana 43 (1):25-54.
    This contribution explores Grotian Moments in the practice of the UN Security Council in three different but closely related subject areas. The three areas are, in turn, the way the Security Council interprets the concept of ‘threat to the peace’ or more generally ‘international peace and security’, the law-making by the Security Council, and the subjects – in the sense of legal or natural persons – that the Security Council chooses to address. It turns out (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  1
    Humanitarian security as an educational project.Vitalii Mudrakov, Nataliia Liutko & Olena Hapchenko - 2025 - Filosofiya osvity Philosophy of Education 30 (2):56-70.
    The article is devoted to the disclosure of the concept of “humanitarian secu­rity” in its educational perspective as an educational project. The authors state the need to protect against hybrid Russian aggression by means of the humani­tarian sphere, emphasizing the humanitarian nature of hybrid Russian aggres­sion. Based on the peculiarities of understanding and defining the humanitar­ian sphere in Ukraine, education is defined as a key aspect of this security. The authors point out the need for and consider the possibility (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  32
    A breed apart? Security analysts and herding behavior.Jane Cote & Jerry Goodstein - 1999 - Journal of Business Ethics 18 (3):305 - 314.
    Herding behavior occurs when security analysts ignore their private opinions and issue public forecasts that mimic the earnings forecasts of others. Joining the consensus provides cover for analysts' reputations. We question the ethics of this practice when the motive to protect one's reputation takes precedence over the forecase accuracy motive. While seemingly predictable behavior from a self interested perspective, herding behavior has subtle but long term ramifications for the efficient pricing of securities and the preservation of the public trust (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  12
    Security, Strategy, and Critical Theory.R. G. Wyn Jones - 1999 - Lynne Rienner Publishers.
    Preface Acknowledgments Introduction 1 Pt. 1 Traditional and Critical Theory 1 Promise: Toward a Critical Theory of Society 9 2 Impasse: Emancipatory Politics After Auschwitz 29 3 Redemption: Renewing the Critical Project 53 Pt. 2 Traditional and Critical Security Studies 4 Theory: Reconceptualizing Security 93 5 Technology: Reconceptualizing Strategy 125 6 Emancipation: Reconceptualizing Practice 145 Epilogue 165 Bibliography 169 Index 187 About the Book 191.
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. (1 other version)Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1995 - Routledge.
    _Terrorism, Security and Nationality_ shows how the ideas and techniques of political philosophy can be applied to the practical problems of terrorism, State violence and national identity. In doing so it clarifies a wide range of issues in applied political philosophy including ethics of war; theories of state and nation; the relationship between communities and nationalisms; human rightss and national security. Paul Gilbert identifies conflicting conceptiona of civil strife by different political communities and investigates notions of terrorism both (...)
     
    Export citation  
     
    Bookmark   1 citation  
  38.  44
    Securities Lending Activities in Mutual Funds and ETFs: Ethical Considerations.Lee M. Dunham, Randy Jorgensen & Ken Washer - 2016 - Journal of Business Ethics 139 (1):21-28.
    Securities lending has been a lucrative business for mutual funds and exchange-traded funds over the past decade. Unfortunately for investors, the sponsors of these funds have not been very transparent with the details of their securities lending programs, and consequently most investors in these funds are unaware of their exposure to the risks inherent in securities lending. Interestingly, most funds do not return the full profits from securities lending activities to their investors. In this paper, we examine and discuss the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  22
    The Security Council's Role in Fulfilling the Responsibility to Protect.Jennifer M. Welsh - 2021 - Ethics and International Affairs 35 (2):227-243.
    The principle of the responsibility to protect (RtoP) conceives of a broad set of measures that can be employed in preventing and responding to atrocity crimes. Nevertheless, the UN Security Council remains an important part of the implementation architecture, given what the International Commission on Intervention and State Sovereignty referred to as its authoritative position in international society as the “linchpin of order and stability.” As part of the roundtable “The Responsibility to Protect in a Changing World Order: Twenty (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  32
    Food Security: One of a Number of ‘Securities’ We Need for a Full Life: An Australian Perspective.Quentin Farmar-Bowers - 2014 - Journal of Agricultural and Environmental Ethics 27 (5):811-829.
    Although agriculture in Australia is very productive, the current food supply systems in Australia fail to deliver healthy diets to all Australians and fail to protect the natural resources on which they depend. The operation of the food systems creates ‘collateral damage’ to the natural environment including biodiversity loss. In coming decades, Australia’s food supply systems will be increasingly challenged by resource price inflation and climate change. Australia exports more than half of its current agricultural production. Government and business are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  50
    Securing Cisgendered Futures: Intersex Management under the “Disorders of Sex Development” Treatment Model.Catherine Clune-Taylor - 2019 - Hypatia 34 (4):690-712.
    In this critical, feminist account of the management of intersex conditions under 2006's controversial “Disorders of Sex Development” (DSD) treatment model, I argue that like the “Optimal Gender of Rearing” (OGR) treatment model it replaced, DSD aims at securing a cisgendered future for the intersex patient, referring to a normalized trajectory of development across the lifespan in which multiple sexed, gendered, and sexual characteristics remain in “coherent” alignment. I argue this by critically analyzing two ways that intersex management has changed (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  15
    Balancing security and care: Gender relations of nursing staff in forensic psychiatric care.Esa Kumpula, Per Ekstrand & Lena-Karin Gustafsson - 2022 - Nursing Inquiry 29 (4):e12478.
    This study departs from the built-in tension of the dual goals of forensic psychiatric care in Sweden, which are to protect society as well as to care for patients. The majority of violence that takes place is perpetrated by men. Therefore, the views of nursing staff on violence as a gendered phenomenon have an impact on the care provision. There is a need for further knowledge of how norms of violence are intertwined with the construction of gender. The aim of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  43
    Survey on physicians' knowledge and attitudes towards clinical practice guidelines at the Mexican Institute of Social Security.Patricia Constantino-Casas, Consuelo Medécigo-Micete, Yuribia K. Millán-Gámez, Laura D. P. Torres-Arreola, Adriana A. Valenzuela-Flores, Arturo Viniegra-Osorio, Santiago Echevarría-Zuno & Fernando J. Sandoval-Castellanos - 2011 - Journal of Evaluation in Clinical Practice 17 (4):768-774.
  44.  27
    Foucauldian security and the threat to democratic policy-making.Richard Togman - 2021 - Critical Review of International Social and Political Philosophy 24 (2):230-252.
    The exercise of power has radically changed in the modern era and is creating new challenges for democracy and democratic policy-making. Michel Foucault has introduced a whole new vocabulary to the understanding of governance which is critical to conceptualizing both the changing nature of power and its implications for democracy. Foucault articulates three fundamental ways in which the state has sought to maintain control of, act upon and maximize its capabilities through those under its charge: sovereign, discipline and security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  28
    The Biopolitics of Sacrifice: Securing Infrastructure at the G20 Summit.Alessandra Renzi & Greg Elmer - 2013 - Theory, Culture and Society 30 (5):45-69.
    This article investigates infrastructure spending from a biopolitical perspective and rethinks its connections to emerging regimes of (in)securitization. Starting with a study of the organization and contestation of the G8/G20 summits in Toronto in June 2010, the analysis moves through the shifty territory of a governmental logic that is reconfiguring the body politics of civic participation, as well as the ways in which discourses on economic growth, property and public safety intertwine in the aftermath of the 2008 global financial crisis. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  91
    Timescapes of security: Clocks, clouds, and the complexity of security governance.Emilian Kavalski - 2009 - World Futures 65 (7):527 – 551.
    This article pulls together the disjointed complexification of security studies. Such analytical overview suggests that the perspective of “timescapes” allows for exploring the complexity that shapes meanings and practices of security and its governance. In this respect, it is the imperative to change that suggests the significance of complexity thinking to security studies—that is, it is alone in taking the discontinuities of global life seriously. Security, in this regard, is not merely about the clockwork of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  76
    Ethical behaviour and securities trading.Jan H. W. Goslings - 1997 - Business Ethics, the Environment and Responsibility 6 (3):147–152.
    “Economic man does not ask himself ethical questions”. Yet securities trading inevitably raises many ethical issues, and ethical behaviour may be restricting and costly. Drawing on his economics background and his executive experience in the insurance and pension investment industry, as well as supervisory positions on the European Option Exchange, Dr Goslings analyses the securities markets and their structure, and explores their moral strengths and weaknesses in The Netherlands and elsewhere, before offering some practical recommendations.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48. Food security and biodiversity: can we have both? An agroecological analysis. [REVIEW]Michael Jahi Chappell & Liliana A. LaValle - 2011 - Agriculture and Human Values 28 (1):3-26.
    We present an extensive literature review exploring the relationships between food insecurity and rapid biodiversity loss, and the competing methods proposed to address each of these serious problems. Given a large and growing human population, the persistence of widespread malnutrition, and the direct and significant threats the expanding agricultural system poses to biodiversity, the goals of providing universal food security and protecting biodiversity seem incompatible. Examining the literature shows that the current agricultural system already provides sufficient food on a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  49. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50.  31
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 970