Results for 'Security measures'

967 found
Order:
  1.  30
    Value-based argumentation for designing and auditing security measures.Brigitte Burgemeestre, Joris Hulstijn & Yao-Hua Tan - 2013 - Ethics and Information Technology 15 (3):153-171.
    Designing security measures often involves trade-offs between various types of objectives. Multiple stakeholders may have conflicting demands and may have different ideas on how to resolve the resulting design conflicts. This paper reports on an application of value-sensitive design. Based on argumentation theory and social values, the paper develops a structured approach for discussing design conflicts, called value-based argumentation. The application domain examined in the paper is concerned with physical safety and security issues that arise in cross-border (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  27
    How School Security Measures Harm Schools and Their Students.Drew Chambers - 2022 - Educational Theory 72 (2):123-153.
    In this essay, Drew Chambers argues that the implementation of modern security technology in American schools (also known as target hardening) may do more harm than good, especially when such technologies represent the primary mode of risk responsiveness. In using technological measures to reduce risk, schools may inadvertently undermine both other responses to school violence as well as key aims of schooling itself. Here, Chambers provides a survey of the dominant trends in school security measures and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  35
    Medidas de Seguridad de Emergencia de Inundación y Soluciones de Polución para el Diseño del Drenaje Pluvial de la Vivienda (Security Measures of Emergency and Flood and Pollution Solutions for Drainage Design Housing).Eduardo Méndez Lavielle - 2012 - Daena 7 (3):35-45.
    Resumen. El drenaje pluvial en Reynosa presenta deficiencias con relación a factores que eviteninundaciones en el sector residencial, estos son la impermeabilidad de los materiales utilizados como elconcreto en las casas, asfalto y concreto en las calles, la redensificación habitacional generando un aumentoconsiderable en el volumen escurrido a las zonas de evacuación, factores reales de diseño en el drenaje pluvialde los valores de impermeabilidad entre otros.Palabras Claves. Medidas de seguridad, emergencia, inundación, polución, drenaje.. Drainage in Reynosa present deficiencies with relation (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Securing the Empirical Value of Measurement Results.Kent W. Staley - 2020 - British Journal for the Philosophy of Science 71 (1):87-113.
    Reports of quantitative experimental results often distinguish between the statistical uncertainty and the systematic uncertainty that characterize measurement outcomes. This article discusses the practice of estimating systematic uncertainty in high-energy physics. The estimation of systematic uncertainty in HEP should be understood as a minimal form of quantitative robustness analysis. The secure evidence framework is used to explain the epistemic significance of robustness analysis. However, the empirical value of a measurement result depends crucially not only on the resulting systematic uncertainty estimate, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  5.  19
    Measuring Military Professionalism in Partner Nations: Guidance for Security Assistance Officials.Pat Paterson - 2019 - Journal of Military Ethics 18 (2):145-163.
    ABSTRACTThe U.S. spends billions of dollars in its security cooperation program to develop “professional, accountable, and capable security forces” in other nations, part of a grand strategy to imp...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  19
    Measuring the end of hunger: Knowledge politics in the selection of SDG food security indicators.Thor Olav Iversen, Ola Westengen & Morten Jerven - 2023 - Agriculture and Human Values 40 (3):1273-1286.
    Ending world hunger remains one of the central global challenges, but the question of how to measure and define the problem is politically charged. This article chronicles and analyses the indicator selection process for SDG 2.1, focusing in particular on the Food Insecurity Experience Scale (FIES) indicator. Despite alleged efforts to separate political and technical aspects in the indicator selection process we find that they were entangled from the start. While there was significant contestation around which indicators should be selected, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  8
    Financing and Oversight of the Application of Invasive Measures for the Purpose of Security and Defense.Leta Bargjieva Miovska - 2023 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 76 (1):601-614.
    Invasive measures, as special investigative measures are defined, are ante delictum measures. They are applied only in situations in which the evidence cannot be obtained by conventional methods, and are needed for the smooth conduct of criminal proceedings. The financial means for the application of these invasive measures for the needs of defence and security are allocated with a budget by the legislative authority. The main hypothesis of this paper states that: supervision over the application (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  19
    Measuring the Psychological Security of Urban Residents: Construction and Validation of a New Scale.Jiaqi Wang, Ruyin Long, Hong Chen & Qianwen Li - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  24
    The Dictator’s Security. Hitler’s Body Guards, Security Measures, Residences, Headquarters. [REVIEW]Milan Hauner - 1978 - Philosophy and History 11 (1):82-83.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  11. Social security and bureaucracy. The 1844 pension law for civil servants employed by the central government and the liberal measures of 1848. [REVIEW]N. Peeters - 1997 - Revue Belge de Philologie Et D’Histoire 75 (2).
  12.  85
    Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
    Security police, state security services, security measures, security politics…a dreadful semantic chain. Everything stubbornly conservative, repressive, antithetical to freedom is expressed in the concept of security. The meaning always implies security for an established order against whatever seems to threaten, disturb or endanger it from without or from within. One can secure, reassure, insure or protect Movements, associations and networks within which a part of the population unites spontaneously can be channeled, controlled or (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  22
    Education, Security and Intelligence Studies.Liam Gearon - 2015 - British Journal of Educational Studies 63 (3):263-279.
    Reference to security and intelligence in education today will undoubtedly elicit concerns over terrorism, radicalisation and, in the UK, counter-terrorism measures such as Channel and Prevent (UK...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  14.  77
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  15. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  24
    Security as Completeness.Matteo Santarelli - 2017 - European Journal of Pragmatism and American Philosophy 9 (1).
    Peirce’s anti-psychologism hinges on two main assumptions. First, logic and psychology belong to two separate disciplines – respectively, the normative sciences and the experimental sciences. Second, externalism must be understood as a crucial and inescapable epistemological criterion. The introspectionist illusion, according to which individuals have direct and epistemologically flawless access to their own internal states, should be dismissed. As Colapietro (2003) and Calcaterra (2006) observe, Peirce’s standpoint is far different from the Kantian classical account of anti-psychologism. This original take on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  19
    The Security Council's Role in Fulfilling the Responsibility to Protect.Jennifer M. Welsh - 2021 - Ethics and International Affairs 35 (2):227-243.
    The principle of the responsibility to protect (RtoP) conceives of a broad set of measures that can be employed in preventing and responding to atrocity crimes. Nevertheless, the UN Security Council remains an important part of the implementation architecture, given what the International Commission on Intervention and State Sovereignty referred to as its authoritative position in international society as the “linchpin of order and stability.” As part of the roundtable “The Responsibility to Protect in a Changing World Order: (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  21
    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks.Jiaqi Liang, Yibei Wu, Jun’E. Li, Xiong Chen, Heqin Tong & Ming Ni - 2021 - Complexity 2021:1-12.
    With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  16
    Psychoanalytic theory and border security.Can E. Mutlu & Mark B. Salter - 2012 - European Journal of Social Theory 15 (2):179-195.
    Freezing is a common sign of panic, a response to accidents or events that overflow our capacity to react. Just as all civil airspace was cleared after the 9/11 attacks, the US-Canada border was also frozen, causing economic slowdowns. Border policies are caught between these two panics: security failures and economic crisis. To escape this paradox, American and Canadian authorities have implemented a series of security measures to make the border ‘smarter’, notably the implementation of biometric identity (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  18
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  19
    Balancing Security and Liberty.Sari Kisilevsky - 2017 - Public Affairs Quarterly 31 (1):19-50.
    This paper examines the legitimacy of the US government’s argument that it must “balance liberty and security” with regard to its policy of trying enemy belligerents in military commissions rather than federal courts. I distinguish between three senses of “balance,” and argue that the policy is ambiguous between the second (internal) and third (emergency external) senses of balance. Neither line of reasoning justifies the policy, however. On the second sense, it is unjustified because it constitutes an arbitrary limitation of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  13
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  61
    Infectious Diseases, Security and Ethics: The Case of Hiv/Aids.Michaelj Selgelid - 2008 - Bioethics 22 (9):457-465.
    Securitization of infectious diseases may involve suspension of ordinary human rights and liberties. In the event of an epidemic, therefore, it is important to limit the occasions upon which draconian disease control measures are implemented in the name of security. The term ‘security’, moreover, should not be used too loosely if it is to retain force and meaning in political discourse. It may be argued that the bar for disease securitization should be set high so that it (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  32
    The Morality of Security : A Theory of Just Securitization.Rita Floyd - 2019 - Cambridge University Press.
    When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  74
    Measuring Unethical Consumer Behavior Across Four Countries.Vince W. Mitchell, George Balabanis, Bodo B. Schlegelmilch & T. Bettina Cornwell - 2009 - Journal of Business Ethics 88 (2):395-412.
    The huge amounts spent on store security and crime prevention worldwide, not only costs international businesses, but also amounts to a hidden tax on those law-binding consumers who bear higher prices. Most previous research has focused on shoplifting and ignored many other ways in which consumers cheat businesses. Using a hybrid of both qualitative research and survey approaches in four countries, an index of 37 activities was developed to examine consumers’ unethical activities across UK, US, France, and Austria. The (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  26.  47
    The Role of Measurement in Establishing Evidence.L. McClimans - 2013 - Journal of Medicine and Philosophy 38 (5):520-538.
    Measurement outcomes are frequently used as evidence in favor of or against medical and surgical interventions, health policies, and system designs. Indeed, in the medical and health services research literature, outcomes are the currency of policy debate and decision making. Yet in the philosophy of science and philosophy of medicine, the measures used in evidence-based medicine (EBM) are rarely discussed. Rather, the focus here is almost exclusively on study design and hierarchies of evidence. This concentration on the methodology of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  27.  28
    National Security, Self-rule, and Democratic Action.David McCabe - 2021 - The Journal of Ethics 25 (2):181-202.
    Most discussions of the relationship between liberty and security focus on the idea that enhancing citizens’ security may require imposing constraints on their civil liberties. This paper explores the question of how measures to enhance security stand vis à vis the idea of political liberty, i.e. the idea of citizens’ collectively directing the power of their state. It distinguishes two models whereby citizens might enact that ideal of self-rule and argues that with respect to issues of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  29
    Security and democratic equality.Brian Milstein - 2021 - Contemporary Political Theory 20 (4):836-857.
    After a recent spate of terrorist attacks in European and American cities, liberal democracies are reintroducing emergency securitarian measures that curtail rights and/or expand police powers. Political theorists who study ESMs are familiar with how such measures become instruments of discrimination and abuse, but the fundamental conflict ESMs pose for not just civil liberty but also democratic equality still remains insufficiently explored. Such phenomena are usually explained as a function of public panic or fear-mongering in times of crisis, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  16
    Taking Measure of the UN's Legacy at Seventy-Five.David M. Malone & Adam Day - 2020 - Ethics and International Affairs 34 (3):285-295.
    Over the past seventy-five years, the UN has evolved significantly, often in response to geopolitical dynamics and new waves of thinking. In some respects, the UN has registered remarkable achievements, stimulating a wide range of multilateral treaties, promoting significant growth of human rights, and at times playing a central role in containing and preventing large-scale armed conflict. As part of the special issue on “The United Nations at Seventy-Five: Looking Back to Look Forward,” this essay argues that the organization has (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  48
    Contributing to food security in urban areas: differences between urban agriculture and peri-urban agriculture in the Global North.Ina Opitz, Regine Berges, Annette Piorr & Thomas Krikser - 2016 - Agriculture and Human Values 33 (4):341-358.
    Food security is becoming an increasingly relevant topic in the Global North, especially in urban areas. Because such areas do not always have good access to nutritionally adequate food, the question of how to supply them is an urgent priority in order to maintain a healthy population. Urban and peri-urban agriculture, as sources of local fresh food, could play an important role. Whereas some scholars do not differentiate between peri-urban and urban agriculture, seeing them as a single entity, our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  32.  31
    Contractualistic measurements of the gender: Possibilities and borders.D. V. Usov - 2019 - Anthropological Measurements of Philosophical Research 15:92-100.
    Purpose. The purpose of the study is critical reconstruction of gender issues within the framework of modern political philosophy and political anthropology, in-depth reflection of the phenomena of justice, identity, human dignity in the aspect of their gender measurements and the search for the answer to the fundamental question for leading gender discourses: is freedom and justice, in fact, possible only together with stresses, a feeling of one’s sense-rooted belonging to one or another community? Theoretical basis. The supplement of the (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  33.  19
    Justice and food security in a changing climate.Hanna Schübel & Ivo Wallimann-Helmer (eds.) - 2021 - Wageningen Academic Publishers.
    The UN's Sustainable Development Goals saw the global community agree to end hunger and malnutrition in all its forms by 2030. However, the number of chronically undernourished people is increasing continuously. Ongoing climate change and the action needed to adapt to it are very likely to aggravate this situation by limiting agricultural land and water resources and changing environmental conditions for food production. Climate change and the actions it requires raise questions of justice, especially regarding food security. 0These key (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  16
    Social Innovation for Food Security and Tourism Poverty Alleviation: Some Examples From China.Guo-Qing Huang & Fu-Sheng Tsai - 2021 - Frontiers in Psychology 12.
    The COVID-19 pandemic has brought hunger to millions of people around the world. Social distancing measures coupled with national lockdowns have reduced work opportunities and the overall household incomes. Moreover, the disruption in agricultural production and supply routes is expected to continue into 2021, which may leave millions without access to food. Coincidentally, those who suffer the most are poor people. As such, food security and tourism poverty alleviation are interlinked when discussing social problems and development. While the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  9
    Common Foreign, Security, and Defense Policy.Ramses A. Wessel - 2015 - In Dennis Patterson (ed.), A Companion to European Union Law and International Law. Wiley-Blackwell. pp. 394–412.
    The Common Foreign and Security Policy (CFSP) objectives are an integral part of the overall objectives of the European Union and the policy area has developed from a purely intergovernmental form of cooperation in the days of the European political cooperation to an area in which the member states have increasingly accepted new forms of institutionalization. CFSP decisions are taken by the General Affairs Council, consisting of the ministers for foreign affairs of the member states. In spite of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  36
    Doctrine as security? A systematic theological critique of the operational theological framework of the controversial South African neo-Pentecostal prophets.Collium Banda - 2021 - HTS Theological Studies 77 (4):1-10.
    This research article uses the theoretical framework of doctrine as believer's security to critique the theological framework behind the controversial activities reported amongst some South African neo-Pentecostal prophets, which include feeding congregants with grass, spraying them with insecticides and sexual violation of women congregants. The framework of the article falls within the discipline of systematic theology by raising the importance for South African Christians to develop a critical doctrinal framework for protecting themselves from controversial NPPs. The following main question (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  37.  46
    Understanding How Climate Change Impacts Food Security and Human Development in the Fragile States.Ane Cristina Figueiredo Pereira de Faria - 2018 - Journal for Peace and Justice Studies 28 (1):3-39.
    Human security is being threatened as a consequence of climate change. However, the human security paradigm still needs to be addressed as a cause and effect of environmental degradation. Therefore, this article aims to comprehend the impacts of climate change in fragile states regarding food security and human development. The article is a comparative case study of the five most vulnerable countries in Africa: Somalia, South Sudan, Central African Republic, Sudan, and Congo (Dem. Republic). This research contends (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  14
    Study on the Heterogeneity of Social Security Affecting the Sense of Security of Urban and Rural Residents.Yuanfeng Liu & Shujiao Luo - 2022 - Complexity 2022:1-6.
    Social security is an important part of the national security system from the perspective of the overall security concept, and social security is an important influencing factor of social security. Using the CFPS2018 data, this study uses the critical weight method to measure residents’ individual security and uses path analysis to empirically study the impact of endowment insurance and medical insurance on residents’ security in urban and rural areas. The results show that the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  28
    Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
    This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As discussed in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  45
    Community food security: Practice in need of theory? [REVIEW]Molly D. Anderson & John T. Cook - 1999 - Agriculture and Human Values 16 (2):141-150.
    Practitioners and advocates of community food security (CFS) envision food systems that are decentralized, environmentally-sound over a long time-frame, supportive of collective rather than only individual needs, effective in assuring equitable food access, and created by democratic decision-making. These themes are loosely connected in literature about CFS, with no logical linkages among them. Clear articulation in a theoretical framework is needed for CFS to be effective as a guide for policy and action. CFS theory should delimit the level of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  41.  24
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  45
    Diversification and energy security risks: the Japanese case.S. Hayden Lesbirel - 2004 - Japanese Journal of Political Science 5 (1):1-22.
    This article explores the relationship between diversification and energy security risks. It uses portfolio theory to conceptualise energy security as an insurance mechanism against disruptions to energy import markets. It provides quantitative measures of systematic and specific risks associated with Japanese energy imports during the period 1970—99. It suggests that Japan's policy of diversification of energy import sources has reduced specific risks, although fundamental changes in the political and economic structure of international energy and, in particular, oil (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  43.  18
    Covid-19 Pandemic and the Freedom-Security Tension: Calibrating their Fragile Relationship.Pablo Martín Méndez - 2023 - Foucault Studies 35:192-210.
    Grounded in a will to adapt to dangers, and espouse both responsibility and resilience, voluntary measures have largely replaced one of the oldest public health strategies, quarantine. The Covid-19 pandemic, however, elicited a broad sweep of tactics from the archive of public health armoury. On a general level, this review essay addresses the common measures rolled out by various authorities against the pandemic - the lock-downs, reopening process, financial support and vaccination. By relating these measures to 1) (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44. Gendered security/national security : political branding and population racism.Patricia Ticineto Clough & Craig Willse - 2018 - In The user unconscious: on affect, media, and measure. Minneapolis: University of Minnesota Press.
  45.  49
    World Food Security and Agriculture in a Globalizing World.Eric Tollens & Johan de Tavernier - 2006 - Ethical Perspectives 13 (1):91-115.
    There is an increasing awareness of the importance of food security, of which the UN’s Millennium Development Goals are the best measure. Although some progress has been made in some regions, much progress still needs to be made in Sub-Saharan Africa, where agriculture largely remains subsistence and personal savings extremely low, and where population growth outstrips economic growth.Thus, there has been a renewed effort to bring these problems back on the development agenda. Food insecurity is a major manifestation of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46. (1 other version)Handguns, Moral Rights, and Physical Security.David DeGrazia - 2014 - Journal of Moral Philosophy 11 (1):56-76.
    Guns occupy a major—sometimes terrible—place in contemporary American life. Do Americans have not only a legal right, but also a moral right, to own handguns? After introducing the topic, this paper examines what a moral right to private handgun ownership would amount to. It then elucidates the logical structure of the strongest argument in favor of such a right, an argument that appeals to physical security, before assessing its cogency and identifying two questionable assumptions. In light of persisting reasonable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  47.  80
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  54
    Opportunistic Disclosures of Earnings Forecasts and Non-GAAP Earnings Measures.Jeffrey S. Miller - 2009 - Journal of Business Ethics 89 (S1):3 - 10.
    The Securities and Exchange Commission requires publicly held US corporations to disclose all information, whether it is positive or negative, that might be relevant to an investor's decision to buy, sell, or hold a company's securities. The decisions made by corporate managers to disclose such information can significantly affect the judgments and decisions of investors. This paper examines academic accounting research on corporate managers' voluntary disclosures of earnings forecasts and non-GAAP earnings measures. Much of the evidence from this research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  16
    Biopolitics and (in)security in Foucault: elements for a diagnosis of the management of the COVID-19 pandemic in Brazil.Daniel Verginelli Galantin & Thiago Fortes Ribas - 2022 - Revista de Filosofia Aurora 34 (61).
    Faced with the criticism of the biopolitical control exercised in the COVID-19 pandemic, we defend the importance of a re-examination of the foucauldian reflections so that the critical diagnoses of the present is accompanied by a careful analysis of the fields of force and knowledges in which such controls occur. Bearing in mind the correlation between security mechanisms and the management of insecurities, we argue that in the management of the pandemic by the brazilian executive government, the excesses of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  15
    Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation.Iztok Prezelj - 2015 - International Studies. Interdisciplinary Political and Cultural Journal 17 (1):145-158.
    Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation. The paper’s results show that (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 967