Results for 'Vehicular security'

988 found
Order:
  1.  12
    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks.Mei Sun, Yuyan Guo, Dongbing Zhang & MingMing Jiang - 2021 - Complexity 2021:1-13.
    Vehicular ad hoc network is a multihop mobile wireless communication network that can realize many vehicle-related applications through multitop communication. In the open wireless communication environment, security and privacy protection are important contents of VANET research. The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  3. Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3):264-276.
    The U.S. military is developing augmented reality (AR) capabilities for use on the battlefield as a means of achieving greater situational awareness. The superimposition of digital data—designed to expand surveillance, enhance geospatial understanding, and facilitate target identification—onto a live view of the battlefield has important implications for virtuous conduct in war: Can the soldier exercise practical wisdom while integrated into a system of militarized legibility? Adopting a virtue ethics perspective, I argue that AR disrupts the soldier’s immersion in the scene (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  5.  32
    Criminogenic Security of Law in the EU and Lithuanian Legislation.Viktoras Justickis & Vidmantas Egidijus Kurapka - 2009 - Jurisprudencija: Mokslo darbu žurnalas 117 (3):217-238.
    The study focuses on the phenomenon of crime-causing (criminogenic) law. It includes a review of related studies on such laws and their criminal side-effects, the change in the legislator’s liability for effects of enacted laws, and the effects of the legislator’s afflatus on the potential criminogenic effects of law. Of special concern are cases where the legislator is aware of the potential criminogenic side-effects of a new law but carelessly neglects them. The study evaluates the tool for detection of probable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  7.  21
    Assessing Security Technology’s Impact: Old Tools for New Problems.Reinhard Kreissl - 2014 - Science and Engineering Ethics 20 (3):659-673.
    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  88
    Security as a Selective Project.Alice Hills - 2009 - Studies in Social Justice 3 (1):79-97.
    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities, where the principal political weapons are coercion and intimidation, and territoriality is a significant facet of security’s physical dimension and exclusionary tendencies. Cities such as Baghdad and Basra are divided into ethnic or sectarian areas, and security’s referent object is an identity or group. Friction exists between the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  11
    Securing the Pandemic: Biopolitics, Capital, and COVID-19.Mark G. Kelly - 2023 - Foucault Studies 35:46-69.
    In this article, I consider the interoperation of twin contemporary governmental imperatives, fostering economic growth and ensuring biopolitical security, in the face of the COVID-19 pandemic. At a theoretical level, I thereby consider the question of the applicability of a Marxist analysis vis-à-vis a Foucauldian one in understanding state responses to the pandemic. Despite the apparent prioritization of preserving life over economic activity by governments around the world in this context, I will argue that the basic problem that COVID-19 (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  34
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  12.  30
    Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks.Haleem Farman, Bilal Jan, Muhammad Talha, Abi Zar, Huma Javed, Murad Khan, Aziz Ud Din & Kijun Han - 2018 - Complexity 2018:1-12.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  25
    Subliminal primes for global or local processing influence judgments of vehicular traffic.Stefanie Hüttermann, Otmar Bock & Daniel Memmert - 2014 - Consciousness and Cognition 29:230-234.
  14.  42
    Diseño y aplicación de una metodología para determinar ciclos de conducción vehicular en la ciudad de Pereira.Restrepo Victoria, Alvaro Hernán, Carranza Sánchez, Yamid Alberto & Juan Esteban Tibaquirá - forthcoming - Scientia.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  33
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  18
    Lengua vehicular y geopolítica: La posición de España.José Ramón Bravo García - 2022 - Eikasia Revista de Filosofía 99:291-334.
    Lengua vehicular y geopolítica: La posición de España.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  12
    Security, Strategy, and Critical Theory.R. G. Wyn Jones - 1999 - Lynne Rienner Publishers.
    Preface Acknowledgments Introduction 1 Pt. 1 Traditional and Critical Theory 1 Promise: Toward a Critical Theory of Society 9 2 Impasse: Emancipatory Politics After Auschwitz 29 3 Redemption: Renewing the Critical Project 53 Pt. 2 Traditional and Critical Security Studies 4 Theory: Reconceptualizing Security 93 5 Technology: Reconceptualizing Strategy 125 6 Emancipation: Reconceptualizing Practice 145 Epilogue 165 Bibliography 169 Index 187 About the Book 191.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. (1 other version)Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1995 - Routledge.
    _Terrorism, Security and Nationality_ shows how the ideas and techniques of political philosophy can be applied to the practical problems of terrorism, State violence and national identity. In doing so it clarifies a wide range of issues in applied political philosophy including ethics of war; theories of state and nation; the relationship between communities and nationalisms; human rightss and national security. Paul Gilbert identifies conflicting conceptiona of civil strife by different political communities and investigates notions of terrorism both (...)
     
    Export citation  
     
    Bookmark   1 citation  
  19.  25
    Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  28
    Food Security: One of a Number of ‘Securities’ We Need for a Full Life: An Australian Perspective.Quentin Farmar-Bowers - 2014 - Journal of Agricultural and Environmental Ethics 27 (5):811-829.
    Although agriculture in Australia is very productive, the current food supply systems in Australia fail to deliver healthy diets to all Australians and fail to protect the natural resources on which they depend. The operation of the food systems creates ‘collateral damage’ to the natural environment including biodiversity loss. In coming decades, Australia’s food supply systems will be increasingly challenged by resource price inflation and climate change. Australia exports more than half of its current agricultural production. Government and business are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  27
    Foucauldian security and the threat to democratic policy-making.Richard Togman - 2021 - Critical Review of International Social and Political Philosophy 24 (2):230-252.
    The exercise of power has radically changed in the modern era and is creating new challenges for democracy and democratic policy-making. Michel Foucault has introduced a whole new vocabulary to the understanding of governance which is critical to conceptualizing both the changing nature of power and its implications for democracy. Foucault articulates three fundamental ways in which the state has sought to maintain control of, act upon and maximize its capabilities through those under its charge: sovereign, discipline and security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  85
    Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
    Security police, state security services, security measures, security politics…a dreadful semantic chain. Everything stubbornly conservative, repressive, antithetical to freedom is expressed in the concept of security. The meaning always implies security for an established order against whatever seems to threaten, disturb or endanger it from without or from within. One can secure, reassure, insure or protect Movements, associations and networks within which a part of the population unites spontaneously can be channeled, controlled or combatted. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  34
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  24
    Security as Completeness.Matteo Santarelli - 2017 - European Journal of Pragmatism and American Philosophy 9 (1).
    Peirce’s anti-psychologism hinges on two main assumptions. First, logic and psychology belong to two separate disciplines – respectively, the normative sciences and the experimental sciences. Second, externalism must be understood as a crucial and inescapable epistemological criterion. The introspectionist illusion, according to which individuals have direct and epistemologically flawless access to their own internal states, should be dismissed. As Colapietro (2003) and Calcaterra (2006) observe, Peirce’s standpoint is far different from the Kantian classical account of anti-psychologism. This original take on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Securing the nots: moral epistemology for the quasi-realist.Simon Blackburn - 1996 - In Walter Sinnott-Armstrong & Mark Timmons (eds.), Moral knowledge?: new readings in moral epistemology. New York: Oxford University Press. pp. 82--100.
     
    Export citation  
     
    Bookmark   37 citations  
  26.  18
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  28. Modal Security.Justin Clarke-Doane & Dan Baras - 2019 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  29.  15
    (1 other version)Taking Security Seriously.Casadei Thomas - 2017 - Governare la Paura. Journal of Interdisciplinary Studies 10 (1).
    This essay focuses on the national and international policies aiming at dealing with the extremely complex and various issue of security. «Taking security seriously» means to analyse in depth the many shades of this concern: from the immigration processes, until the reconsideration of the urban spaces, looking at the Mediterranean and the European specificities. This kind of reflections can be useful in a perspective of preventing security, engaging institutions.__.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  27
    Secure key distribution via pre- and post-selected quantum states.Jeffrey Bub - unknown
    A quantum key distribution scheme whose security depends on the features of pre- and post-selected quantum states is described.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  9
    Securing recipiency in workplace meetings: Multimodal practices.Trini Stickle & Cecilia E. Ford - 2012 - Discourse Studies 14 (1):11-30.
    As multiparty interactions with single courses of coordinated action, workplace meetings place particular interactional demands on participants who are not primary speakers as they work to initiate turns and to interactively coordinate with displays of recipiency from co-participants. Drawing from a corpus of 26 hours of videotaped workplace meetings in a midsized US city, this article reports on multimodal practices – phonetic, prosodic, and bodily-visual – used for coordinating turn transition and for consolidating recipiency in these specialized speech exchange systems. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  1
    Security in the light of select philosophical and social concepts. Between theory and practice.Wojciech Gizicki - 2013 - Filosofija. Sociologija 24 (3).
    Security is one of the basic values in the life of an individual, society, nation, country, and also at the international level. However, modern security is composed of efficient utilization of the potential within diplomacy and strength, a balanced relationship between soft and hard power. This text aims at presenting an overview of security concepts included in the selected philosophical and social models. This involves bringing closer specific theories and practical actions based on them. Nowadays, this can (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  13
    Societal Security Trust Issues in Australia during the COVID-19 Pandemic in 2020.Jowita Brudnicka-Żółtaniecka - 2022 - International Studies. Interdisciplinary Political and Cultural Journal 26 (2):69-85.
    In late December 2019 and early January 2020 the first cases of a new coronavirus occurred in Wuhan. It is a virus characterised by similarities to SARS and MERS. On January 25, 2020 the initial case of infection by SARS-CoV-2 caused the disease COVID-19 in an Australian patient who later died from it. During my PhD thesis defence in September 2018 I would not have thought that one of the possible security scenarios which I designed for the South Pacific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  16
    Ecological Security Evaluation for Marine Ranching Based on the PLTS/ANP Method: A Case Study of Rongcheng.Yuan-Wei Du & Qiong Song - 2022 - Complexity 2022:1-16.
    The evaluation index system of ecological security of marine ranching is based on the assumption that there is independence among evaluation indexes in the existing studies, which ignores the complex interactive paths of marine ranching as an artificial ecosystem. In this study, the MRES evaluation network model that includes interdependent relationships is established based on the Driver-Pressure-State-Impact-Response model and the analytic network process method. Then, the probabilistic linguistic term sets and analytic network process methods are used to calculate the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  22
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market intermediaries to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
    Developments in genetics, cyber-technology, nanotechnology, biotechnology, artificial intelligence, and other areas hold the promise – and the peril – of redefining what it means to be human. In addition to hedonism or a desire for self-improvement, the possibilities of these technologies plus the rational concern of falling behind a potential adversary produce a classic security dilemma. These competitive pressures among states, firms, and emerging “super-empowered individuals” encourage the development and dissemination of these technologies, and already the possibilities are being (...)
     
    Export citation  
     
    Bookmark   4 citations  
  37.  31
    Social security reform: Lessons from private pensions.Karen C. Burke & Grayson M. P. McCouch - unknown
    Widespread concerns about the long-term fiscal gap in Social Security have prompted various proposals for structural reform, with individual accounts as the centerpiece. Carving out individual accounts from the existing system would shift significant risks and responsibilities to individual workers. A parallel development has already occurred in the area of private pensions. Experience with 401 plans indicates that many workers will have difficulty making prudent decisions concerning investment and withdrawal of funds. Moreover, in implementing any system of voluntary individual (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  9
    Securities law and the new deal justices.Adam C. Pritchard & Robert B. Thompson - unknown
    Taming the power of Wall Street was a principal campaign theme for Franklin Delano Roosevelt in the 1932 election. Roosevelt's election bore fruit in the Securities Act of 1933, which regulated the public offering of securities, the Securities Exchange Act of 1934, which regulated stock markets and the securities traded in those markets, and the Public Utility Holding Company Act of 1935 (PUHCA), which legislated a wholesale reorganization of the utility industry. The reform effort was spearheaded by the newly created (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Security, Profiling and Equality.Paul Bou-Habib - 2008 - Ethical Theory and Moral Practice 11 (2):149-164.
    How, exactly, must we strike the balance between security and equality? Must we insist, out of respect for the equality of persons, that the police refrain from using ethnic profiling and opt for some other strategy in their pursuit of terrorists, or must we allow the police to continue with this policy, which seems to sacrifice equality for the sake of security? This paper assesses the ethical status of ethnic profiling from the perspective of the ideal of equality. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40. Is U.N. Security Council Authorisation for Armed Humanitarian Intervention Morally Necessary?Ned Dobos - 2010 - Philosophia 38 (3):499-515.
    Relative to the abundance of literature devoted to the legal significance of UN authorisation, little has been written about whether the UN’s failure to sanction an intervention can ever make it immoral. This is the question that I take up here. I argue that UN authorisation (or lack thereof) can have some indirect bearing on the moral status of a humanitarian intervention. That is, it can affect whether an intervention satisfies other widely accepted justifying conditions, such as proportionality, “internal” legitimacy, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  41.  42
    Legal Security from the Point of View of the Philosophy of Law.Gregorio Peces-Barba Martínez - 1995 - Ratio Juris 8 (2):127-141.
    . The author analyses the concept of legal security from its historical evolution to its main structural aspects. In the first part he argues that legal security is a historical and cultural concept of the modern world. He considers a series of factors which lead from the general concept of security generated by an ideological monism and the social rigidity characterizing the Middle Ages to the concept of legal security protected by the legal monism of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  50
    Contemporary 'vehicularity' and 'romanticism': debating the status of ideas and intellectuals.Gregor McLennan & Thomas Osborne - 2003 - Critical Review of International Social and Political Philosophy 6 (4):51-66.
    (2003). Contemporary ‘vehicularity’ and ‘romanticism’: debating the status of ideas and intellectuals. Critical Review of International Social and Political Philosophy: Vol. 6, The Public Role of Intellectuals, pp. 51-66. doi: 10.1080/1369823042000241267.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  73
    Human security and the international refugee crisis.Aramide Odutayo - 2016 - Journal of Global Ethics 12 (3):365-379.
    Despite offering some protection for refugees, realpolitik in international affairs ensures that the paradigm of human security remains aspirational rather than practical. This paper begins by providing a brief snapshot of the current global refugee crisis, encompassing multiple local crises in the Middle East, Europe, Africa, and Latin America. It next details the international community’s response to these crises, highlighting the punitive policies used by the Australian government and the European Union to impede the asylum process. Lastly, the paper (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  10
    Security, technology and global politics: thinking with Virilio.Mark J. Lacy - 2014 - London: Routledge.
    This book analyses some of the key problems explored in Paul Virilio's theorising on war and security.Virilio is one of the most challenging and provocative critics of technology, war and globalisation. While many commentators focus on the new possibilities for mobility and communication in an interconnected world, Virilio is interested in the role that technology and security play in the shaping of our bodies and how we come to see the world -- what he terms the 'logistics of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  46.  64
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  14
    Job Security and Organizational Citizenship Behaviors in Chinese Hybrid Employment Context: Organizational Identification Versus Psychological Contract Breach Perspective Differences Across Employment Status.Wenzhu Lu, Xiaolang Liu, Shanshi Liu & Chuanyan Qin - 2021 - Frontiers in Psychology 12.
    The goal of the present research was to identify the mechanism through which job security exerts its different effects on organizational citizenship behaviors among contract and permanent employees from social identity and social exchange perspectives. Our research suggests two distinct, yet related explanatory mechanisms: organizational identification and psychological contract breach, to extend the job security literature by examining whether psychological contract breach and organization identity complement each other and explaining the mechanism of different behaviors response to job (...) across employment status. Data were collected from 211 Chinese employees and 61 supervisory ratings of OCBs. Our results showed that relative to psychological contract breach, organizational identification plays a stronger mediating role in the association between job security and OCBs. Evidence from multi-group analyses also suggested employment status moderated the mediation mechanism of organizational identification between job security and OCB. Implications for job security and hybrid employment management are discussed. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Security and liberty (new philosophy of police and civil liberties in a law state).P. Koreny - 2000 - Filozofia 55 (9):673-691.
    The problem of preferential rules embodies several essential issues of searching for the optimal proportion between the security provided by the police and the liberties of citizens. Preferential rules are related to various particular conflicts brought about by carrying out the security functions of the police. The rules consist of values, that ought to be profoundly judged in every particular situation, as well as of proofable standards of various emergencies, i. e. the threats to the values secured by (...)
     
    Export citation  
     
    Bookmark  
  49.  15
    Securing obligations: a reply to Hindriks.Mattias Gunnemyr & Caroline Torpe Touborg - 2024 - Erasmus Journal for Philosophy and Economics 17 (1):aa-aa.
    In his contribution to this special issue, Hindriks considers the Security Principle, an account of pro tanto obligations based on our account of reasons (Gunnemyr and Touborg 2023a). According to the Security Principle, you have a pro tanto obligation not to perform an action that makes a harm more secure. Hindriks raises two objections to this account. First, that it is too flexible; second, that it gives wrong verdicts when agents are robustly unwilling to act in a certain (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50. Against security.Mark Neocleous - 2000 - Radical Philosophy 100:7-15.
1 — 50 / 988