Results for 'campus security'

985 found
Order:
  1.  11
    Unravelling College Students’ Fear of Crime: The Role of Perceived Social Disorder and Physical Disorder on Campus.Marlies Sas, Wim Hardyns, Genserik Reniers & Koen Ponnet - 2022 - British Journal of Educational Studies 70 (1):65-85.
    The current study explores the role of individual and environmental determinants on students’ fear of crime. Based on a large-scale survey among students of a Belgian university (n = 1,463), the relationship between perceived social and physical disorder and the three dimensions of fear of crime (perceived risk of victimization, feelings of anxiety, avoidance behaviour) is examined. Support was found for a relationship between perceived social and physical disorder and perceived risk of victimization. Moreover, a relationship was found between students’ (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  27
    Campus Feminisms: A Conversation with Jess Lishak, Women’s Officer, University of Manchester Students’ Union, 2014–2016.Neil Cobb & Nikki Godden-Rasul - 2017 - Feminist Legal Studies 25 (2):229-252.
    Drawing from a long history of feminist writing grounded in personal reflection and informal dialogue between feminist thinkers, Cobb and Godden-Rasul present an email-based conversation with Jess Lishak, the outgoing Women’s Officer at the University of Manchester Students’ Union. The conversation draws on Cobb and Godden-Rasul’s experience as feminist academics engaged in critical institutional practice through such initiatives as editing the Inherently Human blog, organising the Inspirational Women of Law exhibition, and participating in university working groups on campus-based harassment (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  85
    Hate Speech on Campus: What Public Universities Can and Should Do to Counter Weaponized Intolerance.Rex Welshon - 2020 - Res Publica 26 (1):45-66.
    Democratic societies tolerate intolerance, but that obligation finds its limit when the security of its citizens is jeopardized or its institutions of liberty are imperiled. Similarly, universities tolerate intolerance, but that obligation finds its limit when threatened by weaponized intolerance advocates who disenfranchise and denigrate community members and imperil academic norms and professional standards of conduct. Then, just as democratic societies must protect their threatened citizens and safeguard their imperiled institutions of liberty, so universities must protect their threatened community (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  10
    4th National Cyber Security Workshop, 11-12 Nov 2016, Mumbai.Anthony Lobo - 2016 - International Review of Information Ethics 25.
    The 4th National Cyber Security Workshop organised by IEEE India Council was held in Mumbai at the sprawling Yantra Park, Thane Campus of Tata Consultancy Services on 11 & 12 November, 2016. This event follows two successful editions of the workshop in Ahmedabad and Bangalore.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  66
    To Conceal and Carry or Not to Conceal and Carry on Higher Education Campuses, That is the Question.Termika N. Smith - 2012 - Journal of Academic Ethics 10 (3):237-242.
    This article addresses conceal and carry laws on higher education campuses as ethical and social dilemmas. The Second Amendment reads, “A well regulated Militia, being necessary to the security of a Free State, the right of the people to keep and bear Arms, shall not be infringed” (U. S. Const. amend. II 1791 ). Proponents for conceal and carry laws on college and university campuses often interpret the Second Amendment as an overarching right to have weapons, regardless of location. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  7
    Deconstruction and Reconstruction of Information Security in Ideological and Political Education in the Digital Age.Mo Lingqi, Hariharan N. Krishnasamy, Lu Qiaoqiao & Wu Zhuoyang - forthcoming - Evolutionary Studies in Imaginative Culture:1-13.
    In the context of the digital wave sweeping modern education, securing the information safety of ideological and political education in universities is of paramount importance. Based on the comprehensive risk mechanism, this paper deconstructs the connotation of information security of ideological and political education in higher education in the digital age, divides it into two categories: ideological risk and technical risk, and constructs the influence model of information security level of ideological and political education. Data were collected via (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  28
    Communities of Judgment.Allan Gibbard - 1989 - Social Philosophy and Policy 7 (1):175.
    Walk across a campus on a beautiful fall day and observe what a conversing species we are. Chimpanzees can be taught to talk a little, in sign language. Put educated chimpanzees together, though, and they turn out to have nothing to say to each other. We humans are different; we can even find silence awkward. Language does many things for us; conveying straight information is the most obvious. I want to stress, though, some of the ways that talk adjusts (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  16
    Defense, Redemption, Care: Black Feminist and Queer Studies.James Bliss - 2021 - Feminist Studies 47 (1):34-61.
    In lieu of an abstract, here is a brief excerpt of the content:34 Feminist Studies 47, no. 1. © 2021 by Feminist Studies, Inc. James Bliss Defense, Redemption, Care: Black Feminist and Queer Studies Literary theory continues to be received by some as if it were an alien or antagonistic presence from whose leaden and reductive grasp it is imperative to keep literature protected. It is rare, however, that it is the literary, as such, that is being protected, rather than (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  10
    Data leaking scandal, risks, and financial consumption behaviors in online tourism platforms: The role of trust on college students and teachers.Mingfen Feng, Bin Hu, Yaqi Tian & Huabing Wang - 2022 - Frontiers in Psychology 13.
    Given the importance of data safety for psychology, the present study investigated the influence of data leaking scandal on campus customers’ financial consumption behaviors at intelligent tourism platforms in China, and explored the roles that individual characteristics play in this process by focusing on a set of participants from colleges. Data were collected through sending out an online questionnaire, where respondents were asked to finish a series of questions about their background information, their trust, future consuming intention, and defensive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  32
    The Militarization of US Higher Education after 9/11.Henry A. Giroux - 2008 - Theory, Culture and Society 25 (5):56-82.
    Subject to severe financial constraints while operating within a regime of moral panics driven by the `war on terrorism', higher education in the United States faces both a legitimation crisis and a political crisis. With its increasing reliance on Pentagon and corporate interests, the academy has largely opened its doors to serving private and governmental interests and in doing so has compromised its role as a democratic public sphere. This article situates the development of the university as a militarized knowledge (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  4
    Arms and the University: Military Presence and the Civic Education of Non-Military Students.Donald Alexander Downs & Ilia Murtazashvili - 2003 - Cambridge University Press.
    Alienation between the U.S. military and society has grown in recent decades. Such alienation is unhealthy, as it threatens both sufficient civilian control of the military and the long-standing ideal of the 'citizen soldier'. Nowhere is this issue more predominant than at many major universities, which began turning their backs on the military during the chaotic years of the Vietnam War. Arms and the University probes various dimensions of this alienation, as well as recent efforts to restore a closer relationship (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  36
    Out the Door: A Short History of the University of Toronto Collection of Historical Scientific Instruments.Erich Weidenhammer & Michael Da Silva - 2010 - Spontaneous Generations 4 (1):255-261.
    Since the late 1970s, various attempts have been made to organize the scientific instruments used in research carried out at the University of Toronto into a catalogued, protected, and accessible collection. Unlike other major research universities with which Toronto compares itself, such as Harvard, Yale, Oxford and Cambridge, to name only a few, these efforts have not been successful. The failure to implement even a modest campus-wide program to safeguard the university's material heritage has had unfortunate consequences. Nevertheless, a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  13.  19
    Proposing a Health Humanities Minor: Some Lessons.Virginia Bucurel Engholm & Damon Boria - 2017 - Journal of Medical Humanities 38 (4):409-417.
    For those interested in developing baccalaureate programs in health humanities, this essay draws on our experience of developing a minor in health humanities to share insights on what to expect, strategies that work well, and how to deal with obstacles. These insights range from how to explain the concept of health humanities to stakeholders to how to decide where to house a health humanities program. We share our insights in a way that promises to translate well to different institutional contexts. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. What does it mean to occupy?Tim Gilman & Matt Statler - 2012 - Continent 2 (1):36-39.
    Place mouse over image continent. 2.1 (2012): 36–39. From an ethical and political perspective, people and property can hardly be separated. Indeed, the modern political subject – that is, the individual, the person, the self, the autonomous actor, the rational self-interest maximizer, etc. – has taken shape in and through the elaboration, institutionalization, and enactment of that which rightfully belongs to it. This thread can be traced back perhaps most directly to Locke’s notion that the origin of the political state (...)
     
    Export citation  
     
    Bookmark  
  15.  26
    Transactional sex and the ‘aristo’ phenomenon in Nigerian universities.Oludayo Tade & Adeshewa Adekoya - 2012 - Human Affairs 22 (2):239-255.
    ‘Aristocratic’ transactional relationships are widespread in Nigerian universities. Nigerian cultures positively sanction repressive sexual activities among single unmarried adolescents until the wedding night. Modernity has confronted this cultural prescription, as youths, particularly girls, engage in transactional exchange in different contexts. However, the literature on transactional sex in the ivory towers is not rich enough on client recruitment and management among female undergraduates in Nigeria. This study utilised in-depth interviews to collect data from 30 purposively selected female undergraduates. Findings show that (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Organizational Performance of Higher Education Institutions in the Philippines.Jennifer Cabaron - manuscript
    The study aimed to look into the organizational performance of Higher Education Institutions in the Philippines particularly in Zamboanga del Norte. The descriptive method of research was used. There were 95 respondents to the survey. Frequency count, percentage, and Mean were used as a statistical tool. The investigation revealed that organizational performance of the Higher Education Institutions involved was found to be very good along the areas of VMGO, faculty, curriculum and instruction, support to students, research, extension, library, physical plant (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17. Students’ perspectives on drugs and alcohol abuse at a public university in Zambia.Nicholas Mwanza & Ganizani Mwale - 2023 - HTS Theological Studies 79 (3):8.
    Access to students’ perspectives on substance abuse is essential for effective youth intervention projects development. This study aimed to explore students’ perspectives on abuse of drugs and alcohol with probable development of student-led intervention strategies. The study was conducted at public universities in Zambia. Student’s perspectives on drugs and alcohol abuse were documented using a mixed method design that employed purposive and snowball sampling to select 200 respondents to questionnaires and 10 to in-depth interviews. A humanistic theory approach was applied (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  68
    The Factors Predicting Students' Satisfaction with University Hostels, Case Study, Universiti Sains Malaysia.Fatemeh Khozaei, Nadia Ayub, Ahmad Sanusi Hassan & Zahra Khozaei - 2010 - Asian Culture and History 2 (2):P148.
    This study was administrated to undergraduate students living in the various hostels of Universiti Sains Malaysia. The primary purpose of this study was to identify the most important factors that predict undergraduate students’ level of satisfaction with the student hostels they are living in. This paper also explored the difference in the satisfaction levels of students living in hostels within the campus and those living in hostels outside the campus. Based on literature review, it was hypothesized that there (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  19.  17
    (1 other version)Editorial Vol.6(3).Tahera Ahmed - 2016 - Bangladesh Journal of Bioethics 6 (3).
    Dear Readers,Welcome to this issue of our beloved Bangladesh Journal of Bioethics! In this sweltering heat we are all seeking for some cool and comfort. We bring this issue of BJB on different ethical practices and bring up related questions. Are we respecting the rights of every human being when we are either doing research or practicing health service provision? What are the minimum norms and standards to be maintained or are we circumventing those? The issue looks into different issues (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  58
    A new Epithet of Juno.J. Whatmough - 1922 - Classical Quarterly 16 (3-4):190-.
    An inscription found in 1912 near Praeneste,1 and now easily accessible in the new edition of Vol. I. of the Corpus of Latin inscriptions , records a dedication in honour of Juno PALOS-CARIA , an epithet previously unknown, and not yet, I believe, satisfactorily explained. Rosenberg's attempted explanation will not secure many adherents, while that of Lommatzsch , who would connect the word with palus -udis, and see an allusion to the ‘paludes Pomptinae,’ involves us in serious, though not insuperable, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  21.  13
    The Revised MRS: Gender Complementarity at College.Laura T. Hamilton - 2014 - Gender and Society 28 (2):236-264.
    Using an ethnographic and longitudinal interview study of college women and in-depth interviews with their parents, I argue that mid-tier flagship universities still push women toward gender complementarity—a gender-traditional model of economic security pairing a career oriented man with a financially dependent woman. Combining multilevel and intersectional theories, I show that the infrastructure and campus peer culture at Midwest University supports this gendered logic of class reproduction, which reflects an affluent, white, and heterosexual femininity. I argue that this (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  17
    Peculiarities of Distance Learning Platforms Usage in Law Enforcement Educational Institutions during the Covid-19 Pandemic.Ihor Bloshchynskyi - 2022 - Postmodern Openings 13 (2):514-527.
    The article reviews the peculiarities of distance learning platforms usage in law enforcement educational institutions during the Covid-19 pandemic. Distance learning at U.S. Federal Law Enforcement Training Center, which is based on the Online Campus have been substantiated. Particular attention is paid to topical issues of training on such online training mod-ules of the Campus: crime scene, driving training, drugs, firearms, health, interviews, investigation, law, topography, maritime training, personal security, technical means, terrorism, stopping vehicles, etc. There are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  19
    Human risk factors in cybersecurity.Tom Cuchta, Brian Blackwood, Thomas R. Devine & Robert J. Niichel - 2023 - Interaction Studies 24 (3):437-463.
    This article presents an experimental analysis of several cybersecurity risks affecting the human attack surface of Fairmont State University, a mid-size state university. We consider two social engineering experiments: a phishing email barrage and a targeted spearphishing campaign. In the phishing experiment, a total of 4,769 students, faculty, and staff on campus were targeted by 90,000 phishing emails. Throughout these experiments, we explored the effectiveness of three types of phishing awareness training. Our results show that phishing emails that make (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  83
    Who's Afraid of Feminism? [REVIEW]Susan Dwyer - 1996 - Dialogue 35 (2):327-342.
    Philosopher Christina Hoff Sommers's target inWho Stole Feminism? How Women Have Betrayed Womenis “gender feminism.” Her aim is to convince us that gender feminists are anti-intellectual opportunists who deliberately spread lies about the incidence of date rape (chap. 10), domestic battery (Preface, chap. 9) and about the general state of male-female relations in America (chaps. 1, 9 and 11), thereby generating fear and resentment of men (chap. 2), all so that they may secure vast amounts of government funding and high-paying (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  25. K P. Singh.Muzaffarpur Campus-Dholi - 1992 - In B. C. Chattopadhyay (ed.), Science and technology for rural development. New Delhi: S. Chand & Co.. pp. 29.
    No categories
     
    Export citation  
     
    Bookmark  
  26.  18
    T.E. Frosini, C. Bassu e P. Petrillo (a cura di), Il presidenzialismo che avanza.D. Campus - 2011 - Polis: Research and studies on Italian society and politics 25 (1):119-120.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  4
    Il problema gnoseologico in S. Agostino e S. Tommaso.Maria Apostoli Campus - 1943 - Firenze: F. Le Monnier.
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  35
    Il marketing politico: fare la politica attraverso la comunicazione.Donatella Campus - 2011 - Iride: Filosofia e Discussione Pubblica 24 (3):537-546.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  32
    Audio Spatial Representation Around the Body.Aggius-Vella Elena, Campus Claudio, Finocchietti Sara & Gori Monica - 2017 - Frontiers in Psychology 8.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  18
    Masters of Political Science.Donatella Campus & Gianfranco Pasquino (eds.) - 2009 - Ecpr Press.
    This book fills an important gap in the growing reflective literature on the political science discipline: it consists of a series of 'objective' profiles of the 'Masters of Political Science', written by political scientists who have read and studied their work and who are therefore in a position to evaluate the nature of their contributions.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  15
    Political Discussion, Views of Political Expertise and Women’s Representation in Italy.Donatella Campus - 2010 - European Journal of Women's Studies 17 (3):249-267.
    Italy is one of the advanced industrial democracies with the smallest number of women elected to public office. Current literature has focused on several structural, institutional and cultural factors to explain such a gender gap in political participation and representation. However, one of the most basic forms of political participation, political discussion, has not received a thorough investigation. This article analyses gender differences in the attitudes and the habits of talking about politics with relatives, friends and social acquaintances during the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  26
    Observation of Point-Light-Walker Locomotion Induces Motor Resonance When Explicitly Represented; An EEG Source Analysis Study.Alberto Inuggi, Claudio Campus, Roberta Vastano, Ghislain Saunier, Alejo Keuroghlanian & Thierry Pozzo - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Bert Cappelle.Ku Leuven Campus Kortrijk - 2007 - In Marja Nenonen & Sinikka Niemi (eds.), Collocations and idioms 1: papers from the First Nordic Conference on Syntactic Freezes, Joensuu, May 19-20, 2006. Joensuu: Joensuun yliopisto. pp. 41.
    No categories
     
    Export citation  
     
    Bookmark  
  34. Instituto de Geociências e Ciências Exatas.Câmpus de Rio Claro, Maria Rita Caetano Chang, Conselho do Programa, Marcelo de Carvalho Borba, Miriam Godoy Penteado, Claudemir Murari, Maria Lucia Lorenzetti Wodewotzki, Heloísa da Silva Representante Discente, Antonio Vicente Marafioti Garnica & Rosa Lucia Sverzut Baroni - 1913 - Tópicos 18 (19).
    No categories
     
    Export citation  
     
    Bookmark  
  35.  13
    Updating spatial hearing abilities through multisensory and motor cues.Chiara Valzolgher, Claudio Campus, Giuseppe Rabini, Monica Gori & Francesco Pavani - 2020 - Cognition 204 (C):104409.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  37
    Governing the Global Antimicrobial Commons: Introduction to Special Issue.Steven J. Hoffman, Julian Savulescu, Alberto Giubilini, Claas Kirchhelle, Susan Rogers Van Katwyk, Isaac Weldon, Brooke Campus, Mark Harrison, Hannah Maslen & Angela McLean - 2023 - Health Care Analysis 31 (1):1-8.
    Antimicrobial resistance is one of the greatest public health crises of our time. The natural biological process that causes microbes to become resistant to antimicrobial drugs presents a complex social challenge requiring more effective and sustainable management of the global antimicrobial commons—the common pool of effective antimicrobials. This special issue of Health Care Analysis explores the potential of two legal approaches—one long-term and one short-term—for managing the antimicrobial commons. The first article explores the lessons for antimicrobial resistance that can be (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Principios fundamentales de filosofía de la sociedad.Ricardo Miguel Flores & Itesm-Campus Monterrey - 2000 - Humanitas 27:27.
    No categories
     
    Export citation  
     
    Bookmark  
  38.  22
    What's On in Philosophy.Ancaster Hall, Terence Wilkerson Esq, Jane Johnson, Mrs Marlene Teague, Michael Bavidge, Jonathan Wolff, Watford Campus, John Lippitt, Wall Hall & Roger Woolhouse - 1995 - Philosophy 1:3rd.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Identity Politics and Party Elites Strategic Dilemmas: Comparing Varieties of Extremism: the Vlaams Blok and Lega Nord Paper Abstract.Marga Gomez-Reino & Campus Miguel de Unamuno - 2001 - In David Estlund (ed.), Democracy. Malden, MA: Blackwell.
     
    Export citation  
     
    Bookmark  
  40. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  41.  1
    Reckoning with the Unbearable Burden of the Past.Thomas Klikauer School of Business, Parramatta City Campus, 169 Macquarie Street, N. S. W. Parramatta & Australia - forthcoming - The European Legacy:1-5.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  43. Whose Justice is it Anyway? Mitigating the Tensions Between Food Security and Food Sovereignty.Samantha Noll & Esme G. Murdock - 2020 - Journal of Agricultural and Environmental Ethics 33 (1):1-14.
    This paper explores the tensions between two disparate approaches to addressing hunger worldwide: Food security and food sovereignty. Food security generally focuses on ensuring that people have economic and physical access to safe and nutritious food, while food sovereignty movements prioritize the right of people and communities to determine their agricultural policies and food cultures. As food sovereignty movements grew out of critiques of food security initiatives, they are often framed as conflicting approaches within the wider literature. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  44.  29
    Tracking and Targeting: Sociotechnologies of (In)security.Jutta Weber, Karolina Follis & Lucy Suchman - 2017 - Science, Technology, and Human Values 42 (6):983-1002.
    This introduction to the special issue of the same title sets out the context for a critical examination of contemporary developments in sociotechnical systems deployed in the name of security. Our focus is on technologies of tracking, with their claims to enable the identification of those who comprise legitimate targets for the use of violent force. Taking these claims as deeply problematic, we join a growing body of scholarship on the technopolitical logics that underpin an increasingly violent landscape of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  45. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  46. Trust as noncognitive security about motives.Lawrence C. Becker - 1996 - Ethics 107 (1):43-61.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   51 citations  
  47.  53
    An alert correlation approach based on security operator's knowledge and preferences.Salem Benferhat & Karima Sedki - 2010 - Journal of Applied Non-Classical Logics 20 (1-2):7-37.
    One of the major problems of intrusion detection concerns the large amount of alerts that intrusion detection systems (IDS) produce. Security operator who analyzes alerts and takes decisions, is often submerged by the high number of alerts to analyze. In this paper, we present a new alert correlation approach based on knowledge and preferences of security operators. This approach, which is complementary to existing ones, allows to rank-order produced alerts on the basis of a security operator knowledge (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  21
    Climate Change and Global Energy Security: Technology and Policy Options.Marilyn A. Brown & Benjamin K. Sovacool - 2011 - MIT Press.
    An exploration of commercially available technologies that can enhance energy security and address climate change and public policy options crucial to their adoption.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Neuroethics and national security.Turhan Canli, Susan Brandon, William Casebeer, Philip J. Crowley, Don DuRousseau, Henry T. Greely & Alvaro Pascual-Leone - 2007 - American Journal of Bioethics 7 (5):3 – 13.
    Science is driven by technical innovations, and perhaps nowhere as visibly as in neuroscience. In the past decade, advances in methods have led to an explosion of studies in cognitive (Gazzaniga et...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  50.  21
    Futurology of separatism and national security: Being vs dissipation.Bogdan Levyk, Marina Kolinko, Svitlana Khrypko & Ganna Iatsenko - 2021 - Postmodern Openings 12 (2).
    The peculiarities of the “domestic” and political worlds’ interactions as well as their impact on the freedom of human choice are considered in the article. The purpose of the article is to analyze political and existential being which can be transformed in the light of collecting or distracting way. The phenomenon of national security is analyzed in theoretical as well as in practical dimension. The first part of the study of separatism is connected with the modern social world’s tendency (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 985