Results for 'smart ID cards'

934 found
Order:
  1.  85
    Privacy rights and protection: Foreign values in modern thai context. [REVIEW]Krisana Kitiyadisai - 2005 - Ethics and Information Technology 7 (1):17-26.
    The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other drafted legislation on computer crime, the law on privacy protection has not yet been enacted. The political reform and the influences of globalization have speeded up the process of westernization of the urban, educated middle-class professionals. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  2.  58
    Psychic ID: A blueprint for a modern national identity scheme.David G. W. Birch - 2008 - Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  3.  19
    Municipal ID Cards for Undocumented Immigrants: Local Bureaucratic Membership in a Federal System.Els de Graauw - 2014 - Politics and Society 42 (3):309-330.
    This article examines the municipal ID card programs in New Haven and San Francisco. With a municipal ID card, undocumented immigrants can access basic city services and identify themselves with police and other city officials. The article draws on twenty-eight interviews with key stakeholders to show that city officials navigated the conflicting demands of ID card supporters and opponents to create a local membership policy focused on improving city administration, not expanding the rights of undocumented immigrants. In capitalizing on their (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  73
    A new e-ID card and online authentication in Spain.Alexander Heichlinger & Patricia Gallego - 2010 - Identity in the Information Society 3 (1):43-64.
    This paper describes the introduction of a new electronic identity card including an electronic identity (EID) for local physical and online authentication in 2006. The most significant difference to any European country is the decentralized issuing at 256 police stations employing an automatic printing machine. This is the most visible element in a high degree continuation, as the previous paper based ID cards were also personalized and issued at the police stations. Similarly the attributes defining the identity and the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  71
    Electronic identity in Finland: ID cards vs. bank IDs. [REVIEW]Teemu Rissanen - 2010 - Identity in the Information Society 3 (1):175-194.
    This chapter describes the introduction and diffusion of the Finnish Electronic Identity Card (FINEID card). FINEID establishes an electronic identity (eID), based on the civil registry and placed on an identity chip card issued by Finnish government to Finnish citizens and permanent residents from age 18 and older. It is a non-mandatory electronic identity card introduced in 1999 in order to replace the older citizen ID card. It serves as a travel document and is intended to facilitate access to eGovernment (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  52
    The Austrian case: multi-card concept and the relationship between citizen ID and social security cards[REVIEW]Georg Aichholzer & Stefan Strauß - 2010 - Identity in the Information Society 3 (1):65-85.
    National electronic identity (e-ID) card schemes and electronic identity management systems (e-IDMS) in Europe are characterised by considerable diversity. This contribution analyses the creation of a national e-IDMS in Austria with the aim of improving our understanding of the reasons behind the genesis of particular designs of national e-IDMS. It seeks to explain how the system’s specific design evolved and which factors shaped its appearance. Being part of a comparative four country study, a common theoretical framework is employed to allow (...)
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  42
    Smart Cards, Smarter Policy Medical Records, Privacy, and Health Care Reform.Sheri Alpert - 1993 - Hastings Center Report 23 (6):13-23.
    Current law does not adequately protect patients' privacy or their medical records. Proposals to computerize these records could further erode confidentiality unless new federal laws are enacted.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  68
    The introduction of online authentication as part of the new electronic national identity card in Germany.Torsten Noack & Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):87-110.
    This chapter provides an analysis of the long process of introducing an electronic identity for online authentication in Germany. This process is described as a multi-facet innovation, involving actors from different policy fields shifting over time. The eID process started in the late ‘90s in the context of eGovernment and eCommerce with the legislation on e-signatures, which were supposed to allow for online authentication of citizens. When after 5 years it was recognized that this was not the case, a new (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9.  28
    A Trip Purpose-Based Data-Driven Alighting Station Choice Model Using Transit Smart Card Data.Kai Lu, Alireza Khani & Baoming Han - 2018 - Complexity 2018:1-14.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  12
    The impact of different age-friendly smart home interface styles on the interaction behavior of elderly users.Chengmin Zhou, Yawen Qian, Ting Huang, Jake Kaner & Yurong Zhang - 2022 - Frontiers in Psychology 13.
    Smart homes create a beneficial environment for the lives of elderly people and enhance the quality of their home lives. This study aims to explore the design of age-friendly interfaces that can meet the emotional needs of self-care elderly people from the perspective of functional realization of the operating interface. Sixteen elderly users aged fifty-five and above were selected as subjects with healthy eyes and no excessive drooping eyelids to obscure them. Four representative age-friendly applications with different interface designs (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  28
    Using the Spanish national identity card in social networks.V. Gayoso MartÍnez, L. HernÁndez Encinas, A. MartÍn MuÑoz & R. DurÁn DÍaz - 2020 - Logic Journal of the IGPL 28 (4):519-530.
    The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the identity and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  79
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  91
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability of data (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  51
    Electronic identity management in Estonia between market and state governance.Tarvi Martens - 2010 - Identity in the Information Society 3 (1):213-233.
    The present paper summarizes the development of the national electronic Identity Management System (eIDMS) in Estonia according to a conceptual framework developed in an European comparative research project outlined in the first chapter of this special issue. Its main function is to amend the picture of the European eIDMS landscape by presenting a case with high involvement of the private sector and thereby checking the generalizations from the comparisons of Austria, Belgium, Germany and Spain, presented by Kubicek and Noack in (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  15.  46
    The path dependency of national electronic identities.Herbert Kubicek & Torsten Noack - 2010 - Identity in the Information Society 3 (1):111-153.
    This paper compares the four national electronic Identity Management Systems (eIDMS), which have been described in the previous chapters. The section Similarities and differences between four national eIDMS will highlight the differences between these systems conceived as socio-technical systems with regard to the eID itself, the eID cards as tokens, the authentication processes as well as the procedures for distribution and personalisation, the support provided for installing the technology and any provider-related regulation. The section A three-fold path dependency , (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  16.  20
    (1 other version)Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst.Christoph Engemann - 2011 - Zeitschrift für Medien- Und Kulturforschung 2 (2):211-228.
    Transaktionen sind Übertragungsgeschehen, die in modernen Gesellschaften zentralen Stellenwert haben und im besonderen Maße mit Beglaubigungs- und Autorisierungspraxen verbunden sind. Um Transaktionen vorzunehmen, müssen die Transaktionsinstanzen mit besonders autorisierten Zeichen versehen werden, deren Ausgabe historisch von der Staatlichkeit monopolisiert worden ist. Der von der Bundesdruckerei produzierte elektronische Personalausweis ist der Versuch, für den digitalen Raum entsprechende Zeichenregime zu schaffen. Damit nimmt diese Institution für das Regieren in und mit dem Internet eine wichtige Position ein, anhand derer sich wesentliche Aspekte einer (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. The Temptation of Data-enabled Surveillance: Are Universities the Next Cautionary Tale?Alan Rubel & Kyle M. L. Jones - 2020 - Communications of the Acm 4 (63):22-24.
    There is increasing concern about “surveillance capitalism,” whereby for-profit companies generate value from data, while individuals are unable to resist (Zuboff 2019). Non-profits using data-enabled surveillance receive less attention. Higher education institutions (HEIs) have embraced data analytics, but the wide latitude that private, profit-oriented enterprises have to collect data is inappropriate. HEIs have a fiduciary relationship to students, not a narrowly transactional one (see Jones et al, forthcoming). They are responsible for facets of student life beyond education. In addition to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  74
    (1 other version)Students Eat Less Meat After Studying Meat Ethics.Eric Schwitzgebel, Bradford Cokelet & Peter Singer - 2021 - Review of Philosophy and Psychology:1-26.
    In the first controlled, non-self-report studies to show an influence of university-level ethical instruction on everyday behavior, Schwitzgebel et al. (2020) and Jalil et al. (2020) found that students purchase less meat after exposure to material on the ethics of eating meat. We sought to extend and conceptually replicate this research. Seven hundred thirty students in three large philosophy classes read James Rachels’ (2004) “Basic Argument for Vegetarianism”, followed by 50-min small-group discussions. Half also viewed a vegetarianism advocacy video containing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19.  30
    Cassandra Days: Poems.Shirley Geok-Lin Lim - 2018 - Feminist Studies 44 (3):776-779.
    In lieu of an abstract, here is a brief excerpt of the content:776 Feminist Studies 43, no. 3. © 2018 by Shirley Geok-lin Lim Shirley Geok-lin Lim Cassandra Days: Poems Vox populi vox Dei “The voice of the people is the voice of God.” June 20, 2016 The voice bellowing from the stage Will not be upstaged. The rage Swelling from its undercurrents Is its own fixed swirling warrant When actor and audience are one. One, the agent and their actions; (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  31
    Towards a better citizen identification system.Piotr Cofta - 2008 - Identity in the Information Society 1 (1):39-53.
    Citizen identification systems (known also as ‘ID card systems’, or ‘national identity management systems’, even though those definitions are not identical) are receiving a mixed acceptance, with their privacy, security and usability being criticised, specifically in the UK. This paper investigates whether it is possible to improve social acceptance of such systems in cases where they are incompatible with the perceived value of privacy, but without significantly changing their original architecture. The paper analyses requirements using four different scenarios that address (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  21.  77
    Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries. [REVIEW]Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):5-26.
    This paper introduces the objectives and basic approach of a collaborative comparative research project on the introduction of national electronic Identity Management Systems (eIDMS) in Member States of the European Union. Altogether eight country case studies have been produced in two waves by researchers in the respective countries, which will be presented in the following articles in this special issue. The studies adopt a common conceptual framework and use the same terminology, which will be presented in this introduction, just as (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  45
    Japanese risk society: trying to create complete security and safety using information and communication technology.Kiyoshi Murata & Yohko Orito - 2010 - Acm Sigcas Computers and Society 40 (3):38-49.
    The construction of a secure and safe society using information and communication technology is recognised as an urgent issue in Japan. This recognition is based on public fear about crime related to manufactured risk caused by modernisation or industrial civilisation. This fear has created a social atmosphere that has led to the rapid development and implementation of security systems using ICT, such as security cameras, smart IC cards and mobile phones, to establish security and safety in Japanese society. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23.  27
    Managing public expectations of technological systems: A case study of a problematic government project.Aaron K. Martin & Edgar A. Whitley - 2007 - Spontaneous Generations 1 (1):67.
    In this discussion piece we address how the UK government has attempted to manage public expectations of a proposed biometric identity scheme by focussing attention on the handheld, i.e., the ID card. We suggest that this strategy of expectations management seeks to downplay the complexity and uncertainty surrounding this high-technological initiative, necessitating the selective use of expertise for the purpose of furthering government objectives. In this process, government often relegates counterexpertise, if not dismissing it outright, thereby greatly politicizing the policy (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24. Nanotechnology and Privacy.Jeroen van den Hoven - 2006 - International Journal of Applied Philosophy 20 (2):215-228.
    The development of ever smaller integrated circuits at the sub-micron and nanoscale—in accordance with Moore’s Law—drives the production of very small tags, smart cards, smart labels and sensors. Nanoelectronics and submicron technology supports surveillance technology which is practically invisible. I argue that one of the most urgent and immediate concerns associated with nanotechnology is privacy. Computing in the twenty-first century will not only be pervasive and ubiquitous, but also inconspicuous. If these features are not counteracted in design, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  21
    Interfaith Dialogue in Contemporary Europe: Challenges and Prospects for Religious.Fatima Mernissi - 2023 - European Journal for Philosophy of Religion 15 (4):182-199.
    This study examines the dynamics of interfaith communication in modern-day Europe, emphasizing the obstacles to and opportunities presented by religious heterogeneity. The religious landscape of Europe is heterogeneous, with followers of many religions living side by side. But this variety also brings difficulties, like bias, political unrest, and resentment from the past, which can obstruct attempts to foster mutual understanding and collaboration across religious communities. Interfaith communication is essential for advancing religious freedom and social cohesiveness despite these obstacles. The research (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  45
    Design Research and Object-Oriented Ontology.Paul Coulton, Haider Ali Akmal & Joseph Lindley - 2020 - Open Philosophy 3 (1):11-41.
    In this paper we recount several research projects conducted at ImaginationLancaster a Design-led research laboratory, all of which consider Object-Oriented Ontology. The role OOO plays in these projects is varied: as a generative mechanism contributing to ideation; as a framework for analysis; and as a constituent in developing new design theory. Each project’s focus is quite unique—an app, a board game, a set of Tarot cards, a kettle and a living room—however they are all concerned with developing new understandings (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. An Illustrated Brief History of Western Philosophy.Anthony Kenny - 2006 - Malden, MA: Wiley-Blackwell.
    This illustrated edition of Sir Anthony Kenny's acclaimed survey of Western philosophy offers the most concise and compelling story of the complete development of philosophy available. Spanning 2,500 years of thought, An Illustrated Brief History of Western Philosophy provides essential coverage of the most influential philosophers of the Western world, among them Socrates, Plato, Aristotle, Jesus, Augustine, Aquinas, Machiavelli, Descartes, Hobbes, Spinoza, Berkeley, Hume, Rousseau, Kant, Hegel, Marx, Mill, Nietzsche, Darwin, Freud, Frege, Russell, and Wittgenstein. Replete with over 60 illustrations (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  28.  58
    Intuitionistic uniformity principles for propositions and some applications.W. Friedrich & H. Luckhardt - 1980 - Studia Logica 39 (4):361 - 369.
    This note deals with the prepositional uniformity principlep-UP: p x N A (p, x) x N p A (p, x) ( species of all propositions) in intuitionistic mathematics.p-UP is implied by WC and KS. But there are interestingp-UP-cases which require weak KS resp. WC only. UP for number species follows fromp-UP by extended bar-induction (ranging over propositions) and suitable weak continuity. As corollaries we have the disjunction property and the existential definability w.r.t. concrete objects. Other consequences are: there is no (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  15
    Sacred geometry: your personal guide.Bernice Cockram - 2020 - New York, NY: Wellfleet Press.
    With In Focus Sacred Geometry, learn the fascinating history behind this ancient tradition as well as how to decipher the geometrical symbols, formulas, and patterns based on mathematical patterns. People have searched for the meaning behind mathematical patterns for thousands of years. At its core, sacred geometry seeks to find the universal patterns that are found and applied to the objects surrounding us, such as the designs found in temples, churches, mosques, monuments, art, architecture, and nature. Learn the fundamental principles (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  84
    Metaphysics and Morality: Essays in Honour of J. J. C. Smart.John Jamieson Carswell Smart, Philip Pettit, Richard Sylvan & Jean Norman (eds.) - 1987 - New York, NY, USA: Blackwell.
    Direct download  
     
    Export citation  
     
    Bookmark   45 citations  
  31.  73
    Where the Smart Things Are: Social Machines and the Internet of Things.Paul Smart, Aastha Madaan & Wendy Hall - 2019 - Phenomenology and the Cognitive Sciences 18 (3):551-575.
    The emergence of large-scale social media systems, such as Wikipedia, Facebook, and Twitter, has given rise to a new multi-disciplinary effort based around the concept of social machines. For the most part, this research effort has limited its attention to the study of Web-based systems. It has also, perhaps unsurprisingly, tended to highlight the social scientific relevance of such systems. The present paper seeks to expand the scope of the social machine research effort to encompass the Internet of Things. One (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  32. Philosophy and Scientific Realism.J. J. C. Smart - 1963 - New York,: Routledge.
  33.  75
    Non-Invasive Prenatal Testing for “Non-Medical” Traits: Ensuring Consistency in Ethical Decision-Making.Hilary Bowman-Smart, Christopher Gyngell, Cara Mand, David J. Amor, Martin B. Delatycki & Julian Savulescu - 2021 - American Journal of Bioethics 23 (3):3-20.
    The scope of noninvasive prenatal testing (NIPT) could expand in the future to include detailed analysis of the fetal genome. This will allow for the testing for virtually any trait with a genetic contribution, including “non-medical” traits. Here we discuss the potential use of NIPT for these traits. We outline a scenario which highlights possible inconsistencies with ethical decision-making. We then discuss the case against permitting these uses. The objections include practical problems; increasing inequities; increasing the burden of choice; negative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  34. Utilitarianism: For and Against.J. J. C. Smart & Bernard Williams - 1973 - Cambridge: Cambridge University Press. Edited by Bernard Williams.
    Two essays on utilitarianism, written from opposite points of view, by J. J. C. Smart and Bernard Williams. In the first part of the book Professor Smart advocates a modern and sophisticated version of classical utilitarianism; he tries to formulate a consistent and persuasive elaboration of the doctrine that the rightness and wrongness of actions is determined solely by their consequences, and in particular their consequences for the sum total of human happiness. In Part II Bernard Williams offers (...)
    Direct download  
     
    Export citation  
     
    Bookmark   418 citations  
  35. The L word and the F word.Claudia Card - 2006 - Hypatia 21 (2):223-229.
  36. Pragmatic Liberalism and the Critique of Modernity.Claudia Card - 2002 - Mind 111 (444):863-866.
  37.  45
    (1 other version)Bolzano's logic.Harold R. Smart - 1944 - Philosophical Review 53 (6):513-533.
  38.  35
    Kant als Naturforscher.H. R. Smart - 1926 - Philosophical Review 35 (1):81-82.
  39.  22
    Mysticism and Philosophy.Ninian Smart - 1963 - Philosophical Quarterly 13 (51):186-187.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   18 citations  
  40. The Unnatural Lottery: character and moral luck.Claudia Card - 1996 - temple.
    The opportunities to become a good person are not the same for everyone. Modern European ethical theory, especially Kantian ethics, assumes the same virtues are accessible to all who are capable of rational choice. Character development, however, is affected by circumstances, such as those of wealth and socially constructed categories of gender, race, and sexual orientation, which introduce factors beyond the control of individuals. Implications of these influences for morality have, since the work of Williams and Nagel in the seventies, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   69 citations  
  41. Situationist Social Psychology and J. S. Mill's Conception of Character: Robert F. Card.Robert F. Card - 2010 - Utilitas 22 (4):481-493.
    The situationist challenge to global character traits claims that on the basis of findings in social psychology, we should only accept at most the existence of local or context-sensitive traits. In this article I explore a neglected area of J. S. Mill's work to outline an account of context-sensitive traits. This account of traits, coupled with a sophisticated consequentialist ethical framework, suggests an interesting view on which persons govern the circumstances of their actions in order to best promote overall well-being.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  26
    Space, Time and Gravitation.H. R. Smart & A. S. Eddington - 1922 - Philosophical Review 31 (4):414.
  43. (2 other versions)Utilitarianism; For and Against.J. J. C. Smart, Bernard Williams & Anthony Quinton - 1974 - Philosophy 49 (188):212-215.
    No categories
     
    Export citation  
     
    Bookmark   98 citations  
  44. The Atrocity Paradigm: A Theory of Evil.Claudia Card - 2002 - New York, US: Oxford University Press USA.
    What distinguishes evils from ordinary wrongs? Are some evils unforgivable? How should we respond to evils? Card offers a secular theory of evil--representing a compromise between classic utilitarian and stoic approaches--that responds to these and other questions.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   53 citations  
  45.  37
    Pure aretaic ethics and character.Robert F. Card - 2004 - Journal of Value Inquiry 38 (4):473-484.
  46. Gratitude and Obligation.Claudia Card - 1988 - American Philosophical Quarterly 25 (2):115 - 127.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   56 citations  
  47. Conscientious objection and emergency contraception.Robert F. Card - 2007 - American Journal of Bioethics 7 (6):8 – 14.
    This article argues that practitioners have a professional ethical obligation to dispense emergency contraception, even given conscientious objection to this treatment. This recent controversy affects all medical professionals, including physicians as well as pharmacists. This article begins by analyzing the option of referring the patient to another willing provider. Objecting professionals may conscientiously refuse because they consider emergency contraception to be equivalent to abortion or because they believe contraception itself is immoral. This article critically evaluates these reasons and concludes that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   68 citations  
  48.  31
    Cosmology.W. M. Smart - 1951 - Philosophical Quarterly 1 (5):479-480.
  49.  8
    Bibliography.Ninian Smart - 2015 - In The Science of Religion and the Sociology of Knowledge: Some Methodological Questions. Princeton University Press. pp. 161-164.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. Subscrfftion order form.Card No - 1994 - In Stephen Everson (ed.), Language: Companions to Ancient Thought, Vol. 3. Cambridge University Press. pp. 105--106.
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 934