Results for 'Security'

1000+ found
Order:
  1. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  2. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  3. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei (eds.), Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  28
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  6. Modal Security.Justin Clarke-Doane & Dan Baras - 2021 - Philosophy and Phenomenological Research 102 (1):162-183.
    Modal Security is an increasingly discussed proposed necessary condition on undermining defeat. Modal Security says, roughly, that if evidence undermines (rather than rebuts) one’s belief, then one gets reason to doubt the belief's safety or sensitivity. The primary interest of the principle is that it seems to entail that influential epistemological arguments, including Evolutionary Debunking Arguments against moral realism and the Benacerraf-Field Challenge for mathematical realism, are unsound. The purpose of this paper is to critically examine Modal (...) in detail. We develop and discuss what we take to be the strongest objections to the principle. One of the aims of the paper is to expose the weakness of these objections. Another is to reveal how the debate over Modal Security interacts with core problems in epistemology — including the generality problem, and the distinction between direct and indirect evidence. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  7. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  9. Security assurance: How online service providers can influence security control perceptions and gain trust.S. Ray, T. Ow & S. S. Kim - 2011 - Decision Sciences 42.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  11.  89
    Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  12. Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart & Arnold Ira Davidson.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   148 citations  
  13.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  7
    Global Community: Global Security.Randall E. Osborne & Paul Kriese (eds.) - 2008 - BRILL.
    Global security cannot be achieved until people view the world as a global community. Until such time, differences will continue to be perceived as threatening. These perceived “threats” are the primary threat to global security. This volume proposes methods for minimizing the “us versus them” mentality so that we can build a sense of global community.
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  53
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  16.  23
    Ethics and Health Security in the Australian COVID-19 Context: A Critical Interpretive Literature Review.Anson Fehross, Kari Pahlman & Diego S. Silva - 2024 - Journal of Bioethical Inquiry 21 (1):131-150.
    Background The concept of “health security” is often used to motivate public health responses, yet the ethical values that underpin this concept remain largely unexamined. The recent Australian responses to COVID-19 serve as an important case study by which we can analyse the pre-existing literature to see what ethical values shaped, and continue to shape, Australia’s response. Methods We conducted a critical interpretive literature review of academic and grey literatures within key databases, resulting in 2,220 sources. After screening for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  94
    Securing the Empirical Value of Measurement Results.Kent W. Staley - 2020 - British Journal for the Philosophy of Science 71 (1):87-113.
    Reports of quantitative experimental results often distinguish between the statistical uncertainty and the systematic uncertainty that characterize measurement outcomes. This article discusses the practice of estimating systematic uncertainty in high-energy physics. The estimation of systematic uncertainty in HEP should be understood as a minimal form of quantitative robustness analysis. The secure evidence framework is used to explain the epistemic significance of robustness analysis. However, the empirical value of a measurement result depends crucially not only on the resulting systematic uncertainty estimate, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  18.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  16
    Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  17
    Environmental Security and the Recombinant Human: Sustainability in the Twenty-first Century.Michael Redclift - 2001 - Environmental Values 10 (3):289-299.
    Examining the concepts of ‘security’ and ‘sustainability’, as they are employed in contemporary environmental discourses, the paper argues that, although the importance of the environment has been increasingly acknowledged since the 1970s, there has been a failure to incorporate other discourses surrounding ‘nature’. The implications of the ‘new genetics’, prompted by research into recombinant DNA, suggest that future approaches to sustainability need to be more cognisant of changes in ‘our’ nature, as well as those of ‘external’ nature, the environment. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  22. Human Security and Liberal Peace.Endre Begby & J. Peter Burgess - 2009 - Public Reason 1 (1):91-104.
    This paper addresses a recent wave of criticisms of liberal peacebuilding operations. We decompose the critics’ argument into two steps, one which offers a diagnosis of what goes wrong when things go wrong in peacebuilding operations, and a second, which argues on the basis of the first step that there is some deep principled flaw in the very idea of liberal peacebuilding. We show that the criticism launched in the argument’s first step is valid and important, but that the second (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  23. Democracy and Security.Annabelle Lever - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International.
    This chapter is concerned with the role of democracy in preventing terrorism, identifying and apprehending terrorists, and in minimizing and alleviating the damage created by terrorism.1 Specifically, it considers the role of democracy as a resource, not simply a limitation, on counterterrorism.2 I am mainly concerned with the ways in which counterterrorism is similar to more familiar forms of public policy, such as the prevention of crime or the promotion of economic prosperity, and so nothing that I say turns on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  16
    Education, Security and Intelligence Studies.Liam Gearon - 2015 - British Journal of Educational Studies 63 (3):263-279.
    Reference to security and intelligence in education today will undoubtedly elicit concerns over terrorism, radicalisation and, in the UK, counter-terrorism measures such as Channel and Prevent (UK...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  25.  52
    Private Security Companies and Institutional Legitimacy: Corporate and Stakeholder Responsibility.Heather Elms & Robert A. Phillips - 2009 - Business Ethics Quarterly 19 (3):403-432.
    The private provision of security services has attracted a great deal of recent attention, both professional and popular. Much of that attention suggests the questioned moral legitimacy of the private vs. public provision of security. Linking the literature on moral legitimacy and responsibility from new institutional and stakeholder theories, we examine the relationship between moral legitimacy and responsible behavior by both private security companies (PSCs) and their stakeholders. We ask what the moral-legitimacy-enhancing responsibilities of both might be, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  26.  26
    Security, territory, population: lectures at the Collège de France, 1977-78.Michel Foucault - 2007 - New York: République Française. Edited by Michel Senellart, François Ewald & Alessandro Fontana.
    Marking a major development in Foucault's thinking, this book derives from the lecture course which he gave at the College de France between January and April, 1978. Taking as his starting point the notion of "bio-power," introduced both in his 1976 course Society Must be Defended and in the first volume of his History of Sexuality, Foucault sets out to study the emergence of this new technology of power over population."--BOOK JACKET.
    Direct download  
     
    Export citation  
     
    Bookmark   61 citations  
  27. Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
    This paper investigates whether being “physically insecure” (being at risk of not continuing to meet one's physical needs in the future) should be thought of as a constituent of current wellbeing. In §1, it is argued that we cannot understand the value of security in terms of “freedom from fear”. In §2, it is argued that the reliablist approach to epistemology can help us to construct an account of why physical security is valuable, by relating security to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  28. Perceptually Secured Knowledge.Elijah Chudnoff - forthcoming - In Ori Beck & Farid Masrour (eds.), The Relational View of Perception: New Essays. Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  18
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31. (Metasemantically) Securing Free Will.Jason Turner - 2013 - Australasian Journal of Philosophy 91 (2):295-310.
    Metasemantic security arguments aim to show, on metasemantic grounds, that even if we were to discover that determinism is true, that wouldn't give us reason to think that people never act freely. Flew's [1955] Paradigm Case Argument is one such argument; Heller's [1996] Putnamian argument is another. In this paper I introduce a third which uses a metasemantic picture on which meanings are settled as though by an ideal interpreter. Metasemantic security arguments are widely thought discredited by van (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  32.  22
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  96
    Terrorism, Security, and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1994 - Routledge.
    Terrorism, Security and Nationality shows how the concepts and methods of political philosophy can be applied to the practical problems of terrorism, state violence and national security. The book clarifies a wide range of issues in applied political philosophy, including the ethics of war, theories of state and nation, the relationship between communities and nationalisms, and the uneasy balance of human rights and national security. Ethnicity, national identity and the interests of the state, concepts commonly cited to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  18
    Assessing Security Technology’s Impact: Old Tools for New Problems.Reinhard Kreissl - 2014 - Science and Engineering Ethics 20 (3):659-673.
    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  87
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  32
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  16
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  46
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  48
    Security and Distribution, or Should You Care about Merely Possible Losses?Kian Mintz-Woo - 2019 - Ethics, Policy and Environment 21 (3):382-386.
    [Comment] Jonathan Herington argues that harms can occur whether or not there is actually a loss. He claims that subjectively or objectively merely being at risk of losing access to basic goods is sufficient for lowering that individual’s well-being for the value of ‘security’. I challenge whether losing access to basic goods is sufficient to justify the introduction of this value. I also point to some issues in his interpretation of IPCC risk categories and the social science research he (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  13
    Secure Attachment Representation in Adolescence Buffers Heart-Rate Reactivity in Response to Attachment-Related Stressors.Manuela Gander, Alexander Karabatsiakis, Katharina Nuderscher, Dorothee Bernheim, Cornelia Doyen-Waldecker & Anna Buchheim - 2022 - Frontiers in Human Neuroscience 16.
    To date, we know very little about the effects of the differences in attachment classifications on the physiological correlates of stress regulation in adolescent age groups. The present study examined for the first time heart rate and heart rate variability during an attachment interview in adolescents. HR and HRV data were collected during a baseline assessment as well as during the administration of the Adult Attachment Projective Picture System in a community-based sample of 56 adolescents. We additionally used the Adult (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  46. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  20
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  36
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  49.  7
    Security: a philosophical investigation.David A. Welch - 2022 - New York: University of Waterloo, University Press.
    How do we know when we are investing wisely in security? Answering this question requires investigating what things are worth securing (and why); what threatens them; how best to protect them; and how to think about it. Is it possible to protect them? How best go about protecting them? What trade-offs are involved in allocating resources to security problems? This book responds to these questions by stripping down our preconceptions and rebuilding an understanding of security from the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  84
    Security as a Selective Project.Alice Hills - 2009 - Studies in Social Justice 3 (1):79-97.
    Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities, where the principal political weapons are coercion and intimidation, and territoriality is a significant facet of security’s physical dimension and exclusionary tendencies. Cities such as Baghdad and Basra are divided into ethnic or sectarian areas, and security’s referent object is an identity or group. Friction exists between the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000