Advanced search    

Search: Political Philosophy

161 papers found.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

How do professionals assess security risks in practice? An exploratory study

perception is central to the human experience, risks are perceived differently depending on social, political, and cultural factors (Renn and Rohrmann 2000). Wachinger et al. (2013 ) suggest that factors ... Posner. 1998 . The philosophy of risk, 7 . London: Thomas Telford Publishing. Committee of Sponsoring Organisations of the Treadway Commission . 2017 . Enterprise risk management-Integrating with strategy

Political swings and roundabouts

contested at a political level: the ?hockey stick? graph???showing how high recent temperatures are compared with the past 2,000?years???is perhaps an exemplar. Clearly there is no simple catch-all answer ... ambiguities would seem to leave the door open to delay and debate over any new environmental legislation in the US, something that is particularly challenging in a political environment starting from the

Correction to: Football as a national security threat for the Turkish Republic of Northern Cyprus

After publication, it was noticed that the affiliation of the author was incorrectly published in the online published article. The correct affiliation should read as Political Science Department ... Political Science Department, University of Crete , Rethymnon 74100, GR 1 Political Science Department, University of Crete , Rethymnon 74100, GR , Greece - Publisher’s Note Springer Nature remains neutral

The “new” crimes of pandemics: observations and insights from Latin America

economics (Brainerd and Siegler 2003; Keogh-Brown and Smith 2008; Page et  al. 2012) , psychology (Pellecchia et  al. 2015; Rubin and Wessely 2020) , and political science (Fairchild and Oppenheimer 1998 ... of the emergence of “new” crimes and breaches during such times nor of how governments and state institutions respond to these. The Latin American political context Latin America has taken major

Do cybercrime laws address emergent IoT security threats? The case of UAE federal cybercrime law regarding RFID technology

its Offshore legal system. One of the central features of UAE’s political and legal landscape is the type of federal system which the country operates. According to the UAE Constitution, legislative

Integrated security management model: a proposal applied to organisational resilience

recognising and addressing risk without overlooking that the alignment of business continuity and crisis manage‑ ment within the ESRM philosophy are key requirements in any resilience pro‑ gramme. Along these ... moved towards a similar philosophy to ERM to manage them through ESRM, where ESRM is a component of ERM (Feeney and Houchens 2019) —although this does not imply that an ERM programme must pre‑exist or

Missing targets: which entities are affected by UN counter-terrorism sanctions?

Department of Law and Political Sciences, Faculty of Social Sciences, Universidad Europea de Valencia , Valencia , Spain The United Nations targeted sanctions against terrorist organizations are administrated ... undoubtedly perpetrated acts of terror in Xinjiang Province (China) and Chechnya, both have local objectives related to political autonomy, and neither are clear ideological or tactical associates of Al-Qaida

Exploring public trust in policing at a community in Ghana

the advanced world that still have some challenges with regard to intelligence-led policing philosophy and community policing (Carter and Fox 2019) . For instance, in Canada, studies by Jones et  al ... peace keepers. In China, public safety, perceived political influence and effects of conflict variables affect public trust in community policing (Wu and Sun 2009) . Public opinion on the trust and

External auditors’ use and perceptions of fraud factors in assessing fraudulent financial reporting risk (FFRR): Implications for audit policy and practice

) the ability to escape penalties due to political connections or corruption in the legal system (see Table 4). All external auditors (n = 24; 100%) consented that rationalisation is the least important ... ability to escape the penalty due to political connections or a corrupt legal system 18 75 This table summarises external auditors’ views on the traits that should be considered in assessing fraud

Nudging as a crime prevention strategy: the use of nudges to improve cyclists’ locking behavior and reduce the opportunities for bicycle theft

. Hausmann , D. , and B. Welch . 2010 . Debate: to nudge or not to nudge . Journal of Political Philosophy 18 : 123 - 136 . Kahneman , D. 2011 . Thinking fast and slow . USA: Farrar, Straus and Giroux: Pengiun

A push for political will

US) or A PUSH FOR POLITICAL WILL RESEARCH HIGHLIGHTS Emma Marris 0 1 2 0 MANAGEMENT OFFICE Publishing Director: David Swinbanks Publisher: Jason Wilde Managing Production Editor: Donald McDonald Web ... , so too with climate change: only with political will can we hope for effective POLICY WATCH action to be taken to meet our past and future commitments. 81 Atmospheric science Tibetan dust bowl 88

The not so dark side of the darknet: a qualitative study

participants emphasised on the achievement of constructive socio-political values through the use of the Darknet. This achievement is enabled by various characteristics that are rooted in the Darknet’s ... , online anonymity provided by the Darknet is used for social and political purposes (Moore and Rid 2016). Individuals can openly share their social and political beliefs; and their disagreements with, or

Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa

) . However, the “push” factors that deter intra-African migration include hostility towards migrants, with sporadic xenophobic incidents in South Africa, political persecution, high levels of unemployment ... -Mifsud. 2021 . Africa's development and post Covid-19 emerging opportunities: Towards a political economic model for strengthening intra Africa trade and national/ regional competitiveness in response to

Protests and blood on the streets: repressive state, police brutality and #EndSARS protest in Nigeria

Repressive state; Police brutality; #EndSARS protest; Political reforms; Nigeria Police Force Introduction predicated on the regimental nature of the Force and conducted through the chain of Command along ... exploitable opportunity for yet increased state brutality and repression rather than broaden the civic space by achieving expected greater civic freedom, political reforms, and good governance. Literature

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

/j.im. 2008 . 12 .007. Strom , Blake E. , Doug P. Miller , Kathryn C. Nickels, Adam G. Pennington, and Cody B. Thomas . 2018 . MITRE ATT & CK: Design and Philosophy . https://attack.mitre.org/docs

Countering fake information as a guarantee of state information security

visit here, look for me by the link”. The fourth type is political bots. Trolls and thoughts leaders. Identifying features: not clearly expressed, maximum correspondence to the real account. Typically ... direction. Or simply the build-up of the situation in the country, provoking conflicts between different groups of the population on a political, religious, national basis, etc. Besides, the final consumer of

Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users

desires fulfilled, revenge, control, demonstration of power, etc.); (3) obtaining some public benefit or service (e.g. accessing services more quickly); or (4) for political purposes. Just over half felt

Prevention and mitigation measures against phishing emails: a sequential schema model

, B.D. 1999 . Bounded rationality . Annual Review of Political Science 2 : 297 - 321 . Karim , A ., S. Azam , B. Shanmugam , K. Kannoorpatti , and M. Alazab . 2019 . A comprehensive survey for intelligent ... philosophy . MITRE Corporation. Thompson , C. , Shelton , M. , Stark , E. , Walker , M. , Schechter , E. and Felt , A. P. 2019 . The web's identity crisis: understanding the effectiveness of website identity

Cyber-security and risky behaviors in a developing country context: a Pakistani perspective

socio-political settings that pose increased cyber-threat to the nation (Shad 2019) . Young individuals (Aliyu et  al. 2010) indulge themselves in many activities such as sharing passwords and self ... transformation, economic development and cyber‑security posture Amid hostile socio-political environments in domestic as well as regional settings, Pakistan faces increased cyber threats (Shad 2019) . With the