Results for ' THREATS'

985 found
Order:
  1. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant threat (...)
    Download  
     
    Export citation  
     
    Bookmark   98 citations  
  2. Is that a Threat?Henry Ian Schiller - 2021 - Erkenntnis 86 (5):1161-1183.
    I introduce game-theoretic models for threats to the discussion of threats in speech act theory. I first distinguish three categories of verbal threats: conditional threats, categorical threats, and covert threats. I establish that all categories of threats can be characterized in terms of an underlying conditional structure. I argue that the aim—or illocutionary point—of a threat is to change the conditions under which an agent makes decisions in a game. Threats are moves (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  3. The Threat from Manipulation Arguments.Benjamin Matheson - 2018 - American Philosophical Quarterly 55 (1):37-50.
    Most seem to presume that what is threatening about manipulation arguments is the ‘no difference’ premise – that is, the claim that there are no responsibility-relevant differences between a manipulated agent and her merely causally determined counterpart. This presumption underlies three recent replies to manipulation arguments from Kearns (2012), King (2013), and Schlosser (2015). But these replies fail to appreciate the true threat from manipulation arguments – namely, the manipulation cases that are allegedly counterexamples to the leading compatibilist conditions on (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  4.  83
    Extortions, Threats To Self-Harm, and Resistance.Ten-Herng Lai - 2026 - Ethical Theory and Moral Practice 1.
    Resisters sometimes threaten self-harm to make demands. When the demands are unmet and the resisters carry through the threat, are their targets responsible for the self-imposed harm? Such scenarios are structurally similar to self-threatening extortions – where in paradigm cases of the latter, the targets often bear no responsibility for the self-imposed harm. People are generally responsible for taking care of their own well-being and interests when they can do so without unreasonable costs and barriers, and a mere threat cannot (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Emerging viral threats and the simultaneity of the non-simultaneous: zooming out in times of Corona.Hub Zwart - 2020 - Medicine, Health Care and Philosophy 23 (4):589-602.
    This paper addresses global bioethical challenges entailed in emerging viral diseases, focussing on their socio-cultural dimension and seeing them as symptomatic of the current era of globalisation. Emerging viral threats exemplify the extent to which humans evolved into a global species, with a pervasive and irreversible impact on the planetary ecosystem. To effectively address these disruptive threats, an attitude of preparedness seems called for, not only on the viroscientific, but also on bioethical, regulatory and governance levels. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Artificial Intelligence and the Threat of Creative Obsolescence.Lindsay Brainard - forthcoming - Ergo: An Open Access Journal of Philosophy.
    I argue that there is an underappreciated threat posed by the emergence of generative artificial intelligence (AI). I call this the threat of creative obsolescence. The threat is that, given the capabilities of generative AI, humans may gradually abandon our creative pursuits, and in doing so, lose something of significant value. To show why the threat is a realistic possibility, I consider three kinds of value philosophers have attributed to creativity: aesthetic value, epistemic value, and practical value. I then offer (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. The Threat of Nuclear War Without Population Regulation.Angelito Malicse - manuscript
    The Threat of Nuclear War Without Population Regulation -/- Introduction -/- The risk of nuclear war is one of the most pressing concerns of modern civilization. While many factors contribute to this threat—geopolitical rivalries, economic inequalities, and military expansion—one of the most overlooked yet critical factors is overpopulation. Without proper population regulation, resource scarcity, social unrest, and international conflicts may escalate to the point where nuclear war becomes not just possible, but inevitable. This essay explores how overpopulation intensifies global tensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Threat of COVID-19 and Job Insecurity Impact on Depression and Anxiety: An Empirical Study in the USA.Obrenovic Bojan, Jianguo Du, Danijela Godinić, Mohammed Majdy M. Baslom & Diana Tsoy - 2021 - Frontiers in Psychology 12:648572.
    In this study, we conceptualized a framework capturing recurring troublesome elements of mental states such as depression and general anxiety, assessing them by applying standard clinical inventory. The study explores the extent to which danger control and fear control under the Extended Parallel Processing Model (EPPM) threat impact job insecurity, with uncertainty phenomenon causing afflicting effect on the experiential nature of depression heightened by anxiety. With the aim to explore the job insecurity relationship with anxiety and depression, and measure the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Climate Change as a Threat Multiplier: Assessing its Impact on Resource Scarcity, Migration, and Political Instability.Igor Britchenko - 2025 - Politics and Security 12 (2):41-58.
    This article examines the conceptualization and application of climate change as a "threat multiplier" in global security discourse. Originating within the U.S. national security community, the term describes how the physical impacts of climate change interact with and exacerbate pre-existing social, economic, and political vulnerabilities, thereby multiplying threats to peace and stability. While the framework has been instrumental in placing climate change on the security agenda, it is also critiqued for potentially constraining policy responses to a reactive, management-oriented posture (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Standard Threats: How to Violate Basic Human Rights.Anthony R. Reeves - 2015 - Social Theory and Practice 41 (3):403-434.
    The paper addresses the nature of duties grounded in human rights. Rather than being protections against harm, per se, I contend that human rights largely shield against risk impositions to protected interests. “Risk imposition” is a normative idea requiring explication, but understanding dutiful action in its terms enables human rights to provide prospective policy guidance, hold institutions accountable, operate in non-ideal circumstances, embody impartiality among persons, and define the moral status of agencies in international relations. Slightly differently, I indicate a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Threats, Coercion, and Willingness to Damn: Three More Objections against the Unpopulated Hell View.Alex R. Gillham - 2020 - Forum Philosophicum: International Journal for Philosophy 25 (2):235-254.
    In this paper, I develop and evaluate three new objections to the Unpopulated Hell View (UHV). First, I consider whether UHV is false because it presupposes that God makes threats, which a perfect being would not do. Second, I evaluate the argument that UHV is false because it entails that God coerces us and therefore limits our freedom to an objectionable degree. Third, I consider whether UHV is false because it implies that God is willing to damn some individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Threat Forecasting - Machine Learning Applications in Next-Generation Identity Protection.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4769-4776.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Fallaciousness of Threats: Character and Ad Baculum .Fabrizio Macagno & Douglas Walton - 2007 - Argumentation 28 (3):203-228.
    Robert Kimball, in “What’s Wrong with Argumentum Ad Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  14. Implicit Bias, Stereotype Threat, and Political Correctness in Philosophy.Sean Allen-Hermanson - 2017 - Philosophies 2 (2).
    This paper offers an unorthodox appraisal of empirical research bearing on the question of the low representation of women in philosophy. It contends that fashionable views in the profession concerning implicit bias and stereotype threat are weakly supported, that philosophers often fail to report the empirical work responsibly, and that the standards for evidence are set very low—so long as you take a certain viewpoint.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Quantum Security Threat Discovery: A Value Sensitive Design Approach to Discovering Security Risks of Quantum Sensing at the Port of Moerdijk.Steven Umbrello, Pieter E. Vermaas, Indika Kumara, Joost Alleblas, Stefan Driessen & Willem-Jan van den Heuvel - 2025 - NanoEthics 19 (2):8.
    This paper investigates the application of Security Threat Discovery Cards (STDCs) for identifying security risks in quantum sensing technologies within port security contexts. With the advent of quantum technologies, organizations and stakeholders face the challenge to explore and assess the impact of the applications these technologies will bring. This exploration faces the perceived incomprehensibility of quantum technologies, and suggests a preliminary step aimed at understanding these technologies. Our results suggest that organizations and companies considering the application of quantum technology can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Mental Action and the Threat of Automaticity.Wayne Wu - 2013 - In Andy Clark, Julian Kiverstein & Tillmann Vierkant, Decomposing the Will. , US: Oxford University Press USA. pp. 244-61.
    This paper considers the connection between automaticity, control and agency. Indeed, recent philosophical and psychological works play up the incompatibility of automaticity and agency. Specifically, there is a threat of automaticity, for automaticity eliminates agency. Such conclusions stem from a tension between two thoughts: that automaticity pervades agency and yet automaticity rules out control. I provide an analysis of the notions of automaticity and control that maintains a simple connection: automaticity entails the absence of control. An appropriate analysis, however, shows (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  17. The Fallaciousness of Threats: Character and Ad Baculum.Fabrizio Macagno & Douglas Walton - 2007 - Argumentation 21 (1):63-81.
    Robert Kimball, in “What’s Wrong with ArgumentumAd Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. RUSSIAN AGGRESSION AS A THREAT TO THE SUSTAINABLE DEVELOPMENT OF EUROPE: THE UKRAINIAN DIMENSION.Andrii Minosian & Olexii Varypaiev - 2023 - European Dimensions of Sustainable Development: Proceedings of the V International Conference, June 1-2, 2023.; National University of Food Technologies. Kyiv, 2023 1:267-273.
    The article deals with issues related to Russian aggression against Ukraine in the context of the existing threat to sustainable development of Europe. Particular attention is drawn to the treachery of aggressive Russian policy towards not only the Ukrainian people but also the peoples of other countries which are traditionally considered to be the zone of influence and interests of the Kremlin. The authors have concluded that as long as the current Russian political leadership is poised to stay in power, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. Epistemic selectivity, historical threats, and the non-epistemic tenets of scientific realism.Timothy Lyons - 2017 - Synthese 194 (9):3203-3219.
    The scientific realism debate has now reached an entirely new level of sophistication. Faced with increasingly focused challenges, epistemic scientific realists have appropriately revised their basic meta-hypothesis that successful scientific theories are approximately true: they have emphasized criteria that render realism far more selective and, so, plausible. As a framework for discussion, I use what I take to be the most influential current variant of selective epistemic realism, deployment realism. Toward the identification of new case studies that challenge this form (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  20. Sentientism Still Under Threat: Reply to Dung.François Kammerer - 2024 - Journal of Consciousness Studies 31 (3):103-119.
    In 'Ethics Without Sentience: Facing Up to the Probable Insignificance of Phenomenal Consciousness' (Kammerer, 2022), I argued that phenomenal consciousness is probably normatively insignificant, and does not play a significant normative role. In 'Preserving the Normative Significance of Sentience' (Dung, 2024), Leonard Dung challenges my reasoning and defends sentientism about value and moral status against my arguments. Here I respond to Dung's criticism, pointing out three flaws in his reply. My conclusion is that the view that phenomenal consciousness is distinctively (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. A new threat against phenomenal unity? An argument based on Depersonalization and Derealization symptoms.Charlotte Gauvry - forthcoming - Philosophical Psychology.
    According to a venerable phenomenological claim which is still quite authoritative nowadays, our phenomenal field is necessarily unified at a time t. This means that everything we simultaneously experience in the first person is subjectively, representationally or at least phenomenally unified. Against this background, Tim Bayne (2010) provides an insightful overview of the various descriptive or empirical challenges to subjective and representational unity while also demonstrating that the claim of phenomenal unity singularly resists these objections. The primary objective of my (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, case (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  23. Killing Minimally Responsible Threats.Saba Bazargan - 2014 - Ethics 125 (1):114-136.
    Minimal responsibility threateners are epistemically justified but mistaken in thinking that imposing a nonnegligible risk on others is permissible. On standard accounts, an MRT forfeits her right not to be defensively killed. I propose an alternative account: an MRT is liable only to the degree of harm equivalent to what she risks causing multiplied by her degree of responsibility. Harm imposed on the MRT above that amount is justified as a lesser evil, relative to allowing the MRT to kill her (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  24. Automated Cyber Threat Identification and Natural Language Processing.Kuruvamanikindi Venkatesh, M. Sai Kumar, Shaik Mohammed Maaz, Surekari Yashwanth Teja & Dr K. Pavan Kumar - 2025 - International Journal of Scientific Research in Science, Engineering and Technology 12 (3).
    The time window between the disclosure of a new cyber vulnerability and its use by cybercriminals has been getting smaller and smaller over time. Recent episodes, such as the Log4j vulnerability, exemplify this well. Within hours after the exploit being released, attackers started scanning the internet looking for vulnerable hosts to deploy threats like crypto currency miners and ransom ware on vulnerable systems. Thus, it becomes imperative for the cybersecurity defense strategy to detect threats and their capabilities as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The threat of thinking things into existence.Kathrin Koslicki - 2020 - In Luis R. G. Oliveira & Kevin Corcoran, Common Sense Metaphysics: Essays in Honor of Lynne Rudder Baker. New York, NY: Routledge. pp. 113-136.
    According to the account of artifacts developed by Lynne Rudder Baker, artifacts have a certain “proper function” essentially. The proper function of an artifact is the purpose or use intended for the artifact by its “author(s)”, viz., the artifact’s designer(s) and/or producer(s). Baker’s account therefore traces the essences of artifacts back indirectly to the intentions of an artifact’s original author (e.g., its inventor, maker, producer or designer). Like other “author-intention-based” accounts (e.g., those defended by Amie Thomasson, Simon Evnine, and others), (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Climate Change and the Threat of Disaster: The Moral Case for Taking Out Insurance at Our Grandchildren's Expense.Matthew Rendall - 2011 - Political Studies 59 (4):884-99.
    Is drastic action against global warming essential to avoid impoverishing our descendants? Or does it mean robbing the poor to give to the rich? We do not yet know. Yet most of us can agree on the importance of minimising expected deprivation. Because of the vast number of future generations, if there is any significant risk of catastrophe, this implies drastic and expensive carbon abatement unless we discount the future. I argue that we should not discount. Instead, the rich countries (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  27. Moral grandstanding as a threat to free expression.Justin Tosi & Brandon Warmke - 2020 - Social Philosophy and Policy 37 (2):170-189.
    Moral grandstanding, or the use of moral talk for self-promotion, is a threat to free expression. When grandstanding is introduced in a public forum, several ideals of free expression are less likely to be realized. Popular views are less likely to be challenged, people are less free to entertain heterodox ideas, and the cost of changing one’s mind goes up.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. The Threats of Land Resources Management Due to Increasing Rapid Population Growth in Zanzibar.Muhamad Hamdu Haji - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (4):1-7.
    Abstract: This paper talks about the threats of land Resources management due to the problem of rapid increase of population growth in Zanzibar Island. Actual there are many threats that are investigated and proved by this study. The land environmental degradation, cutting down the forest for formation of charcoal as their income sources as well as drilling the minerals includes sand and stone are the ones of the threats of land resources management due to the highly increasing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  62
    Dictatorship as the Deadly Threat to Natural Civilization.Charles X. Yang - manuscript
    From the perspective of natural civilization and cybernetic control theory, this paper systematically analyzes the profound threats that dictatorial regimes pose to civilizational systems. Natural civilization emphasizes that societies must obey natural laws, maintain system feedback, and uphold ecological balance, while the cybernetic perspective treats civilization as a complex adaptive system reliant on constraints, feedback loops, and self-regulation. This study introduces the concept of “civilization-level madness,” referring to the systemic collapse arising from the interaction of ideological expansion, absolute power, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Epistemic Injustice and Contact Experiencers: Constitutive Experiences and Ontological Threat.Kimberly S. Engels & Elliott Hauser - manuscript
    This paper argues that contact experiencers, or those who report experiences with advanced intelligences they suspect or believe are non-human, should be taken seriously as victims of epistemic injustice. Through comparison with other groups of knowers who report a constitutive experience, we surface situations in which speakers are doubted on the grounds that the constitutive experience is argued not to be possible, in part because it poses an ontological threat to hearers’ conceptions of identity or reality. Experiences may threaten hearers’ (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Dimensions of the Threat to the Self Posed by Deep Brain Stimulation: Personal Identity, Authenticity, and Autonomy.Przemysław Zawadzki - 2020 - Diametros 18 (69):71-98.
    Deep Brain Stimulation (DBS) is an invasive therapeutic method involving the implantation of electrodes and the electrical stimulation of specific areas of the brain to modulate their activity. DBS brings therapeutic benefits, but can also have adverse side effects. Recently, neuroethicists have recognized that DBS poses a threat to the very fabric of human existence, namely, to the selves of patients. This article provides a review of the neuroethical literature examining this issue, and identifies the crucial dimensions related to the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities.Tripathi Praveen - 2024 - International Journal of Computer Trends and Technology 72 (8):26-32.
    In 2024, the intersection of artificial intelligence (AI) and cybersecurity presents both unprecedented challenges and significant opportunities. This article explores the evolving landscape of AI-driven cyber threats, the advancements in AI-enabled security measures, and the strategic responses required to navigate these new realities. Leveraging statistics, trends, and expert insights, we delve into how organizations can enhance their cybersecurity posture in the face of sophisticated AI threats.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  33. Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. (1 other version)The Threat of Solipsism: Wittgenstein and Cavell on Meaning, Skepticism, and Finitude Jonadas Techio, De Gruyter 2021.Guido Tana - 2023 - History of Philosophy & Logical Analysis 26 (1):160-169.
    Download  
     
    Export citation  
     
    Bookmark  
  36. AI-Driven Threat Detection in Multi-Cloud Environments: A Proactive Security Approach.Afreen Sajida Siddique Samar Nilesh Dasgupta - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (1):4142-4145.
    The proliferation of multi-cloud architectures has introduced significant complexities in cyber security, necessitating advanced solutions to safeguard distributed infrastructures. Traditional security models often fall short in addressing the dynamic and heterogeneous nature of multi-cloud environments. Artificial Intelligence (AI) has emerged as a transformative force in enhancing threat detection capabilities, offering proactive and adaptive security measures. This paper explores the integration of AI - driven threat detection systems within multi-cloud frameworks, emphasizing their role in identifying and mitigating security threats in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Autonomous agency and the threat of social psychology.Eddy Nahmias - 2007 - In M. Marraffa, M. Caro & F. Ferretti, Cartographies of the Mind: Philosophy and Psychology in Intersection. Springer.
    This chapter discusses how research in situationist social psychology may pose largely undiscussed threats to autonomous agency, free will, and moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  38. Neuroscientific threats to free will.Joshua Shepherd - 2016 - In Kevin Timpe, Meghan Griffith & Neil Levy, The Routlege Companion to Free Will. New York: Routledge.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Illegal Migration in India: Threats and Strategic Solutions for National Security and Socioeconomic Stability.Divyanshu Kumar Jha - manuscript - Translated by Divyanshu Kumar Jha.
    Illegal migration has become a critical and ongoing challenge for India, affecting the country’s national security, economic stability, and social harmony. This paper focuses specifically on individuals who enter or remain in India without legal authorization and engage in criminal activities, misuse public resources, or violate laws. Unlike legal migrants or refugees who seek protection and contribute positively, these unauthorized migrants often strain India’s infrastructure and public services, creating challenges for law enforcement and governance. This study analyzes the risks posed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Looking for trouble: A common threat-detection mechanism underlying pain, fear, and anxiety.Luca Barlassina - forthcoming - Mind and Language.
    I put forward a novel cognitive architecture for pain, fear, and anxiety, according to which these three capacities are underpinned by a common threat-detection mechanism. This mechanism takes information about potential threats as input, assesses whether the threat is actual and, if it deems it is, outputs a threat representation. If this is correct, pain, fear, and anxiety turn out to be different manifestations of the same cognitive mechanism. I defend my proposal by discussing a large swath of convergent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Meaning under the Threat of Paradox on Two Fronts.Olga Ramirez Calle - 2020 - Analiza I Egzystencja 50:5-17.
    The paper defends the argument that the Resemblance Paradox (RP), or the problem of the ‘under-determination of meaning’, and the Rule-Following Paradox (RFP) are two sides of the same paradox threatening meaning from opposite extremes. After presenting the case, the paradox is reconsidered anew and the supposition that the threat is a pervasive one is challenged.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Knowledge Under Threat.Tomas Bogardus - 2014 - Philosophy and Phenomenological Research 88 (2):289-313.
    Many contemporary epistemologists hold that a subject S’s true belief that p counts as knowledge only if S’s belief that p is also, in some important sense, safe. I describe accounts of this safety condition from John Hawthorne, Duncan Pritchard, and Ernest Sosa. There have been three counterexamples to safety proposed in the recent literature, from Comesaña, Neta and Rohrbaugh, and Kelp. I explain why all three proposals fail: each moves fallaciously from the fact that S was at epistemic risk (...)
    Download  
     
    Export citation  
     
    Bookmark   93 citations  
  43. Cognitive Enhancement and the Threat of Inequality.Walter Veit - 2018 - Journal of Cognitive Enhancement 2 (4):1-7.
    As scientific progress approaches the point where significant human enhancements could become reality, debates arise whether such technologies should be made available. This paper evaluates the widespread concern that human enhancements will inevitably accentuate existing inequality and analyzes whether prohibition is the optimal public policy to avoid this outcome. Beyond these empirical questions, this paper considers whether the inequality objection is a sound argument against the set of enhancements most threatening to equality, i.e., cognitive enhancements. In doing so, I shall (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  44. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair, Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Real-Time Cyber Threat Detection and Response System.P. Abirami V. Phanikumar, V. Venkata Nani, V. Premkumar, Y. Nithish Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Real-Time Cyber Threat Detection and Response System is an intelligent security framework designed to proactively identify, analyze, and respond to cyber threats in real time. With the growing sophistication of cyberattacks targeting critical infrastructure, traditional static defense mechanisms are no longer sufficient. This system addresses that gap by leveraging machine learning algorithms and dimensionality reduction techniques such as Principal Component Analysis (PCA) to enable accurate and efficient threat detection. The system captures input data, such as network traffic or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Peers and Performance: How In-Group and Out-Group Comparisons Moderate Stereotype Threat Effects.Keith Markman & Ronald Elizaga - 2008 - Current Psychology 27:290-300.
    The present study examined how exposure to the performance of in-group and out-group members can both exacerbate and minimize the negative effects of stereotype threat. Female participants learned that they would be taking a math test that was either diagnostic or nondiagnostic of their math ability. Prior to taking the test, participants interacted with either an in-group peer (a female college student) or an out-group peer (a male college student) who had just taken the test and learned that the student (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Adaptive Interventions Reducing Social Identity Threat to Increase Equity in Higher Distance Education: A Use Case and Ethical Considerations on Algorithmic Fairness.Laura Froehlich & Sebastian Weydner-Volkmann - 2024 - Journal of Learning Analytics 11 (2):112-122.
    Educational disparities between traditional and non-traditional student groups in higher distance education can potentially be reduced by alleviating social identity threat and strengthening students’ sense of belonging in the academic context. We present a use case of how Learning Analytics and Machine Learning can be applied to develop and implement an algorithm to classify students as at-risk of experiencing social identity threat. These students would be presented with an intervention fostering a sense of belonging. We systematically analyze the intervention’s intended (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Is fake news a threat to deliberative democracy? Partisanship, inattentiveness, and deliberative capacities.Jonathan Benson - forthcoming - Social Theory and Practice.
    Deliberative democracy is increasingly criticised as out of touch with the realities of partisan politics. This paper considers the rise of fake and hyperpartisan news as one source of this scepticism. While popular accounts often blame such content on citizens’ political biases and motivated reasoning, I survey the empirical evidence and argue that it does not support strong claims about the inability of citizens to live up to deliberative ideals. Instead, much of this research is shown to support the deliberative (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. AI vs Cyber Threats: Real-World Case Studies on Securing Healthcare Data.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):396-404.
    The increasing rate and sophistication of cyber attacks pose a major risk to health data security. Traditional security systems cannot handle advanced ransomware, insider threats, and phishing attacks and hence incorporation of artificial intelligence (AI) into cybersecurity solutions becomes the need of the hour. AI-based security solutions leverage machine learning, behavior analysis, and real-time anomaly detection to identify and counter threats before they affect sensitive patient information. This study examines real-world case studies where AI successfully prevented cyberattacks in (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 985