Results 11 to 20 of about 1,108,131 (292)
Algorithms and values in justice and security [PDF]
AbstractThis article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology (not incorporated here are empirical and technical investigations).
Hayes, P.D. (author) +2 more
openaire +4 more sources
Personality types are related to trustworthy, reliable, and competent communication, especially when dealing with clients. Therefore, the purpose of this study was to investigate whether the Myers–Briggs (MBTI) indicator could be used to detect ...
Valentina Kubale +2 more
doaj +1 more source
Mapping Counter-Trafficking in Potential Migrant Crisis in Bosnia and Herzegovina [PDF]
Bosnia and Herzegovina, as a post-war country in transition with close proximity to the European Union, complex political structure, underdeveloped economy, a high number of refugees and internally displaced persons, young migration management structure,
Elmedin MURATBEGOVIĆ +1 more
doaj +1 more source
Justice and security in the United Kingdom [PDF]
This paper outlines the ways in which the United Kingdom manages civil litigation concerning sensitive national security material. These are: the common law of public interest immunity; the use of closed material procedure and special advocates; and the ...
Tomkins, A.
core +1 more source
Outsource or not? An AHP Based Decision Model for Information Security Management
Purpose: Outsourcing information security has proven to be an efficient solution for information security management; however, it may not be the most suitable approach for every organization.
Jelovčan Luka +2 more
doaj +1 more source
Web Application based Image Geolocation Analysis to Detect Human Trafficking
Migrant smuggling is a dangerous phenomenon threatening international peace and security. This global concern for many countries is mainly due to the high use of multimedia devices and social media.
Ibrahim Adam +4 more
doaj +1 more source
Configuring Security and Justice
Surveys of public opinion conducted at different times in Canada and in the UK show that many more respondents believe in the criminal courts than in the police for controlling crime. The implications of this perceived gap in the crime control efficiency of punishing and of policing are examined through an analysis of the notions of penal justice and ...
Shearing, Clifford, Brodeur, Jean-Paul
openaire +1 more source
Just and sustainable? : examining the rhetoric and potential realities of UK food security [PDF]
The dominant discourse in 20th century UK food and agricultural policies of a liberal, free trade agenda was modified at the turn of the 21st to embrace ecological sustainability and "food security." The latter term has a long international history; the ...
Dowler, Elizabeth, MacMillan, Tom
core +1 more source
Background X-chromosome short tandem repeat (X-STR) markers are important in forensic identity investigations and kinship analysis. Subject and methods In the current study, the distribution of 12 X-STR loci located in four linkage groups was evaluated ...
Safia A. Messaoudi +7 more
doaj +1 more source
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
Anže Mihelič +2 more
doaj +1 more source

