Results 11 to 20 of about 1,108,131 (292)

Algorithms and values in justice and security [PDF]

open access: yesAI & SOCIETY, 2020
AbstractThis article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology (not incorporated here are empirical and technical investigations).
Hayes, P.D. (author)   +2 more
openaire   +4 more sources

The Myers–Briggs Personality Types of Veterinary Students and Their Animal Ethical Profiles in Comparison to Criminal Justice Students in Slovenia

open access: yesVeterinary Sciences, 2022
Personality types are related to trustworthy, reliable, and competent communication, especially when dealing with clients. Therefore, the purpose of this study was to investigate whether the Myers–Briggs (MBTI) indicator could be used to detect ...
Valentina Kubale   +2 more
doaj   +1 more source

Mapping Counter-Trafficking in Potential Migrant Crisis in Bosnia and Herzegovina [PDF]

open access: yesBezbednosni Dijalozi, 2018
Bosnia and Herzegovina, as a post-war country in transition with close proximity to the European Union, complex political structure, underdeveloped economy, a high number of refugees and internally displaced persons, young migration management structure,
Elmedin MURATBEGOVIĆ   +1 more
doaj   +1 more source

Justice and security in the United Kingdom [PDF]

open access: yes, 2014
This paper outlines the ways in which the United Kingdom manages civil litigation concerning sensitive national security material. These are: the common law of public interest immunity; the use of closed material procedure and special advocates; and the ...
Tomkins, A.
core   +1 more source

Outsource or not? An AHP Based Decision Model for Information Security Management

open access: yesOrganizacija, 2022
Purpose: Outsourcing information security has proven to be an efficient solution for information security management; however, it may not be the most suitable approach for every organization.
Jelovčan Luka   +2 more
doaj   +1 more source

Web Application based Image Geolocation Analysis to Detect Human Trafficking

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Migrant smuggling is a dangerous phenomenon threatening international peace and security. This global concern for many countries is mainly due to the high use of multimedia devices and social media.
Ibrahim Adam   +4 more
doaj   +1 more source

Configuring Security and Justice

open access: yesSSRN Electronic Journal, 2005
Surveys of public opinion conducted at different times in Canada and in the UK show that many more respondents believe in the criminal courts than in the police for controlling crime. The implications of this perceived gap in the crime control efficiency of punishing and of policing are examined through an analysis of the notions of penal justice and ...
Shearing, Clifford, Brodeur, Jean-Paul
openaire   +1 more source

Just and sustainable? : examining the rhetoric and potential realities of UK food security [PDF]

open access: yes, 2011
The dominant discourse in 20th century UK food and agricultural policies of a liberal, free trade agenda was modified at the turn of the 21st to embrace ecological sustainability and "food security." The latter term has a long international history; the ...
Dowler, Elizabeth, MacMillan, Tom
core   +1 more source

Population genetic data for 12 X-STR loci in the Central Saudi region using investigator Argus X-12 amplification kit

open access: yesAnnals of Human Biology, 2021
Background X-chromosome short tandem repeat (X-STR) markers are important in forensic identity investigations and kinship analysis. Subject and methods In the current study, the distribution of 12 X-STR loci located in four linkage groups was evaluated ...
Safia A. Messaoudi   +7 more
doaj   +1 more source

Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering

open access: yesApplied Sciences, 2023
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
Anže Mihelič   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy