531 research outputs found
An Analysis of Martha Nussbaum's Capabilities Approach with Attention to Her Use of the Term "Threshold"
This paper investigates Martha Nussbaum's capabilities approach, which is influential in current political philosophy and policy making. The capabilities approach is contextualized within the scope of Nussbaum's influences in section I. These influences are primarily Aristotle, Kant, Marx, John Rawls, and Amartya Sen. In section II her own view is explicated with attention to the influences previously described. This section also attempts to clarify certain aspects of her view, such as her use of "person" and "human." This is in order to set the stage for section III, which critiques the various aspects of the approach which were explained in section II. In general, the capabilities approach is found wanting, however there are some useful qualities that are unique to a capabilities approach to political philosophy, ethics, or economics
An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems
Vulnerability management strategy, from both organizational and public policy
perspectives, hinges on an understanding of the supply of undiscovered
vulnerabilities. If the number of undiscovered vulnerabilities is small enough,
then a reasonable investment strategy would be to focus on finding and removing
the remaining undiscovered vulnerabilities. If the number of undiscovered
vulnerabilities is and will continue to be large, then a better investment
strategy would be to focus on quick patch dissemination and engineering
resilient systems. This paper examines a paradigm, namely that the number of
undiscovered vulnerabilities is manageably small, through the lens of
mathematical concepts from the theory of computing. From this perspective, we
find little support for the paradigm of limited undiscovered vulnerabilities.
We then briefly support the notion that these theory-based conclusions are
relevant to practical computers in use today. We find no reason to believe
undiscovered vulnerabilities are not essentially unlimited in practice and we
examine the possible economic impacts should this be the case. Based on our
analysis, we recommend vulnerability management strategy adopts an approach
favoring quick patch dissemination and engineering resilient systems, while
continuing good software engineering practices to reduce (but never eliminate)
vulnerabilities in information systems
Multifunctional supramolecular polymer networks as next-generation consolidants for archaeological wood conservation.
The preservation of our cultural heritage is of great importance to future generations. Despite this, significant problems have arisen with the conservation of waterlogged wooden artifacts. Three major issues facing conservators are structural instability on drying, biological degradation, and chemical degradation on account of Fe(3+)-catalyzed production of sulfuric and oxalic acid in the waterlogged timbers. Currently, no conservation treatment exists that effectively addresses all three issues simultaneously. A new conservation treatment is reported here based on a supramolecular polymer network constructed from natural polymers with dynamic cross-linking formed by a combination of both host-guest complexation and a strong siderophore pendant from a polymer backbone. Consequently, the proposed consolidant has the ability to chelate and trap iron while enhancing structural stability. The incorporation of antibacterial moieties through a dynamic covalent linkage into the network provides the material with improved biological resistance. Exploiting an environmentally compatible natural material with completely reversible chemistries is a safer, greener alternative to current strategies and may extend the lifetime of many culturally relevant waterlogged artifacts around the world.This is the author's accepted manuscript. The final version is available from PNAS at http://www.pnas.org/content/111/50/17743.long
- …
