531 research outputs found

    An Analysis of Martha Nussbaum's Capabilities Approach with Attention to Her Use of the Term "Threshold"

    Get PDF
    This paper investigates Martha Nussbaum's capabilities approach, which is influential in current political philosophy and policy making. The capabilities approach is contextualized within the scope of Nussbaum's influences in section I. These influences are primarily Aristotle, Kant, Marx, John Rawls, and Amartya Sen. In section II her own view is explicated with attention to the influences previously described. This section also attempts to clarify certain aspects of her view, such as her use of "person" and "human." This is in order to set the stage for section III, which critiques the various aspects of the approach which were explained in section II. In general, the capabilities approach is found wanting, however there are some useful qualities that are unique to a capabilities approach to political philosophy, ethics, or economics

    An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems

    Full text link
    Vulnerability management strategy, from both organizational and public policy perspectives, hinges on an understanding of the supply of undiscovered vulnerabilities. If the number of undiscovered vulnerabilities is small enough, then a reasonable investment strategy would be to focus on finding and removing the remaining undiscovered vulnerabilities. If the number of undiscovered vulnerabilities is and will continue to be large, then a better investment strategy would be to focus on quick patch dissemination and engineering resilient systems. This paper examines a paradigm, namely that the number of undiscovered vulnerabilities is manageably small, through the lens of mathematical concepts from the theory of computing. From this perspective, we find little support for the paradigm of limited undiscovered vulnerabilities. We then briefly support the notion that these theory-based conclusions are relevant to practical computers in use today. We find no reason to believe undiscovered vulnerabilities are not essentially unlimited in practice and we examine the possible economic impacts should this be the case. Based on our analysis, we recommend vulnerability management strategy adopts an approach favoring quick patch dissemination and engineering resilient systems, while continuing good software engineering practices to reduce (but never eliminate) vulnerabilities in information systems

    Multifunctional supramolecular polymer networks as next-generation consolidants for archaeological wood conservation.

    Get PDF
    The preservation of our cultural heritage is of great importance to future generations. Despite this, significant problems have arisen with the conservation of waterlogged wooden artifacts. Three major issues facing conservators are structural instability on drying, biological degradation, and chemical degradation on account of Fe(3+)-catalyzed production of sulfuric and oxalic acid in the waterlogged timbers. Currently, no conservation treatment exists that effectively addresses all three issues simultaneously. A new conservation treatment is reported here based on a supramolecular polymer network constructed from natural polymers with dynamic cross-linking formed by a combination of both host-guest complexation and a strong siderophore pendant from a polymer backbone. Consequently, the proposed consolidant has the ability to chelate and trap iron while enhancing structural stability. The incorporation of antibacterial moieties through a dynamic covalent linkage into the network provides the material with improved biological resistance. Exploiting an environmentally compatible natural material with completely reversible chemistries is a safer, greener alternative to current strategies and may extend the lifetime of many culturally relevant waterlogged artifacts around the world.This is the author's accepted manuscript. The final version is available from PNAS at http://www.pnas.org/content/111/50/17743.long
    corecore