243 resultados para Jihadist threat


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Focused on the alternative futures of terrorism, this study engages with the different levels of terrorism knowledge to identify and challenge the restrictive narratives that define terrorism: that "society must be defended" from the "constant and evolving terrorist threat". Using Causal Layered Analysis to deconstruct and reconstruct strategies, alternative scenarios emerge. These alternative futures are depicted collectively as a maze, highlighting the prospect of navigating towards preferred and even shared terrorism futures, once these are supported by new and inclusive metaphors and stakeholder engagement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the construction of Aboriginality in recent public policy reasoning through identifying representations deployed by architects and supporters of the Commonwealth’s 2007 Northern Territory Emergency Response (the intervention). Debate about the Northern Territory intervention was explicitly situated in relation to a range of ideas about appropriate Government policy towards Indigenous people, and particularly about the nature, role, status, value and future of Aboriginality and of Aboriginal people and Torres Strait Islanders. This project involves analysis of constructions of Aboriginality deployed in texts created and circulated to explain and justify the policy program. The aim of the project is to identify the ideas about Aboriginality deployed by the intervention’s architects and supporters, and to examine the effects and implications of these discourses for political relationships between Indigenous people and settlers in Australia. This thesis will argue that advocates of the Northern Territory intervention construct Aboriginality in a range of important ways that reassert and reinforce the legitimacy of the settler colonial order and the project of Australian nationhood, and operate to limit Aboriginal claims. Specifically, it is argued that in linking Aboriginality to the abuse of Aboriginal children, the intervention’s advocates and supporters establish a political debate about the nature and future of Aboriginality within a discursive terrain in which the authority and perspectives of Indigenous people are problematised. Aboriginality is constructed in this process as both temporally and spatially separated from settler society, and in need of coercive integration into mainstream economic and political arrangements. Aboriginality is depicted by settler advocates of intervention as an anachronism, with Aboriginal people and cultures understood as primitive and/or savage precursors to settlers who are represented as modern and civilised. As such, the communities seen as the authentic home or location of Aboriginality represent a threat to Aboriginal children as well as to settlers. These constructions function to obscure the violence of the settler order, provide justification or moral rehabilitation for the colonising project, and reassert the sovereignty of the settler state. The resolution offered by the intervention’s advocates is a performance or enactment of settler sovereignty, representing a claim over and through both the territory of Aboriginal people and the discursive terrain of nationhood.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We finished penning this special issue and sending it to press on martin Luther King Jr. Day. We take pause, honoring Martin Luther King's memory and we are dedicating this project to his profound vision as a public intellectual and world activist for whom two of his breakthrough ideas are particularly relevant to this collection. The guest editors, along with the contributors, are reinforcing his messages for the current and future eras that "leadership is the action of ideas to make change, through the agency of individuals" (p. 74) and that "Injustice anywhere is a threat to justice everywhere" (p. 75) (see Temes 1996).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maritime terrorism is one of the main maritime security issues in the contemporary world. The threat of maritime terrorism is more apparent than ever in the post-September 11 era. Although maritime terrorism is an old issue, the disastrous events of 11 September 2001 brought this issue again onto the global agenda. This incident brought to the forefront the longstanding concerns that terrorists could severely disrupt the global maritime supply chain by using shipping containers or vessels to attack major business centres, port facilities and offshore installations. A number of international criminal law studies have been conducted to identify international legal challenges in maritime security. Some of these works have critically examined the international legal framework for maritime security and identified the lacunas in the existing system. Some of these writings have also identified that emerging maritime terrorism issues are prompting States to introduce some stringent measures. Although the international legal regime related to maritime terrorism is a well-researched area, very little research work has explored the legal issues related to State responsibility for maritime terrorism. This article argues that, although the United Nations Convention on the Law of the Sea (UNCLOS) provisions related to maritime piracy may not be applicable for some dimensions of maritime violence, different provisions of UNCLOS may relevant in identifying State responsibility for maritime terrorism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Throughout much of the world, urban and rural public spaces may be said to be under attack by property developers, commercial interests and also attempts by civic authorities to regulate, restrict, reframe and rebrand these spaces. A consequence of the increasingly security driven, privatised, commercial and surveilled nature of public space is the exclusion and displacement of those considered ‘flawed’ and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities initiatives can act to refashion public space as sites of selective inclusion and exclusion. The use of surveillance and other control technologies as deployed in and around the UK ‘Riots’ of 2011 may help to promote and encourage a passing sense of personal safety and confidence in using public space. Through systems of social sorting, the same surveillance assemblages can also further the physical, emotional and psychological exclusion of certain groups and individuals, deemed to be both ‘out of time and out of place’ in major zones of urban, conspicuous, consumption. In this harsh environment of monitoring and control procedures, children and young people’s use of public spaces and places in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to social order, requiring various forms of punitive and/or remedial action. Much of this civic action actively excludes some children and young people from participation and as a consequence, their trust in local processes and communities is eroded. This paper discusses worldwide developments in the surveillance, governance and control of the public space environments used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of belonging, wellbeing and rights to public space as an expression of their social, political and civil citizenship(s).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Chronic psychological stress may pose a serious threat to health, although the mechanisms are not fully understood. This study examines the impact of stress on modifiable lifestyle factors, depressive symptoms, health-related quality of life (HRQOL) and chronic illness in older Australian women. Methods Cross-sectional data were collected from a random sample of 181 older adults aged 60-70 years from rural and urban areas of South-East Queensland, Australia. We used structural equation modelling to examine associations between stress, modifiable lifestyle factors, HRQoL, and chronic illness. Findings Parameter estimates show that older women who reported life stressors where they felt helpless and feared for their life (high magnitude stressors) also reported higher body mass index (p = 0.03) and more chronic illness (p <0.01). In contrast, duration of exposure to life stressors was associated with higher depressive symptom scores (CES-D, p = 0.02) and sleep disturbance scores (p <0.01). Conclusions Our findings support the link between traumatic personal histories (exposure to high magnitude stressors) and unhealthy lifestyle factors. Findings highlight the need for more research on how stress reduction healthy lifestyle and positive coping strategies can be used to reduce the effects of high magnitude stress on health-related quality of life and chronic illness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fusion techniques can be used in biometrics to achieve higher accuracy. When biometric systems are in operation and the threat level changes, controlling the trade-off between detection error rates can reduce the impact of an attack. In a fused system, varying a single threshold does not allow this to be achieved, but systematic adjustment of a set of parameters does. In this paper, fused decisions from a multi-part, multi-sample sequential architecture are investigated for that purpose in an iris recognition system. A specific implementation of the multi-part architecture is proposed and the effect of the number of parts and samples in the resultant detection error rate is analysed. The effectiveness of the proposed architecture is then evaluated under two specific cases of obfuscation attack: miosis and mydriasis. Results show that robustness to such obfuscation attacks is achieved, since lower error rates than in the case of the non-fused base system are obtained.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Explosive ordnance disposal (EOD) technicians are required to wear protective clothing to protect themselves from the threat of overpressure, fragmentation, impact and heat. The engineering requirements to minimise these threats results in an extremely heavy and cumbersome clothing ensemble that increases the internal heat generation of the wearer, while the clothing’s thermal properties reduce heat dissipation. This study aimed to evaluate the heat strain encountered wearing EOD protective clothing in simulated environmental extremes across a range of differing work intensities. Eight healthy males [age 25±6 years (mean ± sd), height 180±7 cm, body mass 79±9 kg, V˙O2max 57±6 ml.kg−1.min−1] undertook nine trials while wearing an EOD9 suit (weighing 33.4 kg). The trials involved walking on a treadmill at 2.5, 4 and 5.5 km⋅h−1 at each of the following environmental conditions, 21, 30 and 37°C wet bulb globe temperature (WBGT) in a randomised controlled crossover design. The trials were ceased if the participants’ core temperature reached 39°C, if heart rate exceeded 90% of maximum, if walking time reached 60 minutes or due to fatigue/nausea. Tolerance times ranged from 10–60 minutes and were significantly reduced in the higher walking speeds and environmental conditions. In a total of 15 trials (21%) participants completed 60 minutes of walking; however, this was predominantly at the slower walking speeds in the 21°C WBGT environment. Of the remaining 57 trials, 50 were ceased, due to attainment of 90% maximal heart rate. These near maximal heart rates resulted in moderate-high levels of physiological strain in all trials, despite core temperature only reaching 39°C in one of the 72 trials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For the first of the baby boomers turning 65 years of age, after a decade littered with financial shocks (dot.com bubble, sub-prime, global financial crisis, sovereign debt), sequencing risk can represent a significant threat to their retirement nest eggs. This paper takes an outcomeoriented approach to the problem, to provide practical insights into how sequencing risk works and the critical dependency of retirement outcomes on sequencing risk. Our analysis challenges the conventional wisdom that it is the accumulated average of investment returns that matter. We show, instead, that it is the realised sequence of returns which largely determines the sustainability of retirement incomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The former Archbishop of York stood accused last night of covering up allegations that a senior Church of England clergyman had abused choirboys and school pupils. Lord Hope of Thornes was made aware of the accusations against the Very Rev Robert Waddington, a former Dean of Manchester Cathedral and once the cleric in overall charge of Church schools, in 1999 and again in 2003. Waddington was stripped of his right to conduct church services but the archbishop did not report concerns about alleged past abuse or a potential continuing threat to children to police or child protection agencies. The extent of Waddington’s alleged history of abuse and the Church’s inaction has been revealed through a joint investigation by The Times and The Australian newspaper in Sydney.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Young children are thought to be particularly sensitive to heatwaves, but relatively less research attention has been paid to this field to date. A systematic review was conducted to elucidate the relationship between heat waves and children’s health. Literature published up to August 2012 were identified using the following MeSH terms and keywords: “heatwave”, “heat wave”, “child health”, “morbidity”, “hospital admission”, “emergency department visit”, “family practice”, “primary health care”, “death” and “mortality”. Of the 628 publications identified, 12 met the selection criteria. The existing literature does not consistently suggest that mortality among children increases significantly during heat waves, even though infants were associated with more heat-related deaths. Exposure to heat waves in the perinatal period may pose a threat to children’s health. Pediatric diseases or conditions associated with heat waves include renal disease, respiratory disease, electrolyte imbalance and fever. Future research should focus on how to develop a consistent definition of a heat wave from a children’s health perspective, identifying the best measure of children’s exposure to heat waves, exploring sensitive outcome measures to quantify the impact of heat waves on children, evaluating the possible impacts of heat waves on children’s birth outcomes, and understanding the differences in vulnerability to heat waves among children of different ages and from different income countries. Projection of the children’s disease burden caused by heat waves under climate change scenarios, and development of effective heat wave mitigation and adaptation strategies that incorporate other child protective health measures, are also strongly recommended.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.