362 resultados para Security Studies - Military


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Governmentâs Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote dâIvoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the projectâs initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback â comments, questions, critique and suggestions â to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While there is strong interest in teaching values in Australia and internationally there is little focus on young childrenâs moral values learning in the classroom. Research shows that personal epistemology influences teaching and learning in a range of education contexts, including moral education. This study examines relationships between personal epistemologies (childrenâs and teachersâ), pedagogies, and school contexts for moral learning in two early years classrooms. Interviews with teachers and children and analysis of school policy revealed clear patterns of personal epistemologies and pedagogies within each school. A whole school approach to understanding personal epistemologies and practice for moral values learning is suggested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of vibrational spectroscopic techniques to characterise historical artefacts and art works continues to grow and to provide the archaeologist and art historian with significant information with which to understand the nature and activities of previous peoples and civilizations. In addition, conservators can gain knowledge of the composition of artworks or historical objects and so are better equipped to ensure their preservation. Both infrared and Raman have been widely used. Microspectroscopy is the preferred sampling technique as it requires only a very small sample, which often can be recovered. The use of synchrotron radiation in conjunction with IR microspectroscopy is increasing because of the substantial benefits in terms of improved spatial resolution and signal-to-noise ratio. The key trend for the future is the growth in the use of portable instruments, both IR and Raman, which are becoming important because they allow non-destructive measurements to be made in situ, for example at an archaeological site or at a museum.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate many different and possibly heterogeneous systems which are generally independently designed and developed, to allow seamless access. In effect, the integration of these systems results in one large whole system that must be able, at the same time, to maintain the local autonomy and to continue working as an independent entity. This problem has introduced a new distributed architecture called federated systems. The most challenging issue in federated systems is to find answers for the question of how to efficiently cooperate while preserving their autonomous characteristic, especially the security autonomy. This thesis intends to address this issue. The thesis reviews the evolution of the concept of federated systems and discusses the organisational characteristics as well as remaining security issues with the existing approaches. The thesis examines how delegation can be used as means to achieve better security, especially authorisation while maintaining autonomy for the participating member of the federation. A delegation taxonomy is proposed as one of the main contributions. The major contribution of this thesis is to study and design a mechanism to support dele- gation within and between multiple security domains with constraint management capability. A novel delegation framework is proposed including two modules: Delegation Constraint Man- agement module and Policy Management module. The first module is designed to effectively create, track and manage delegation constraints, especially for delegation processes which require re-delegation (indirect delegation). The first module employs two algorithms to trace the root authority of a delegation constraint chain and to prevent the potential conflict when creating a delegation constraint chain if necessary. The first module is designed for conflict prevention not conflict resolution. The second module is designed to support the first module via the policy comparison capability. The major function of this module is to provide the delegation framework the capability to compare policies and constraints (written under the format of a policy). The module is an extension of Lin et al.'s work on policy filtering and policy analysis. Throughout the thesis, some case studies are used as examples to illustrate the discussed concepts. These two modules are designed to capture one of the most important aspects of the delegation process: the relationships between the delegation transactions and the involved constraints, which are not very well addressed by the existing approaches. This contribution is significant because the relationships provide information to keep track and en- force the involved delegation constraints and, therefore, play a vital role in maintaining and enforcing security for transactions across multiple security domains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Critical futures studies is not about the careers of a few scholars, rather it is about projects that transcend the narrow boundaries of the self. This biographical monograph examines the life and work of Richard Slaughter and Sohail Inayatullah.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Honing and Ladinig (2008) make the assertion that while the internal validity of web-based studies may be reduced, this is offset by an increase in external validity possible when experimenters can sample a wider range of participants and experimental settings. In this paper, the issue of internal validity is more closely examined, and it is agued that there is no necessary reason why internal validity of a web-based study should be worse than that of a lab-based one. Errors of measurement or inconsistencies of manipulation will typically balance across conditions of the experiment, and thus need not necessarily threaten the validity of a studyâs findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most of creativity in the digital world passes unnoticed by the industry practices and policies, and it isn't taken into account in the cultural and economic strategies of the creative industries. We should find ways to catalyze this creative production, showing how the user's contribution may contribute to social learning, cultural and economic advancement. To that effect, we must know what is an open creative system and how it works. Based on this diagnosis, the author that interdisciplinarity is urgent and there is also a need for a science of culture. What is at stake is a strategy of integrated development, as regards the upcoming innovation in its complex, productive and learning aspects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This fourth edition of Communication, Cultural and Media Studies: The Key Concepts is an indispensible guide to the most important terms in the field. It offers clear explanations of the key concepts, exploring their origins, what theyâre used for and why they provoke discussion. The author provides a multi-disciplinary explanation and assessment of the key concepts, from â˜authorshipâ to â˜censorshipâ; â˜creative industriesâ to â˜network theoryâ; â˜complexityâ to â˜visual cultureâ. The new edition of this classic text includes: * Over 200 entries including 50 new entries * All entries revised, rewritten and updated * Coverage of recent developments in the field * Insight into interactive media and the knowledge-based economy * A fully updated bibliography with 400 items and suggestions for further reading throughout the text

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been growing interest in how to make tertiary education more global and international not only in context but, also, in approach and methodology. One area of the education sector that has come under specific focus is the higher education sector curriculum and its design. This paper addresses the process of â˜internationalisingâ the curriculum through the specific example of designing a new literary unit for undergraduate students, mainly literary studies and creative writing students. The literary unit entitled: Imagining the Americas: Contemporary American Literature and Culture, has the added complexity of being a unit about national fiction. This paper explores the practical problems and obstacles encountered in setting up this unit while using a framework of internationalisation. The case study examines the practicalities in implementing strategies that reflect the overall objective of creating global thinkers within a tertiary environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While requiring students to think reflectively is a desirable teaching goal, it is often fraught with complexity and is sometimes poorly implemented in higher education. In this paper, we describe an approach to academic reflective practices that fitted a design subject in fashion education and was perceived as effective in enhancing student learning outcomes. In many design-based disciplines, it is essential to evaluate, through a reflective lens, the quality of tangible design outcomes - referred to here as artefacts. Fashion studio based practice (unlike many other theory based disciplines)requires an artefact to be viewed in order to initiate the reflective process. This reflection is not solely limited to reflective writing; the reflection happens through sight, touch and other non-traditional approaches. Fashion students were asked to reflect before, during and after the development of an artefact. Through a variety of media, a review of the first garment prototype - called a Sample Review - occurred. The reflective practices of students during the Sample Review provided a valuable insight into their own learning, as well as a valid assessment indicator for the lecturer. It also mirrored industry practices for design evaluation. We believe that this deliberative approach, characterised by artefact-prompted reflection, has wide applicability across undergraduate courses in a variety of discipline areas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a programâs object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or programâs security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The toolâs capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Talk of a possible Israeli strike on Iranâs nuclear facilities has re-ignited debate over the right of self-defence under international law. Some academics, including Anthony D'Amato and Alan Dershowitz, have claimed that an attack on Iran would be a permissible act of self-defence. Others, such as Kevin Jon Heller, argue that such action would be a clear breach of international law. So, who is correct? Would military action against Iran be legal or illegal?