216 resultados para financial security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The global financial crisis has led many regulators and lawmakers to a rethinking about current versus optimum financial market structures and activities that include a variety and even radical ideas about delevaraging and downsizing finance. This paper focuses on the flaws and shortcomings of regulatory reforms of finance and on the necessity of and scope for more radical transformative strategies. With 'crisis economics' back, the most developed countries, including the EU member states, are still on the edge of disaster and confronted with systemic risk. Changes in financial regulation adopted in the aftermath of the financial meltdown have not been radical enough to transform the overall system of finance-driven capitalism towards a more sustainable system with a more embedded finance. The paper discusses financialisation in order to understand the development trends in finance over the past decades and examines various theories to describe the typical trends and patterns in financial regulation. By focusing on a limited number of regulatory reforms in the European Union, the limitations of current reforms and the need for additional transformative strategies necessary to overcome the finance-driven accumulation regime are explored. Finally, the regulatory space for such transformative strategies and for taming finance in times of crisis, austerity, and increased public protest potential is analysed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper critically interrogates how borders are produced by scientists, engineers and security experts in advance of the actual deployment of technical devices they develop. This paper explores the prior stages of translation and decision-making as a socio-technical device is conceived and developed. Drawing on in-depth interviews, observations and ethnographic research of the EU-funded Handhold project (consisting of nine teams in five countries), it explores how assumptions about the way security technologies will and should perform at the border shape the way that scientists, engineers, and security experts develop a portable, integrated device to detect CBRNE threats at borders. In disaggregating the moments of sovereign decision making across multiple sites and times, this paper questions the supposed linearity of how science comes out of and feeds back into the world of border security. An interrogation of competing assumptions and understandings of security threats and needs, of competing logics of innovation and pragmatism, of the demands of differentiated temporalities in detection and interrogation, and of the presumed capacities, behaviours, and needs of phantasmic competitors and end-users reveals a complex, circulating and co-constitutive process of device development that laboratises the border itself. We trace how sovereign decisions are enacted as assemblages in the antecedent register of device development itself through the everyday decisions of researchers in the laboratory, and the material components of the Handhold device itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Invited talk, representing the Royal Society

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Expansion of the meat inspection process to incorporate animal-based welfare measurements could contribute towards significant improvements in pig (Sus scrofa domesticus) welfare and farm profitability. This study aimed to determine the prevalence of different welfare-related lesions on the carcase and their relationship with carcase condemnations (CC) and carcase weight (CW). The financial implications of losses associated with CC and CW reductions related to the welfare lesions were also estimated. Data on tail lesions, loin bruising and bursitis, CW and condemnation/trimming outcome (and associated weights) were collected for 3,537slaughter pigs (mean [± SEM] carcase weight: 79.2 [± 8.82] kg). Overall, 72.5% of pigs had detectable tail lesions, whilst 16.0 and 44.0% were affected by severe loin bruising and hind limb bursitis, respectively. There were 2.5% of study carcases condemned and a further 3.3% were trimmed. The primary cause of CC was abscessation. While tail lesion severity did not increase the risk of abscessation, it was significantly associated with CC. Male pigs had a higher risk of tail lesions and of CC. The financial loss to producers associated with CC and trimmings was estimated at €1.10 per study pig. CW was reduced by up to 12 kg in cases of severe tail lesions. However, even mild lesions were associated with a significant reduction in CW of 1.2 kg. The value of the loss in potential CW associated with tail lesions was €0.59 per study pig. Combined with losses attributable to CC and trimmings this represented a loss of 43% of the profit margin per pig, at the time of the study, attributable to tail biting. These findings illustrate the magnitude of the impact of tail biting on pig welfare and on profitability of the pig industry. They also emphasise the potential contribution that the inclusion of welfare parameters at meat inspection could make to pig producers in informing herd health and welfare management plans.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the aftermath of the Irish revolution and Civil War the governments of independent Ireland introduced various compensation schemes to provide financial reintegration assistance to revolutionary veterans. This would be recognised today as part of a programme for DDR. This paper will examine various service and disability pensions paid to veterans in the context of literature on post-conflict reintegration. It will examine various challenges to reintegration in an effort to analyse the success of revolutionary compensation as a post-conflict reintegration mechanism in independent Ireland after 1922.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security is a critical concern around the world. Since resources for security are always limited, lots of interest have arisen in using game theory to handle security resource allocation problems. However, most of the existing work does not address adequately how a defender chooses his optimal strategy in a game with absent, inaccurate, uncertain, and even ambiguous strategy profiles' payoffs. To address this issue, we propose a general framework of security games under ambiguities based on Dempster-Shafer theory and the ambiguity aversion principle of minimax regret. Then, we reveal some properties of this framework. Also, we present two methods to reduce the influence of complete ignorance. Our investigation shows that this new framework is better in handling security resource allocation problems under ambiguities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

African evangelical/Pentecostal/charismatic (EPC) Christians-previously dismissed by scholars as apolitical-are becoming increasingly active socially and politically. This chapter presents a case study of an EPC congregation in Harare. It demonstrates how the congregation provides short-term human security by responding to the needs of the poor, while at the same time creating space where people can develop the "self-expression values" necessary for long-term human security. The case study also demonstrates that even under authoritarian states, religious actors can actively choose to balance the immediate demands of short-term human security with the sometimes competing demands of long-term human security. Policymakers can benefit from a greater understanding of how religious actors strike this balance and from a greater appreciation of the variability, flexibility, and religious resources of EPC Christians in such contexts.