69 resultados para security and protection
Resumo:
The aim is to explore the protection that international human rights law offers to refugees, asylum-seekers, and the forcibly displaced. The ambition of the global rights framework is to guarantee a defined range of rights to all human beings, and thus move the basis for normative entitlement from exclusive reliance on national membership to a common humanity. This comprehensive and international perspective remains formally tied to states - acting individually or collectively - in terms of creation and implementation. The norms must find an entry point into the empirical world, and there must be clarity on responsibilities for practical delivery. It should remain unsurprising that the expectations raised by the normative reach of the law are frequently dashed in the complex and difficult human world of instrumental politics, power, and conflict. The intention here is to outline the international human rights law context, and indicate the value and limitations for the protection of refugees and asylum-seekers. A question is then raised about possible reform.
Resumo:
Malware detection is a growing problem particularly on the Android mobile platform due to its increasing popularity and accessibility to numerous third party app markets. This has also been made worse by the increasingly sophisticated detection avoidance techniques employed by emerging malware families. This calls for more effective techniques for detection and classification of Android malware. Hence, in this paper we present an n-opcode analysis based approach that utilizes machine learning to classify and categorize Android malware. This approach enables automated feature discovery that eliminates the need for applying expert or domain knowledge to define the needed features. Our experiments on 2520 samples that were performed using up to 10-gram opcode features showed that an f-measure of 98% is achievable using this approach.
Resumo:
Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are becoming more sophisticated to evade state-of-the-art detection approaches. Many Android malware families employ obfuscation techniques in order to avoid detection and this may defeat static analysis based approaches. Dynamic analysis on the other hand may be used to overcome this limitation. Hence in this paper we propose DynaLog, a dynamic analysis based framework for characterizing Android applications. The framework provides the capability to analyse the behaviour of applications based on an extensive number of dynamic features. It provides an automated platform for mass analysis and characterization of apps that is useful for quickly identifying and isolating malicious applications. The DynaLog framework leverages existing open source tools to extract and log high level behaviours, API calls, and critical events that can be used to explore the characteristics of an application, thus providing an extensible dynamic analysis platform for detecting Android malware. DynaLog is evaluated using real malware samples and clean applications demonstrating its capabilities for effective analysis and detection of malicious applications.
Resumo:
This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant motherchild dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parentchild attachment security. Mothers' religiosity also moderated the association between parentchild attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on motherchild attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.
Resumo:
Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.
Resumo:
The importance of establishing effective interagency working between adult mental health services and child care services in order to safeguard children has been repeatedly identified by research, policy, inquiries and inspection reports. This article reports on the evaluation of an initiative in one Health and Social Care Trust in Northern Ireland that aimed to facilitate joint working and so improve service provision and protection for children and families. The Champions Initiative involved identifying a champion in each multi-disciplinary community mental health team and in each family and child care team who would have responsibility for providing information, promoting joint working and identifying any obstacles to better co-operation. The evaluation of this initiative assessed levels of experience, training, confidence, understanding and awareness in the Champions and their team members at baseline. The Champions and their Team Leaders were then followed-up after six months to obtain their qualitative views of the impact of the initiative. The results include comparisons between mental health and child care staff, and crucially, views about whether the initiative has had any impact on working together. This study also generated recommendations for further service development in this complex and important area of practice.
Resumo:
‘Grooming’ and the Sexual Abuse of Children: Institutional, Internet and Familial Dimensions critically examines the official and popular discourses on grooming, predominantly framed within the context of on-line sexual exploitation and abuse committed by strangers, and institutional child abuse committed by those in positions of trust.
Set against the broader theoretical framework of risk, security and governance, this book argues that due to the difficulties of drawing clear boundaries between innocuous and harmful motivations towards children, pre-emptive risk-based criminal law and policy are inherently limited in preventing, targeting and criminalising ‘grooming’ behaviour prior to the manifestation of actual harm. Through examination of grooming against the complexities of the onset of sexual offending against children and its actual role in this process, the author broadens existing discourses by providing a fuller, more nuanced conceptualisation of grooming, including its role in intra-familial and extra-familial contexts. There is also timely discussion of new and emerging forms of grooming, such as ‘street’ or ‘localised’ grooming, as typified by recent cases in Rochdale and Oldham, and ‘peer-to-peer’ grooming.
The first inter-disciplinary, thematic, and empirical investigation of grooming in a multi-jurisdictional context, ‘Grooming’ and the Sexual Abuse of Children draws on extensive empirical research in the form of over fifty interviews with professionals, working in the fields of sex offender risk assessment, management or treatment, as well as child protection or victim support in the four jurisdictions of the United Kingdom and the Republic of Ireland. Impeccably presented and meticulously considered, this book will be of interest to criminologists and those working and studying in the field of policing and criminal justice studies, as well as policy makers and practitioners in the areas of child protection and sex offender management.
Resumo:
SALT threatened to institutionalize a bipolar world order. NWS and NNWS alike feared that the US and SU will prioritize global security principles such as systemic stability and conflict stability to Atlantic and European security. Endangered was Europe’s security and position in the future world order. Parity in strategic weapons invalidated the US nuclear umbrella. An ABM deployment and a non-transfer regime threatened Europe’s nuclear defence options. The danger of a Limited War or a denuclearization of Central Europe led to a European co-ordination on nuclear arms control to assure the preservation of the West and the future of Europe.
Resumo:
This publication traces how asylum seekers are repositioned in the existing European asylum legislation from asylum seekers as victims in need of protection, to criminals . It is argued that this is due to the European legislation concerning the area of freedom, security and justice. The latest asylum legislation seems to undermine the refugee status which -as it is widely known- is safeguarded by the 1951 Geneva Convention relating to the Status of Refugees and its relevant 1967 Protocol. Additionally, in this paper the role of social workers and other social scientists to protect the rights of asylum seekers and question the existing legislation is presented.
Resumo:
Attempts to record, understand and respond to variations in child welfare and protection reporting, service patterns and outcomes are international, numerous and longstanding. Reframing such variations as an issue of inequity between children and between families opens the way to a new approach to explaining the profound difference in intervention rates between and within countries and administrative districts. Recent accounts of variation have frequently been based on the idea that there is a binary division between bias and risk (or need). Here we propose seeing supply (bias) and demand (risk) factors as two aspects of a single system, both framed, in part, by social structures. A recent finding from a study of intervention rates in England, the 'inverse intervention law', is used to illustrate the complex ways in which a range of factors interact to produce intervention rates. In turn, this analysis raises profound moral, policy, practice and research questions about current child welfare and child protection services.
Resumo:
Cyber-physical systems tightly integrate physical processes and information and communication technologies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Using this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.
Resumo:
Mammillaria gaumeri (Britton & Ross) Orcutt (Cactaceae), an endemic plant of the Yucatan Peninsula, is included by the Mexican government in the list of species that require special protection. Its natural habitat is now restricted to fragmented areas and protection programs involve botanical gardens in growing individuals rescued from disturbed areas. Little information is available on the reproductive characteristics of this species and nothing is known of its pollinators. We investigated the visitors of M. gaumeri flowers, collecting and observing bee species in its natural habitat (i.e., coastal dune) and in a botanical garden, where coastal dune vegetation had been created. Observations were made on plants whose density was artificially increased by grouping flowering individuals. At each site, we: 1) collected insects visiting the flowers; 2) recorded number of visits; and 3) video-recorded bee movements on the flowers. As expected, the number of bee species and visitation frequency were higher at the botanical garden than at the coastal dune. After landing on a flower, bees either inspected the anthers or dived among them. These behaviors, carried out by all observed species, seemed related to the state of the anthers (full or empty of pollen) and stigma lobes (opened or closed). Specifically, visits lasted longer when anthers were full of pollen and stigma lobes were opened. The same bee species recorded on the dune were also recorded at the botanical garden, suggesting that the artificial dune at the botanical garden offered suitable conditions for the natural pollinators of this endangered cactus.
Resumo:
The article debates the issues involved in safeguarding and protecting children in maternity services and offers implications for professional practice. Midwives and other staff who work as members of the maternity team have a safeguarding role to play in the identification of babies and children who have been abused, or at risk of abuse, and in subsequent intervention and protection services. The study highlights how domestic violence increases during pregnancy and the postpartum period, and is significantly related to all types of child maltreatment up to the child's fifth year, and children under one being at the highest risk of injury, or death. Close inter-agency liaison is required with midwives who are accountable and not afraid to challeneg hiostorical working practices.