121 resultados para ubiquitous security
Resumo:
Recent and emerging security policies and practices claim a mutual vulnerability that closely links human insecurity in failed states with the threat to powerful states from illicit flows. This article first examines this ‘emerging orthodoxy’ of transnational security issues that reinforces the securitisation of poverty and the poor. It then subjects this orthodoxy to theoretical and empirical critique. Theoretically it shows that this orthodoxy is formed as a ‘geopolitical imagination’ that associates and stabilises particular views of weak states and illicit flows in a ‘netwar imagination’ by reasserting and reconfiguring traditional assumptions of the spatiality and nature of threats. A final empirical section, focusing on drug production and nuclear smuggling, argues that those assumptions and their assemblage are a partial, incomplete and often self-referential reading of illicit flows.
Resumo:
Links between political violence and children's adjustment problems are well-documented. However, the mechanisms by which political tension and sectarian violence relate to children's well-being and development are little understood. This study longitudinally examined children's emotional security about community violence as a possible regulatory process in relations between community discord and children's adjustment problems. Families were selected from 18 working class neighborhoods in Belfast, Northern Ireland. Participants (695 mothers and children, M=12.17, SD=1.82) were interviewed in their homes over three consecutive years. Findings supported the notion that politically-motivated community violence has distinctive effects on children's externalizing and internalizing problems through the mechanism of increasing children's emotional insecurity about community. Implications are considered for understanding relations between political violence and child adjustment from a social ecological perspective.
Resumo:
Evidence of high-velocity features (HVFs) such as those seen in the near-maximum spectra of some Type Ia supernovae (SNe Ia; e. g., SN 2000cx) has been searched for in the available SN Ia spectra observed earlier than 1 week before B maximum. Recent observational efforts have doubled the number of SNe Ia with very early spectra. Remarkably, all SNe Ia with early data ( seven in our Research Training Network sample and 10 from other programs) show signs of such features, to a greater or lesser degree, in Ca II IR and some also in the Si II lambda 6355 line. HVFs may be interpreted as abundance or density enhancements. Abundance enhancements would imply an outer region dominated by Si and Ca. Density enhancements may result from the sweeping up of circumstellar material (CSM) by the highest velocity SN ejecta. In this scenario, the high incidence of HVFs suggests that a thick disk and/or a high-density companion wind surrounds the exploding white dwarf, as may be the case in single degenerate systems. Large-scale angular fluctuations in the radial density and abundance distribution may also be responsible: this could originate in the explosion and would suggest a deflagration as the more likely explosion mechanism. CSM interaction and surface fluctuations may coexist, possibly leaving different signatures on the spectrum. In some SNe, the HVFs are narrowly confined in velocity, suggesting the ejection of blobs of burned material.
Resumo:
This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.
Resumo:
A dynamic global security-aware synthesis flow using the SystemC language is presented. SystemC security models are first specified at the system or behavioural level using a library of SystemC behavioural descriptions which provide for the reuse and extension of security modules. At the core of the system is incorporated a global security-aware scheduling algorithm which allows for scheduling to a mixture of components of varying security level. The output from the scheduler is translated into annotated nets which are subsequently passed to allocation, optimisation and mapping tools for mapping into circuits. The synthesised circuits incorporate asynchronous secure power-balanced and fault-protected components. Results show that the approach offers robust implementations and efficient security/area trade-offs leading to significant improvements in turnover.