10 resultados para IT security

em University of Queensland eSpace - Australia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article advances the discussion of the contentious question of links between global inequalities of power and violent responses, focussing on globalisation and non-inclusive forms of governance. Drawing on international political economy, the article criticises the nationstate-centrism in much political discourse, suggesting that both authority and security need to be reconsidered - to account for less plausible national borders and controls. It suggests that human security (including issues of development and equality) ought to replace national security as the primary focus of public policy. It draws attention to the intractability of difference, insisting that the terrorism of 2001 has complex transnational antecedents. Realist approaches to international order have become part of a problem to be overcome through further intellectual debate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper compares social security programs in the AK model with leisure and bequests. It will show that the unfunded program with contribution-dependent benefits has smaller distortions than programs (funded or unfunded alike) with contribution-independent benefits. (C) 2002 Elsevier Science B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An increased incidence of attack has been identified as a major characteristic of the new threat posed by terrorist groups such as al Qaeda. This article considers what such a change means for Western national security systems by examining bow different parts of the system change over time. It becomes evident that Western national security systems are structured on an assumption of comparatively slow state-based threats. In contrast, terrorist franchises operate at a faster pace, are more 'lightweight' and can adapt within the operational and capability cycles of Western governments. Neither network-centric warfare nor an improved assessment of the threat, called for by some, offers a panacea in this regard. Rather, it is clear that not only do Western governments need to adjust their operational and capability cycles, but that they also need a greater diversity of responses to increase overall national security resilience and offer more tools for policy-makers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although computer technology is central to the operation of the modern welfare state, there has been little analysis of its role or of the factors shaping the way in which it is used. Using data generated by expert informants from 13 OECD countries, this paper provides an indicative comparison of the aims of computerization in national social security systems over a 15-year period from 1985 to 2000. The paper seeks to identify and explain patterns in the data and outlines and examines four hypotheses. Building on social constructivist accounts of technology, the first three hypotheses attribute variations in the aims of computerization to different welfare state regimes, forms of capitalism, and structures of public administration. The fourth hypothesis, which plays down the importance of social factors, assumes that computerization is adopted as a means of improving operational efficiency and generating expenditure savings. The findings suggest that, in all 13 countries, computerization was adopted in the expectation that it would lead to increased productivity and higher standards of performance, thus providing most support for the fourth hypothesis. However, variations between countries suggest that the sociopolitical values associated with different welfare state regimes have also had some effect in shaping the ways in which computer technology has been used in national social security systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite global trends towards military reform characterized by processes of professionalization and democratization, militaries in Southeast Asia have continued to play prominent roles in domestic politics since 11 September. This suggests that wider patterns of global military reform have not had as great an impact on the control, capacity and cooperative functions of armed forces in Southeast Asia as they may have elsewhere. In order to explore why the security sector reform agenda has had so little impact in the region, we investigate recent patterns of civil-military relations in Southeast Asia by focusing on the experiences of four of the region's militaries: Malaysia, Thailand, the Philippines and Indonesia. We argue that the security sector reform agenda is informed by a predominantly North American approach to civil-military relations based on a number of core assumptions that do not reflect Southeast Asian experiences. Hence, we ask whether the reform agenda itself could be modified to better suit the Southeast Asian context. We suggest that although the regional military sector has not reformed along a 'Western' path it is nonetheless possible to see other types of, and potential for, reform.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite reports that adopted persons are destined for poor psychological and relational adjustment, this conclusion remains controversial. Previous research on this topic has been inconclusive, and has failed to provide a complex assessment of the predictors of adjustment. For instance, whether attachment security plays a key role in later relationship outcomes remains unresolved. This paper presents the results of a longitudinal study of adults who were adopted as infants, and a comparison sample of adults who grew up with both biological parents. Two research questions were addressed: differences in attachment security between the two samples, and the predictive relations between initial attachment scales and relationship variables (e.g., risk in intimacy, loneliness) assessed at follow-up. Attachment profiles at Time 1 indicated less security in the adopted sample than the comparison sample, and these differences were maintained at follow-up. However, adoptees who had not searched for birth relatives did not differ from the comparison sample. Although sample (adopted / comparison) was an important predictor of some relationship variables, it became less influential when attachment measures were included. Discussion focused on the complex factors that influence attachment security, and the need for in-depth study of the relational experiences of adopted people.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.