12 resultados para critical security studies
em University of Queensland eSpace - Australia
Resumo:
This paper surveys critical discourse studies to the present and claims that, to avoid lapsing into comfortable orthodoxy in its mature phase, CDS needs to reassert its transformative radical teleology. The initial part of the paper reasserts the need for a strong social theory given the materialist and context-bound nature of discourse in daily activity. From this basis, the paper then characterizes the “new times” in which contemporary discourse occurs, and briefly surveys those issues typically analyzed, namely political economy, race and gender, and critical literacy. By considering people's ordinary lives, the paper then suggests that subject and agency, and calculative technologies of management deserve, and new modalities need, more research. Transdisciplinarity is encouraged, particularly with social psychology and critical management studies.
Resumo:
This article calls for a widening of the debate about humanitarian intervention to incorporate insights from constructivism, 'Welsh School' Critical Security Studies, and critical approaches to Third World International Relations. After identifying a series of problems with the contemporary debate, which is dominated by the English School, it calls for a broadening of the concept of intervention and suggests a need to rethink the meaning of humanitarianism and terms such as the 'supreme humanitarian emergency'.
Resumo:
This article argues that since 2000 successive Croatian governments have shown themselves increasingly dedicated to reforming civil-military relations. However, their efforts have been hampered by four key obstacles. First, the need to implement defence reforms in the context of an unwieldy set of civil-military relationships, political and institutional rivalries, a lack of civil and military defence expertise and a continuing legacy of politicisation. Second, the need to cut defence spending as a proportion of the overall budget whilst taking on new military roles and improving the capability of the armed forces. Third, the need to balance the demands of the NATO accession process while implementing a balanced and fundamental reform of the armed forces as a whole. Finally, the need to implement root and branch personnel reforms and downsizing in the OSRH while simultaneously recruiting and retaining quality personnel and addressing the wider social issue of unemployment.
Resumo:
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.
Resumo:
Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective.