45 resultados para security threat
em University of Queensland eSpace - Australia
Resumo:
This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.
Resumo:
Australian foreign and security policy confronts a series of difficult challenges in coping with the emergence of an Islamic extremist threat in Southeast Asia. Australian policy makers are being drawn into unfamiliar linkages with moderate Islam, and into closer cooperation with Indonesia, the most populous Islamic nation in the world, in an attempt to offset Islamic extremists. Further, they must achieve those objectives at a time when important interests are at stake beyond Southeast Asia, when bipartisan agreement about the direction of foreign policy is waning, and when divisions over the appropriate trajectory of Australian security policy are intense. A delicacy almost unprecedented in Australian foreign policy will be required.
Resumo:
An increased incidence of attack has been identified as a major characteristic of the new threat posed by terrorist groups such as al Qaeda. This article considers what such a change means for Western national security systems by examining bow different parts of the system change over time. It becomes evident that Western national security systems are structured on an assumption of comparatively slow state-based threats. In contrast, terrorist franchises operate at a faster pace, are more 'lightweight' and can adapt within the operational and capability cycles of Western governments. Neither network-centric warfare nor an improved assessment of the threat, called for by some, offers a panacea in this regard. Rather, it is clear that not only do Western governments need to adjust their operational and capability cycles, but that they also need a greater diversity of responses to increase overall national security resilience and offer more tools for policy-makers.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case
Resumo:
Australia is an increasingly important ally for the United States. It is willing to be part of challenging global missions, and its strong economy and growing self-confi dence suggest a more prominent role in both global and regional affairs. Moreover, its government has worked hard to strengthen the link between Canberra and Washington. Political and strategic affi nities between the two countries have been refl ected in--and complemented by--practiced military interoperability, as the two allies have sustained a pattern of security cooperation in relation to East Timor, Afghanistan and Iraq in the last 4 years. This growing collaboration between the two countries suggests that a reinvention of the traditional bilateral security relationship is taking place. At the core of this process lies an agreement about the need for engaging in more proactive strategic behavior in the changing global security environment, and a mutual acceptance of looming military and technological interdependence. But this new alliance relationship is already testing the boundaries of bipartisan support for security policy within Australia. Issues of strategic doctrine, defense planning, and procurement are becoming topics of fi erce policy debate. Such discussion is likely to be sharpened in the years ahead as Australia’s security relationship with the United States settles into a new framework.
Resumo:
Considerable research has indicated that children and their parents often demonstrate marked discrepancies in their reporting of anxiety-related phenomena. In such cases, the question arises as to whether children are capable of accurately reporting on their anxiety. In the present study, 50 children (aged 5 to 14 years) were asked to approach a large, German Shepherd dog. Prior to the task, both the mother and child independently predicted the closest point likely to be reached by the child and the degree of anxiety likely to be experienced. These predictions were then compared with the actual phenomena displayed by the child during the task. On the behavioural measure (closest step reached), both the child and mother demonstrated equivalent predictive accuracy. On the subjective measure (fear ratings) children were considerably more accurate than their mothers. The data were not influenced by gender, age, or clinical status. The results indicate the ability of children to accurately predict their anxious responses, and support the value of incorporating children's self-reports in the assessment of emotional disorders.
Resumo:
We used the startle eyeblink modification paradigm to investigate whether clinically anxious children, like high trait-anxious adults, display a bias in favour of threat words compared to neutral words. The present study included 16 clinically anxious children whose diagnostic status was determined using the parent version of a semistructured diagnostic interview as part of a larger childhood anxiety study. The children were presented with threat and neutral words fur 6 s each. A startle-eliciting auditory stimulus - a 100 dBA burst of white noise of 50 ms duration - was presented during the words at lead intervals of 60, 120, 240, or 3500 ms and during intertrial intervals. The overall pattern of startle eyeblink modification indicated inhibition at the 120 and 240 ms lead intervals and facilitation at the 3500 ms lead interval. startle-latency shortening during threat words at the :60 ms lead interval was larger than at other intervals, whereas there was no difference during neutral words. This result reflects an anxiety-related bias in favour of threat words occurring at a very early - and possibly preattentive stage - of information processing.
Resumo:
The present study (N532) investigated attentional modulation of the startle blink reflex at long lead intervals under conditions of differing emotional valence. Participants performed a visual discrimination and counting task while coloured lights indicated whether it was possible for the participant to receive an electrotactile shock (threat of shock) or if no shock would be presented (safe). Latency and magnitude of startle responses to probes during inter-stimulus intervals were facilitated during threat periods relative to safe periods. Startle latency and magnitude modulation were enhanced during attended discrimination and counting task stimuli relative to startle during ignored stimuli. This attention effect did not vary under threat or safe conditions, suggesting that attentional startle modulation is not affected by the emotional valence of the context.
Resumo:
Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.
Resumo:
Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.