80 resultados para Network Architectures and Security
Resumo:
Little research so far has been devoted to understanding the diffusion of grassroots innovation for sustainability across space. This paper explores and compares the spatial diffusion of two networks of grassroots innovations, the Transition Towns Network (TTN) and Gruppi di Acquisto Solidale (Solidarity Purchasing Groups – GAS), in Great Britain and Italy. Spatio-temporal diffusion data were mined from available datasets, and patterns of diffusion were uncovered through an exploratory data analysis. The analysis shows that GAS and TTN diffusion in Italy and Great Britain is spatially structured, and that the spatial structure has changed over time. TTN has diffused differently in Great Britain and Italy, while GAS and TTN have diffused similarly in central Italy. The uneven diffusion of these grassroots networks on the one hand challenges current narratives on the momentum of grassroots innovations, but on the other highlights important issues in the geography of grassroots innovations for sustainability, such as cross-movement transfers and collaborations, institutional thickness, and interplay of different proximities in grassroots innovation diffusion.
Resumo:
This paper considers methods for regulating the trafficking of rhino horn and ivory, seen through the lens of compliance theories. It stresses the importance of the distinction between normative and instrumental motivations. It argues for a balanced set of strategies that include normative levers designed to change the behaviour of poachers, traffickers and consumers of these products. In particular it considers the options needed to achieve demand reduction in consumer countries, and those needed to provide incentives to local communities in producer countries to disengage from poaching.
Resumo:
Civil wars are the most common type of large scale violent conflict. They are long, brutal and continue to harm societies long after the shooting stops. Post-conflict countries face extraordinary challenges with respect to development and security. In this paper we examine how countries can recover economically from these devastating conflicts and how international interventions can help to build lasting peace. We revisit the aid and growth debate and confirm that aid does not increase growth in general. However, we find that countries experience increased growth after the end of the war and that aid helps to make the most of this peace dividend. However, aid is only growth enhancing when the violence has stopped, in violent post-war societies aid has no growth enhancing effect. We also find that good governance is robustly correlated with growth, however we cannot confirm that aid increases growth conditional on good policies. We examine various aspects of aid and governance by disaggregating the aid and governance variables. Our analysis does not provide a clear picture of which types of aid and policy should be prioritized. We find little evidence for a growth enhancing effect of UN missions and suggest that case studies may provide better insight into the relationship between security guarantees and economic stabilization.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.