23 resultados para Armed and Police forces

em CentAUR: Central Archive University of Reading - UK


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we report on a major empirical study of centripetal and centrifugal forces in the City of London financial services agglomeration. The study sheds light on (1) the manner and magnitude of firm interaction in the agglomeration; (2) the characteristics of the agglomeration that aid the competitiveness of incumbent firms; and (3) the problems associated with agglomeration. In addressing these issues, we use the data to (1) test emerging theory that explains the high productivity and innovation of agglomerations in terms of their ability to generate and diffuse knowledge; and (2) evaluate the ‘end of geography’ thesis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Military Intelligence (Research) Department of the British War Office was tasked in 1940 with encouraging and supporting armed resistance in occupied Europe and the Axis-controlled Middle East. The major contention of this paper is that, in doing so, MI(R) performed a key role in British strategy in 1940-42 and in the development of what are now known as covert operations. MI(R) developed an organic, but coherent doctrine for such activity which was influential upon the Special Operations Executive (SOE) and its own sub-branch, G(R), which applied this doctrine in practice in East Africa and the Middle East in 1940-41. It was also here that a number of key figures in the development of covert operations and special forces first cut their teeth, the most notable being Major Generals Colin Gubbins and Orde Wingate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book is highly topical considering the recent resurgence of violence by the PKK, the incursions into Northern Iraq by the Turkish army and security forces and Turkey’s EU accession negotiations. Turkey has become an increasingly important player in Middle Eastern geopolitics. More than two decades of serious conflict in Turkey are proving to be a barrier to improved relations between Turkey and the EU. This book is the first study to address fully the legal and political dimensions of the conflict, and their impact on mechanisms for conflict resolution in the region, offering a scholarly exploration of a debate that is often politically and emotionally highly charged. Kerim Yildiz and Susan Breau look at the practical application of the law of armed conflicts to the ongoing situation in Turkey and Northern Iraq. The application of the law in this region also means addressing larger questions in international law, global politics and conflict resolution. Examples include belligerency in international law, whether the ‘war on terror’ has resulted in changes to the law of armed conflict and terrorism and conflict resolution. The Kurdish Conflict explores the practical possibilities of conflict resolution in the region, examining the political dynamics of the region, and suggesting where lessons can be drawn from other peace processes, such as in Northern Ireland. This book will be of great value to policy-makers, regional experts, and others interested in international humanitarian law and conflict resolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in three consulting studies carried out by Capgemini involving four UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper takes as its starting point recent work on caring for distant others which is one expression of renewed interest in moral geographies. It examines relationships in aid chains connecting donors/carers in the First World or North and recipients/cared for in the Third World or South. Assuming predominance of relationships between strangers and of universalism as a basis for moral motivation I draw upon Gift Theory in order to characterize two basic forms of gift relationship. The first is purely altruistic, the other fully reciprocal and obligatory within the framework of institutions, values and social forces within specific relationships of politics and power. This conception problematizes donor-recipient relationships in the context of two modernist models of aid chains-the Resource Transfer and the Beyond Aid Paradigms. In the first, donor domination means low levels of reciprocity despite rhetoric about partnership and participation. The second identifies potential for greater reciprocity on the basis of combination between social movements and non-governmental organizations at both national and trans-national levels, although at the risk of marginalizing competencies of states. Finally, I evaluate post-structural critiques which also problematize aid chain relationships. They do so both in terms of bases-such as universals and difference-upon which it might be constructed and the means-such as forms of positionality and mutuality-by which it might be achieved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Major General Orde Wingate was a highly controversial figure in his time and remains so among historians. However, his eccentric and colourful personality has drawn attention away from the nature of his military ideas, the most important of which was his concept of long-range penetration, which originated from his observations of his operations in Italian-occupied Ethiopia in 1941, and evolved into the model he put into practice in the Chindit operations in Burma in 1943-44. A review of Wingate's own official writings on this subject reveals that long-range penetration combined local guerrilla irregulars, purpose-trained regular troops and airpower into large-scale offensive operations deep in the enemy rear, with the intention of disrupting his planning process and creating situations regular forces could exploit. This evolved organically from Major General Colin Gubbins' doctrine for guerrilla resistance in enemy occupied areas, and bears some resemblance to the operational model applied by US and Allied forces, post September 2001.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The problem of the appropriate distribution of forces among the fingers of a four-fingered robot hand is addressed. The finger-object interactions are modelled as point frictional contacts, hence the system is indeterminate and an optimal solution is required for controlling forces acting on an object. A fast and efficient method for computing the grasping and manipulation forces is presented, where computation has been based on using the true model of the nonlinear frictional cone of contact. Results are compared with previously employed methods of linearizing the cone constraints and minimizing the internal forces.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Classical counterinsurgency theory – written before the 19th century – has generally strongly opposed atrocities, as have theoreticians writing on how to conduct insurgencies. For a variety of reasons – ranging from pragmatic to religious or humanitarian – theoreticians of both groups have particularly argued for the lenient treatment of civilians associated with the enemy camp, although there is a marked pattern of exceptions, for example, where heretics or populations of cities refusing to surrender to besieging armies are concerned. And yet atrocities – defined here as acts of violence against the unarmed (non-combatants, or wounded or imprisoned enemy soldiers), or needlessly painful and/or humiliating treatment of enemy combatants, beyond any action needed to incapacitate or disarm them – occur frequently in small wars. Examples abound where these exhortations have been ignored, both by forces engaged in an insurgency and by forces trying to put down a rebellion. Why have so many atrocities been committed in war if so many arguments have been put forward against them? This is the basic puzzle for which the individual contributions to this special issue are seeking to find tentative answers, drawing on case studies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an overview of the European Union involvement in agricultural restructuring. By way of introduction it looks at the processes of farm replication operating in Europe and the forces behind them. It then considers the wider application of EU measures in each Member State and how they interrelate with the national property laws and social customs. In conclusion the paper appraises the restructuring policies by examining the balance between legitimising the concentration of property rights amongst a minority and the fragmentation of estates between the majority.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Private sector commercial property represents some #400 bn, or 34% of total UK business assets and is a vital fabric for housing commercial enterprise. Yet social and economic forces for change, linked with new technology, are making owners and occupiers question the very nature and purpose of property and real estate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Large, well-documented wildfires have recently generated worldwide attention, and raised concerns about the impacts of humans and climate change on wildfire regimes. However, comparatively little is known about the patterns and driving forces of global fire activity before the twentieth century. Here we compile sedimentary charcoal records spanning six continents to document trends in both natural and anthropogenic biomass burning for the past two millennia. We find that global biomass burning declined from AD 1 to 1750, before rising sharply between 1750 and 1870. Global burning then declined abruptly after 1870. The early decline in biomass burning occurred in concert with a global cooling trend and despite a rise in the human population. We suggest the subsequent rise was linked to increasing human influences, such as population growth and land-use changes. Our compilation suggests that the final decline occurred despite increasing air temperatures and population. We attribute this reduction in the amount of biomass burned over the past 150 years to the global expansion of intensive grazing, agriculture and fire management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in two consulting studies carried out by Capgemini involving three UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘White Youth’ recovers and explains the relationship between far-right organisations and British youth culture in the period between 1977 and 1987. In particular, it concentrates on the cultural spaces opened up by punk and the attempts made by the National Front and British Movement to claim them as conduits for racist and/or ultra-nationalist politics. The article is built on an empirical basis, using archival material and a historical methodology chosen to develop a history ‘from below’ that takes due consideration of the socio-economic and political forces that inform its wider context. Its focus is designed to map shifting cultural and political influences across the far right, assessing the extent to which extremist organisations proved able to adopt or utilise youth cultural practice as a means of recruitment and communication. Today the British far right is in political and organisational disarray. Nonetheless, residues tied to the cultural initiatives devised in the 1970s–80s remain, be they stylistic, nostalgic or points of connection forged to connect a transnational music scene.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.