48 resultados para enterprise information security policy
em CentAUR: Central Archive University of Reading - UK
Resumo:
Societal concern is growing about the consequences of climate change for food systems and, in a number of regions, for food security. There is also concern that meeting the rising demand for food is leading to environmental degradation thereby exacerbating factors in part responsible for climate change, and further undermining the food systems upon which food security is based. A major emphasis of climate change/food security research over recent years has addressed the agronomic aspects of climate change, and particularly crop yield. This has provided an excellent foundation for assessments of how climate change may affect crop productivity, but the connectivity between these results and the broader issues of food security at large are relatively poorly explored; too often discussions of food security policy appear to be based on a relatively narrow agronomic perspective. To overcome the limitation of current agronomic research outputs there are several scientific challenges where further agronomic effort is necessary, and where agronomic research results can effectively contribute to the broader issues underlying food security. First is the need to better understand how climate change will affect cropping systems including both direct effects on the crops themselves and indirect effects as a result of changed pest and weed dynamics and altered soil and water conditions. Second is the need to assess technical and policy options for either reducing the deleterious impacts or enhancing the benefits of climate change on cropping systems while minimising further environmental degradation. Third is the need to understand how best to address the information needs of policy makers and report and communicate agronomic research results in a manner that will assist the development of food systems adapted to climate change. There are, however, two important considerations regarding these agronomic research contributions to the food security/climate change debate. The first concerns scale. Agronomic research has traditionally been conducted at plot scale over a growing season or perhaps a few years, but many of the issues related to food security operate at larger spatial and temporal scales. Over the last decade, agronomists have begun to establish trials at landscape scale, but there are a number of methodological challenges to be overcome at such scales. The second concerns the position of crop production (which is a primary focus of agronomic research) in the broader context of food security. Production is clearly important, but food distribution and exchange also determine food availability while access to food and food utilisation are other important components of food security. Therefore, while agronomic research alone cannot address all food security/climate change issues (and hence the balance of investment in research and development for crop production vis à vis other aspects of food security needs to be assessed), it will nevertheless continue to have an important role to play: it both improves understanding of the impacts of climate change on crop production and helps to develop adaptation options; and also – and crucially – it improves understanding of the consequences of different adaptation options on further climate forcing. This role can further be strengthened if agronomists work alongside other scientists to develop adaptation options that are not only effective in terms of crop production, but are also environmentally and economically robust, at landscape and regional scales. Furthermore, such integrated approaches to adaptation research are much more likely to address the information need of policy makers. The potential for stronger linkages between the results of agronomic research in the context of climate change and the policy environment will thus be enhanced.
Resumo:
The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of innovative features in terms of real-time programmable embedded hardware (FPGA) deployment as well as in the integrated management station. These have been devised so as to deliver enhanced detection of attacks and contextualised alerts against threats that can arise from both the network layer and the application layer protocols. The resulting architecture represents an efficient and effective framework for the future deployment of network security systems.
Resumo:
The purpose of this study is to analyse current data continuity mechanisms employed by the target group of businesses and to identify any inadequacies in the mechanisms as a whole. The questionnaire responses indicate that 47% of respondents do perceive backup methodologies as important, with a total of 70% of respondents having some backup methodology already in place. Businesses in Moulton Park perceive the loss of data to have a significant effect upon their business’ ability to function. Only 14% of respondents indicated that loss of data on computer systems would not affect their business at all, with 54% of respondents indicating that there would be either a “major effect” (or greater) on their ability to operate. Respondents that have experienced data loss were more likely to have backup methodologies in place (53%) than respondents that had not experienced data loss (18%). Although the number of respondents clearly affected the quality and conclusiveness of the results returned, the level of backup methodologies in place appears to be proportional to the company size. Further investigation is recommended into the subject in order to validate the information gleaned from the small number of respondents.
Resumo:
Dominant paradigms of causal explanation for why and how Western liberal-democracies go to war in the post-Cold War era remain versions of the 'liberal peace' or 'democratic peace' thesis. Yet such explanations have been shown to rest upon deeply problematic epistemological and methodological assumptions. Of equal importance, however, is the failure of these dominant paradigms to account for the 'neoliberal revolution' that has gripped Western liberal-democracies since the 1970s. The transition from liberalism to neoliberalism remains neglected in analyses of the contemporary Western security constellation. Arguing that neoliberalism can be understood simultaneously through the Marxian concept of ideology and the Foucauldian concept of governmentality – that is, as a complementary set of 'ways of seeing' and 'ways of being' – the thesis goes on to analyse British security in policy and practice, considering it as an instantiation of a wider neoliberal way of war. In so doing, the thesis draws upon, but also challenges and develops, established critical discourse analytic methods, incorporating within its purview not only the textual data that is usually considered by discourse analysts, but also material practices of security. This analysis finds that contemporary British security policy is predicated on a neoliberal social ontology, morphology and morality – an ideology or 'way of seeing' – focused on the notion of a globalised 'network-market', and is aimed at rendering circulations through this network-market amenable to neoliberal techniques of government. It is further argued that security practices shaped by this ideology imperfectly and unevenly achieve the realisation of neoliberal 'ways of being' – especially modes of governing self and other or the 'conduct of conduct' – and the re-articulation of subjectivities in line with neoliberal principles of individualism, risk, responsibility and flexibility. The policy and practice of contemporary British 'security' is thus recontextualised as a component of a broader 'neoliberal way of war'.
Resumo:
This article analyses the counter-terrorist operations carried out by Captain (later Major General) Orde Wingate in Palestine in 1938, and considers whether these might inform current operations. Wingate's Special Night Squads were formed from British soldiers and Jewish police specifically to counter terrorist and sabotage attacks. Their approach escalated from interdicting terrorist gangs to pre-emptive attacks on suspected terrorist sanctuaries to reprisal attacks after terrorist atrocities. They continued the British practice of using irregular units in counter-insurgency, which was sustained into the postwar era and contributed to the evolution of British Special Forces. Wingate's methods proved effective in pacifying terrorist-infested areas and could be applied again, but only in the face of 'friction' arising from changes in cultural attitudes since the 1930s, and from the political-strategic context of post-2001 counter-insurgent and counter-terrorist operations. In some cases, however, public opinion might not preclude the use of some of Wingate's techniques.
Resumo:
The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.