8 resultados para state security
em CentAUR: Central Archive University of Reading - UK
Resumo:
Recent developments in the fields of veterinary epidemiology and economics are critically reviewed and assessed. The impacts of recent technological developments in diagnosis, genetic characterisation, data processing and statistical analysis are evaluated. It is concluded that the acquisition and availability of data remains the principal constraint to the application of available techniques in veterinary epidemiology and economics, especially at population level. As more commercial producers use computerised management systems, the availability of data for analysis within herds is improving. However, consistency of recording and diagnosis remains problematic. Recent trends to the development of national livestock databases intended to provide reassurance to consumers of the safety and traceability of livestock products are potentially valuable sources of data that could lead to much more effective application of veterinary epidemiology and economics. These opportunities will be greatly enhanced if data from different sources, such as movement recording, official animal health programmes, quality assurance schemes, production recording and breed societies can be integrated. However, in order to realise such integrated databases, it will be necessary to provide absolute control of user access to guarantee data security and confidentiality. The potential applications of integrated livestock databases in analysis, modelling, decision-support, and providing management information for veterinary services and livestock producers are discussed. (c) 2004 Elsevier B.V. All rights reserved.
Resumo:
Recent studies of the current state of rural education and training (RET) systems in sub-Saharan Africa have assessed their ability to provide for the learning needs essential for more knowledgeable and productive small-scale rural households. These are most necessary if the endemic causes of rural poverty (poor nutrition, lack of sustainable livelihoods, etc.) are to be overcome. A brief historical background and analysis of the major current constraints to improvement in the sector are discussed. Paramount among those factors leading to its present 'malaise' is the lack of a whole-systems perspective and the absence of any coherent policy framework in most countries. There is evidence of some recent innovations, both in the public sector and through the work of non-governmental organisations (NGOs), civil society organisations (CSOs) and other private bodies. These provide hope of a new sense of direction that could lead towards meaningful 'revitalisation' of the sector. A suggested framework offers 10 key steps which, it is argued, could largely be achieved with modest internal resources and very little external support, provided that the necessary leadership and managerial capacities are in place. (C) 2006 Elsevier Ltd. All rights reserved.
The British state and the Irish rebellion of 1916: an intelligence failure or an failure of response
Resumo:
The teleological narrative that has dominated the handling of intelligence by the British state in the events that led up to the 1916 Irish Rebellion in Dublin has been characterised as a cocktail of incompetence and mendacity. Using new and existing archive material this article argues that both the cabinet in London and key members of the Irish Executive in Dublin were supplied with accurate and timely intelligence by the Admiralty's signals intelligence unit, the Royal Irish Constabulary and the Dublin Metropolitan Police with respect to this event. Far from being a failure of intelligence here is evidence to show that there occurred a failure of response on behalf of key decision-makers. The warnings that were given by intelligence organisations were filtered through the existing policy preferences and assumptions. As a result of these factors accurate evaluations and sound judgement were not exercised by key officials, such as Sir Matthew Nathan, in Dublin Castle.
Resumo:
The chapter examines the compex roles of corruption in state-buioding environments. The first section briefly outlines how statebuilding is conceptualized in this discussion. The second section examines the concept of corruption,and argues that the organization, rather than the scale of corruption, offers a better lens through which its impact can be analyzed. The third section examines the complex relationship between corruption and statebuilding through the lenses of two key aspects of statebuilding – elite settlements, and the provision of public services – and briefly discusses both the complex relationship between corruption and security, and the impact of aid on corruption in statebuilding environments. The fourth section concludes the chapter with a reflection on the implications of the analysis for understanding contemporary statebuilding efforts and policy.
Resumo:
The Nyasaland Emergency in 1959 proved a decisive turning point in the history of the Federation of Rhodesia and Nyasaland, which from 1953 to 1963 brought together the territories of Northern Rhodesia (Zambia), Southern Rhodesia (Zambia) and Nyasaland (Malawi) under a settler-dominated federal government. The British and Nyasaland governments defended the emergency by claiming to have gathered intelligence which showed that the Nyasaland African Congress was preparing a campaign of sabotage and murder. The Devlin Commission, appointed to investigate the emergency, dismissed the evidence of a ‘murder plot’, criticised the Nyasaland government's handling of the Emergency and, notoriously, described Nyasaland as a ‘police state’. This article has two principal aims. First, using the recently declassified papers of the Intelligence and Security Department (ISD) of the Colonial Office, it seeks to provide the first detailed account of what the British government knew of the intelligence relating to the ‘murder plot’ and how they assessed it, prior to the outbreak of the emergency. It demonstrates that officials in the ISD and members of the Security Service adopted a far more cautious attitude towards the intelligence than did Conservative ministers, and had greater qualms about allowing it into the public domain to justify government policy. Second, the article examines the implications of Devlin's use of the phrase ‘police state’ for Nyasaland and for the late colonial state in general. It contrasts Devlin's use of the term with that of security experts in the ISD, who routinely applied it to policing systems that diverged from their own preferred model. Hence, whereas Devlin compared policing in Nyasaland unfavourably with that in Southern Rhodesia, implying, ironically, that Nyasaland was ‘under-policed’ (because there were fewer police per head of population in Nyasaland than in Southern Rhodesia), the ISD regarded the intensive system of policing operated by the British South Africa Police in Southern Rhodesia as characteristic of a ‘police state’. The article suggests that the frequent use of the term ‘police state’ was indicative of broader anxieties about what Britain's legacy would be for the post-independence African state.
Resumo:
Body area networks (BANs) are emerging as enabling technology for many human-centered application domains such as health-care, sport, fitness, wellness, ergonomics, emergency, safety, security, and sociality. A BAN, which basically consists of wireless wearable sensor nodes usually coordinated by a static or mobile device, is mainly exploited to monitor single assisted livings. Data generated by a BAN can be processed in real-time by the BAN coordinator and/or transmitted to a server-side for online/offline processing and long-term storing. A network of BANs worn by a community of people produces large amount of contextual data that require a scalable and efficient approach for elaboration and storage. Cloud computing can provide a flexible storage and processing infrastructure to perform both online and offline analysis of body sensor data streams. In this paper, we motivate the introduction of Cloud-assisted BANs along with the main challenges that need to be addressed for their development and management. The current state-of-the-art is overviewed and framed according to the main requirements for effective Cloud-assisted BAN architectures. Finally, relevant open research issues in terms of efficiency, scalability, security, interoperability, prototyping, dynamic deployment and management, are discussed.
Resumo:
In the early 1970s, Panama’s negotiations with the United States over the status of the Panama Canal ground to a standstill. General Omar Torrijos had rejected treaties left unratified by previous governments only to receive a less generous offer from the Nixon administration. Realizing that the talks were being ignored in Washington, the Panamanian government worked to internationalize the previously bilateral issue, creating and exploiting a high-profile forum: Extraordinary meetings of the UN Security Council in March 1973 held in Panama City. In those meetings, Panama isolated the United States in order to raise the issue’s profile and amplify the costs of leaving the matter unsettled. Using underutilized Panamanian sources, this article examines that meeting, the succeeding progress, and the effect of this early stage on the final negotiations several years later. The case also illustrates how, during the unsettled international environment of the 1970s, a small state utilized international organizations to obtain attention and support for its most important cause.