77 resultados para National security - Japan


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since the September 11, 2001 terrorist attacks in New York City, many countries including Australia and Malaysia have been able to justify the use biometric devices such as fingerprint scans, retina scans and facial recognition for identification and surveillance of its citizens and others in the name of national security. In addition, biometric devices are increasingly being used worldwide by organizations to keep track of their employees and their productivity, leading to concerns of privacy and civil rights violations. Taking the critical theory perspective, this paper will analyse the data collected and report on the findings of a survey carried out in Australia and Malaysia, with respect to the responses provided and opinions expressed to the survey's open ended and other questions by individuals as to their current use, experiences, preferences, concerns about the devices and the situations in which they think biometric devices should be used, including in their workplaces. This descriptive study uses both quantitative and qualitative data to examine what Australians and Malaysians think about the use of biometric devices in everyday situations and compare them as to their similarities and differences within the context of each nation's culture and political systems. The paper will then critically examine the ethical and civil rights issues involved in the use of biometric devices in everyday life and what regulatory and legal measures should be taken to safeguard the rights of citizens while maintaining security and productivity, in order to avoid the situation of Michel Foucault's Panopticon becoming an unpleasant everyday reality, which could negatively influence social justice and create social change due to its effects on individuals in two multicultural societies. the apper will argue about the need to educate the general public as to the issues of surveillance and privacy involved in the use of biometric devices in everyday situations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis explores the shift in focus of Australian regional defence and foreign policy away from Malaysia and towards Indonesia between 1965 and 1971. It finds that this shift was caused more by the consequences of Britain's military withdrawal from Malaysia and Singapore than by Suharto's accession to power.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Governments use fear to promote political objectives. Through the exaggeration of external threats, fear as conceptualised in the writings of Hobbes, Barry Buzan, David Campbell and others, became a major factor in shaping Australia's post-war foreign and defence policies which were also intended to serve the government's domestic political agenda.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper focuses on the origin of insecurity, safety and security of the content of the evolution of the concept of traditional security policy with the new security concept.The authors suggest that the contents of security and international relations with the social and historical development of evolving, evolve the main driving force of social progress of productive forces.In different historical periods, most representative of the level of productivity of the things often become the most valuable part of security.Compared with the past, modern security has the following characteristics: the scope of security beyond the region, for the first time the world has meaning; army in modern times to become the country's "principal basis"; to the ideology of nationalism as factors in the country on behalf of security policies and practices play a special role.But national security has an important strategic value of the field is not a qualitative change.Mid-century, the world entered the post-industrial society or information age, the concept of security from the content and form are undergoing a profound transformation.Economic, technological and other factors

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Knowledge in the field of environmental health is growing rapidly. Within the context of external factors that define its boundaries, environmental health has evolved over time into a complex, multidisciplinary and ill-defined field with uncertain solutions. Many of the key determinants and solutions to environmental health lie outside the direct realm of health and are strongly dependent on environmental changes, water and sanitation, industrial development, education, employment, trade, tourism, agriculture, urbanization, energy, housing and national security. Environmental risks, vulnerability and variability manifest themselves in different ways and at different time scales. While there are shared global and transnational problems, each community, country or region faces its own unique environmental health problems, the solution of which depends on circumstances surrounding the resources, customs, institutions, values and environmental vulnerability. This work will contain critical reviews and assessments of environmental health practices and research that have worked in places and thus can guide programs and economic development in other countries or regions.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since the end of the Cold War, U.S. policymakers have faced the challenge of addressing the technological requirements of both economic competitiveness and national security. Promoting the technological objectives of competitiveness and security poses a daunting task, as these objectives can differ significantly in terms of autonomy, the private sector’s role, and the time frame involved. The difficulties inherent in meeting these competing needs for technological investment and resources are exacerbated by growing technological globalization. American Technology Policy analyzes the ongoing efforts of politicians, legislators, policymakers, and industry leaders to balance their often-conflicting technological requirements. J. D. Kenneth Boutin examines recent trends and developments in American technology policy as it strives to support high-technology firms without undermining national security. He then considers issues of autonomy, relations between the federal government and industry, and the time frame involved in formulating and implementing policy initiatives, all in the context of globalization. Though satisfying the ambitious American technological agenda is difficult, it is impossible for authorities to avoid making the effort, given the high stakes involved. Boutin’s analysis is intended to inform those who are charged with prioritizing and balancing the technological needs of national defense and economic growth. Although the post–Cold War technology policy of the United States has been characterized by efforts to achieve a balance between these two competing priorities, the dominant focus remains on national security. Boutin explains the ways in which American authorities seek to limit the extent of compromise necessary by working with local and foreign actors and by encouraging structural changes in the environment for technological development, application, and diffusion.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article examines the history of four islands used for incarceration in Australia: the ‘secondary punishment’ of convicts on Norfolk Island; the management and quarantine of indigenous people on Palm Island; the quarantine of all new migrants and visitors on Bruny Island; and the incarceration of enemy aliens on Rottnest Island. Incarceration has been used throughout Australia’s history as a method of social and political control, targeting categories of people perceived to pose a threat to the racial composition, social cohesion, or national security of the Australian community. By providing a space both separate and invisible to the community, Australia’s carceral islands served as a solution to a recurring problem for a young nation apprehensive about the composition, durability and security of its community. The human consequences of incarceration could be devastating.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A relationship of economic osmosis is noticed between an airline and the country whose flag it flies. Economic impact studies prepared by government organisations and airline managements usually point out the economic benefits of setting up a new airline or flying a new route. These benefits arise for the airline’s home base by way of greater connectivity with the world and include a number of tangibles such as growth in tourism, increase in retail revenue from transit passengers, access to cargo transport for importers and exporters, employment opportunities and a host of indirect benefits that the local populace can gain from exposure to other countries and cultures. One also notices two very important intangibles associated with an airline and the nation of origin- national pride and national security. This paper analyses the remarkable success story of mutual growth shared by Emirates, the airline and Dubai, the city, over the past twenty-five years and the opportunities that the success of this duo signifies for others in the region.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The surveillance capacities of professional sports clubs and Leagues are directly related to their modes of governance. This paper identifies how private sports clubs enact surveillance through processes of inclusion and exclusion. Using three examples to demonstrate these processes, we argue that the surveillance mechanisms associated with sports governance at times replicate, at other times contradict, and at other times influence those associated with broader law enforcement and security developments. These examples also suggest potential increases in surveillance activities that emerge in club governance often flow from external concerns regarding allegations of crime, national security breaches and corruption. These context-specific case studies (Flyvbjerg 2001) demonstrate how surveillance and identity authentication are closely tied to the complex, multi-tiered governance structures and practices in three distinct sports. We then explore how these patterns can be interpreted as either connected to or distinct from equivalent developments involving the surveillance surge (Murakami Wood 2009) and concepts of inclusion and exclusion under the criminal law. We conclude by discussing how both internal and external regulatory forces can shape interrelated facets of surveillance, governance and exclusion in elite sports.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article explores the tensions inherent in how Kyrgyzstan's nationhood and statehood have been imagined and practised via an analysis of local reactions to the findings of the Kyrgyzstan Inquiry Commission's (KIC) investigation into the 2010 Osh violence and in particular the threat narrative that developed in opposition to the investigation. In the wake of the clashes that erupted in Osh in June 2010, a recurrent theme was calls from the international community for an independent investigation. Within Kyrgyzstan, however, some politicians argued that investigations violated the republic's sovereignty. Despite local reluctance, a number of investigations did subsequently take place. Yet the reports of the respective investigations did little to quell controversy, with the KIC report being strongly criticized and declared a threat to national security. The strength of feeling demonstrated by this reaction was indicative of long-standing and unresolved tensions in Kyrgyzstan between international and local imaginings of nationhood and statehood. The article concludes by arguing that nationhood and statehood need to be reimagined to focus on re-establishing state–society relations by both local and international actors in order for Kyrgyzstan to begin repairing the already fragile sociopolitical relationships that were grievously damaged by the violence and the subsequent investigations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

 Security provisioning is an essential part in the design of any communication systems, which becomes more critical for wireless systems. The consideration and comparisons of security algorithms in various Open Systems Interconnection layers is a difficult task, because there are many performance metrics involved. The aim of this novel research article is to present research results for the design of a wireless system revolving around the practical and low-cost implementation of Suite-B algorithms in different layers. Suite-B, promulgated by the National Security Agency, is a set of cryptographic algorithms, including non-repudiation. The end results include the deployment of Suite-B algorithms at the application, transport, and network layers and the protocol flow at each layer.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

PEN Melbourne has produced two essays that examine deep concerns around recent legislative challenges to freedom of expression in Australia. In this second essay, Dr Ben Eltham interrogates and responds to the Australian government’s recently introduced ‘anti-terror legislation’ and the ‘metadata bill’.