77 resultados para counter-terrorism


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Every social revolution has elicited some form of counter-revolutionary response from the international system. The impulse to reverse revolutionary transformation has much to tell us about the dynamics of social revolution as well as the nature of international order. The purpose of this article is to investigate the relationship between counter-revolution and international order. First it establishes a basic conceptual framework of international counter-revolution and argues that counter-revolution should be understood as more than just an active opposition to revolution and also examines the motives of counter-revolutionaries. Second, using two interpretations of the international system – those of Henry Kissinger and Raymond Aron – the article draws several conclusions about the international tendency to attempt to overturn revolution and concludes that there exist international systemic pressures, of a non-neorealist kind, which provide the basis for international order. These pressures not only produce order but, at certain times, impel states to counter radical transformations in parts of the world which seem, at first glance, to have little consequence for the functioning of international order.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supervised machine learning techniques generally require that the training set on which learning is based contain sufficient examples representative of the target concept, as well as known counter-examples of the concept; however, in many application domains it is not possible to supply a set of labeled counter-examples. This paper proposes an objective function based on Bayesian likelihoods of necessity and sufficiency. This function can be used to guide search towards the discovery of a concept description given only a set of labeled positive examples of the target concept, and as a corpus of unlabeled examples. Results of experiments performed on several datasets from the VCI repository show that the technique achieves comparable accuracy to conventional supervised learning techniques, despite the fact that the latter require a set of labeled counter-examples to be supplied. The technique can be applied in many domains in which the provision of labeled counter-examples is problematic.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discusses if ASIO and the police should be able to keep people in detention for 48 hours without access to a lawyer? Is this an appropriate response to to a dangerous new post-September 11 world?Or a radical over reaction that tramples on civil rights?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to explore the relationship between anti-money laundering (“AML”) and combating of financing of terrorism (“CFT”) customer due diligence (“CDD”) measures in the financial services industry, and exclusion from financial services.
Design/methodology/approach – An introduction to the concept of financial exclusion is provided as well as an overview of international AML/CFT CDD standards. The paper highlights a softening of national CDD measures in South Africa and the UK to lessen the impact on financial exclusion.
Findings – Countries should consider the impact that CDD requirements may have on financial exclusion when they design their AML/CFT systems.
Research limitations/implications – Multi-discilinary research is required to improve the understanding of the broader interaction between AML/CFT objectives, financial exclusion and economic development, especially in countries with a large informal economy.
Practical implications – CDD requirements may unnecessarily exacerbate financial exclusion if they are not formulated with care to reflect the reality of the particular country setting.
Originality/value – The paper offers insights into the international standards resulting to the identification of clients and the experiences in the UK and South Africa regarding the implementation of these standards on financial exclusion.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and
Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry adoption and acceptance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to  coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems.

This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group is presented in support of the developed framework for SCADA industry adoption and acceptance.