77 resultados para National security - Japan


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This review will discuss Hun Joon Kim’s important work on political dissent in the Republic of Korea, The Massacres at Mt. Halla: sixty years of truth-seeking in South Korea (Massacres at Mt. Halla). This book tells the story of the six-decade-long grassroots campaign to establish a truth commission into the events around Jeju 4.3: a series of counterinsurgency actions against armed uprisings that resulted in the large-scale massacre of civilians as well as other atrocities. Political activism looms large in South Korea’s modern political history, making a major contribution to the evolution of democracy in that country. For decades, the main game, and the focus of most academic scholarship, was the establishment of full participatory democracy in the country. Yet, behind the scenes and on the peripheries, many lower profile battles have been fought and the fate of these struggles is in some ways the real test of democracy in South Korea (Republic of Korea or ROK). Drawing together a broad range of primary documentary and interview material, Massacres at Mt. Halla makes a number of important contributions to audiences in Korean Studies, International Relations, and transitional justice. Kim brings to English speakers an unprecedented insight into the uprising, counterinsurgency operations, and activist efforts to bring this chapter of South Korean history to light. Careful archival research is supplemented with detailed personal interview data, the majority of which is in the Korean language and thus previously inaccessible to a wider audience. The value here lies with a detailed narrative that traces grassroots activism from the days of authoritarian government through the varied challenges of a newly democratic nation. In its telling, this story illuminates the ways in which local activism can be derailed or suppressed in a tight security environment. In this case, the backdrop was a political environment strictly managed by the state on the grounds of a fervent anti-communist policy. Anti-communism was in fact the only state-sanctioned ideology, one which had the backing of the ROK’s powerful US military ally. As Kim’s research demonstrates in a clear way, any activism that could be perceived to deviate from this ideology was harshly dealt with. The dawn of progressive government in South Korea in 1997 brought an end to explicit ‘red-baiting’,1 as it was known, but did not overturn altogether the rigid anti-communist structures that had accompanied the development of the modern South Korean state. In the following discussion, I first provide a brief introduction to Kim’s book before focusing my attention in on what Massacres at Mt. Halla tells us about this interaction between national security discourse and civil society activism.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Huawei is a giant Chinese telecommunications company which has become the focus of contract exclusion and finger pointing by certain western governments. The argument used by the US and Australia has been that of “national security”. This paper explores the causes and reasons for these actions and to ascertain what key strategic approaches and positioning lie behind the high level political tension. The controversy which this exclusion has provided and the causes behind it are the focal point of this paper. Whether it be due to Cold War legacies or business competition, the exclusions do not sit well in this globalised economy.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The subject of my lecture is Australian-Japanese relations since the end of the Second World War, but I’m keen to explore these relations in the context of ideas, efforts and practical results in relation to collaborative and other efforts towards regionalism in the Asia Pacific. My general argument is that, on the one hand, Australian-Japanese relations have developed with a strength that would have been hard to imagine in 1945, and with an important focus on regional growth and security. The incremental steps taken may have been small and at a steady pace but, given the legacy of deep scars resulting from the Second World War and given the limitations on the defence aspects of Japan’s postwar involvement in regional affairs (ie the self defence requirement of the Constitution and the practice of spending not more than one per cent of Gross National Product on defence), these have been very successfully negotiated steps. On the other hand, there are some opportunities for greater joint leadership in the region which may or may not be realized. The incremental steps took place in difficult and changing circumstances; and what I would like to do now is remind us of how many unknowns attached to what might happen in Australian- Japan relationships after the Second World War, partly because there were so many unknowns about how the post-war international order would settle, and partly because Australian-Japanese relations started from such a desperately low point. I will try to walk through some of the key features of different periods, as I see the periodisation logically falling out after the war, and draw some thoughts together in relation to more recent initiatives on regional and bilateral co-operation. My training is as a historian, and that shapes the way this lecture works, and for most of my career I have been an Australian historian of international relations, looking particularly at Australia’s changing role in world affairs, and that is also likely to show in what follows-possibly at the expense of greater detail from Japanese perspectives. But I hope you will understand that, and also the limitations involved in trying to paint with a broad brush on a huge historical canvas.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Border security has become one of the key means by which the sovereignty and security of powerful nation-states is projected. This paper offers a set of observations of the Australian Commonwealth’s descriptions and instructions for its embrace of border security. Border security is legible here as a geopolitics that transforms the rights and responsibilities of maritime jurisdictions into a space of security that projects national sovereignty through the interdiction of boat arrivals. Its intensification as Operation Sovereign Borders is read as a further variation within national sovereignty, one that elevates the decisionist prerogative into total deterrence. Operation Sovereign Borders pushes the limits of sovereignty’s existence in the state toward a total domination of space, perception and human life in Australia’s maritime jurisdictions, in the name of the nation. This necessitates the development, defence and reinforcement of a regionally engaged materiality that is embodied, extended, enacted, and distributed. The intended effect of this coordinated effort is to secure the nation’s sovereignty as a unity, but the broader effect has been to devalue offshore life to secure onshore interests, in a way that now necessitates indefinite offshore detention.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The concept of the 'national interest' is an ever-present feature of contemporary diplomatic discourse, and has been widely analysed by historians and political scientists. However, there has not been a systematic investigation of the term from the range of theoretical perspectives which comprise the discipline of International Relations. This book fills this gap by explaining how the term is variously understood by realist, Marxist, anarchist, liberal rationalist (English School) and constructivist theories of International Relations. It is argued that far from having a clear and unambiguous meaning, 'the national interest' is a problematic term which is largely devoid of substantive content. While realists traditionally, and constructivists more recently, claim that 'the national interest' is a key explanatory tool in the analysis and understanding of contemporary foreign policy.
Scott Burchill argues that beyond the narrow aspect of security policy, the national interest has little residual value as an insight into the motivations of state policy in the external realm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As a continually growing financial service of electronic commerce, Internet banking requires the development and implementation of a sound security procedure. This involves designing effective methods via which users can
be authenticated in a remote environment. Specifically for Internet banking there is areal need for away uniquely to identify and authenticate users without the possibility of their authenticity being cloned. Some technologies in use have been presented for meeting the security requirements for national, regional and global Internet banking assurance. However, there has been little research conducted particularly on the creation of secure
and trusted pathways. Concentrates on presenting a security framework for Internet banking based on discovering and defining these pathways in terms of adequate authentication mechanisms. Proposes a framework concerning how to identify security requirements for Internet banking such that the
transactions being conducted are secured within their respective environments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

All Australian governments are committed to the establishment of a  comprehensive, adequate and representative system of conservation  reserves. Many of the most threatened species and communities throughout Australia occur mainly or wholly on private land. A range of mechanisms has been developed to achieve conservation on private land. This article  assesses the legal security, permanence and management intent of such mechanisms in Victoria, in relation to protected area criteria. The  implications of this analysis for the Australian National Reserve System and landowners with these mechanisms on their properties are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Governments around the world are taking advantage of the numerous benefits offered by the World Wide Web in order to provide client services to citizens. Australia has been a leader in this trend. The literature in this area focuses primarily on the pragmatic issues such as governmental accountability and transparency, interactivity, policy making, security and privacy, quality and costs. Along with the positive accounts of eGovernment development, however, some concerns are emerging in the literature. This paper examines such issues with particular reference to national governments. Although Australia can be proud of its position as a leader in bringing government business to the Web, it must also be cognisant of the concerns about eGovernment that are being more widely identified.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There have been many standards and guides written for the implementation of computer security and information security concentrating on appropriate implementation of procedures for effective information security management. Such guides are limited when dealing with e-business and its implementation by Small and Medium Business Enterprises (SMEs). In Australia the National Office for the Information Economy (NOIE) has released a small business guide for e-security for performing such services while fulfilling the necessary security requirements. This paper presents an overview of this current small business guide to e-security with special reference to deriving a common set of criteria for implementing security measures in the SME e-business environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, we have witnessed many information security developmental trends. As a consequence, the dimensions of information security - once single disciplinary area - have become multifaceted and convoluted. This paper aims to (1) recapitulate these key developments: (2) argue that the emergence of many complex information security dimensions are the result of 'constant change agents' (CCAs); (3) discuss the implications on Australia's society, i. e. government, companies and individuals; and (4) propose key consideration areas and possible solutions thereof. We hope that the discussion presented here will position Australia to make better aligned information security and strategic plans, such as choosing appropriate investments and adopting effective solutions to strengthen and secure Australia's national information security posture.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

By having an effective organisational information security culture where employees intuitively protect corporate information assets, small and medium size enterprises (SMEs) could improve information security. However, previous research has largely overlooked the development of such a culture for SMEs, and the national context in which SMEs operate. The paper explores this topic and provides key findings from an interpretive Australian study based on a literature review, two focus groups and three case studies. A holistic framework is provided for fostering an information security culture in SMEs in a national setting. The paper discusses key managerial challenges for SMEs attempting to develop such a culture. The main findings suggest that Australian SME owners do not provide sufficient support for information security due to insufficient awareness of its importance and may also be affected by national attitudes to risk. The paper concludes that Australian SME owners may benefit from adopting a risk-based approach to information security and should be educated about the potential strategic role of information technology and information security. The paper also identifies the value and difficulty of promoting a behavioural and learning approach to information security to complement traditional technological and managerial approaches. Implications for theory and practice are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A major study of how Australia and Japan, two island nations, face the currents of globalisation. Fascinating chapters by distinguished students of Australia and Japan, and they explore the impact of globalisation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Australian Unity Wellbeing Index monitors the subjective wellbeing of the Australian population. Our first survey was conducted in April 2001 and this report concerns the 15th survey, undertaken in May 2006. Our previous survey had been conducted seven months earlier in October 2005. This intervening period contained a number of significant events. The first Australian terrorist threat was marked by the arrest of people in Sydney and Melbourne alleged to be plotting an attack. In December rioting took place in Sydney between Muslim and non-Muslim youths, but whether this was due more to religious differences or a ‘turf-war’ is unclear. Then, in May 2005, the new Industrial Relations legislation came into force. Each survey involves a telephone interview with a new sample of 2,000 Australians, selected to represent the national population geographic distribution. These surveys comprise the Personal Wellbeing Index, which measures people’s satisfaction with their own lives, and the National Wellbeing Index, which measures how satisfied people are with life in Australia. Other items include a standard set of demographic questions and other survey-specific questions. The specific topic for Survey 15 is the extent to which people feel that their source of income is secure.