36 resultados para Security Studies

em Deakin Research Online - Australia


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Brings together a range of specially-commissioned chapters to provide an accessible introduction to security studies in the 21st century. The second edition has been expanded to cover developments in global and regional security; nuclear proliferation; terrorism; intervention and peacekeeping. C. Snyder, Deaking Uni.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This chapter raises the following main points:
• The study of security has experienced a series of debates around the nature of the threats to security.
• The early security scholars, as distinct from those who studied strategy and warfare, took a broad approach and argued that military and non-military means could achieve security.
• During the Cold War the study of security focused on the most pressing security issue of the day – the nuclear standoff between the two superpowers.
• In the post-Cold War era the broader approach to the study of security returned to the fore and included non-state actors and non-traditional sources of insecurity.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book provides a study of the war by Liberation Tigers of Tamil Eelam (LTTE) to create a separate state in Sri Lanka. It examines the ways in which this war should, in principle, have invoked ‘Responsibility to Protect’ principles, as well as the political, legal and practical problems involved and, ultimately, why the international community failed to act.

Over the years there have been several events, including those in Rwanda, Sierra Leone, Timor-Leste, Darfur, and Kosovo, that have led the international community to accept a responsibility to protect. However, despite its overwhelming preliminary endorsement, the principles of this concept are still not universally sanctioned and there are some strong international opponents, including some countries that were initial signatories of the convention.

By considering the example of Sri Lanka, the text focuses on what conditions could satisfy or demand the application of responsibility to protect. It further presents a case as to why this conflict was, and may still be, the normative responsibility of the international community.

Sri Lanka and the Responsibility to Protect will be of great interest to students of South-East Asian politics, human rights, international law, ethnic conflict, security studies and IR in general.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book reveals that ‘fixers’—local experts on whom foreign correspondents rely—play a much more significant role in international television newsgathering than has been documented or understood. Murrell explores the frames though which international reporting has traditionally been analysed and then shows that fixers, who have largely been dismissed by scholars as "logistical aides", are in fact central to the day-to-day decision-making that takes place on-the-road. Murrell looks at why and how fixers are selected and what their significance is to foreign correspondence. She asks if fixers help introduce a local perspective into the international news agenda, or if fixers are simply ‘People Like Us’ (PLU). Also included are excerpts from interviews with TV correspondents and fixers and in-depth case studies of correspondents in Iraq and Indonesia.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We investigate the effectiveness of several well-known parametric and non-parametric event study test statistics with security price data from the major Asia-Pacific security markets. Extensive Monte Carlo simulation experiments with actual daily security returns data reveal that the parametric test statistics are prone to misspecification with Asia-Pacific returns data. Two non-parametric tests, a rank test [Corrado and Zivney (Corrado, C.J., Zivney, T.L., 1992, The specification and power of the sign test in event study hypothesis tests using daily stock returns, Journal of Financial and Quantitative Analysis 27(3), 465-478)] and a sign test [Cowan (Cowan, A.R., 1992, Non-parametric event study tests, Review of Quantitative Finance and Accounting 1(4), 343–358)] were the best performers overall with market model excess returns computed using an equal weight index.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Researchers investigating the decline of potential applicants for principalships have demonstrated that teachers perceive there to be a significant problem in current selection procedures. This article reports an investigation in two Australian states into principal selection. Drawing on a corpus of interviews, two case studies and administrative guidelines, we highlight five key problems in the interview process: (1) the dependence of selection panels on a written application; (2) the dilemma of experience versus potential; (3) the covert rule about the appointment of preferred applicants; (4) the quandary of panel competency; and (5) the evidence of inconsistency of decisions. We argue that the selection process amounts to a reproductive technology which, in the quest for certainty and safety, results in particular kinds of people being successful. This amounts we suggest, whether the selection process is managed by progressive or conservative personnel, to a form of homosociability the tendency to select people just like oneself.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite recent advances in the area of humanitarian responses and the publication and dissemination of various guidelines with regard to nutritional interventions, there is, however a paucity of studies which have examined the human right to food in complex emergencies. 186 countries including those affected by both human made and natural disasters and countries who are donors of humanitarian relief aid adopted the Rome Declaration on Food Security and World Summit plan of Action reaffirming “ the right to adequate food and the fundamental right of everyone to be free from hunger”. The human right to adequate and nutritious food in refugee settings implies that every refugee has physical and economic access to sufficient food to provide the necessary nutrients for effective physical and physiological functions and achieve well being. There are many grounds for believing that the current humanitarian responses to disasters more often violate than respect the human right to adequate and nutritious food. Using elements of household food security as our working framework this paper focuses on the complex ethical and moral questions raised by the conventional humanitarian assistance framework and in particular the issue of human right to food and household food security in refugee settings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper addresses the role of security in the collaborative e-learning environment, and in particular, the social aspects of security and the importance of identity. It represents a case study, completed in Nov 2004, which was conducted to test the sense of security that students experienced whilst using the wiki platform as a means of online collaboration in the tertiary education environment. Wikis, fully editable Web sites, are easily accessible, require no software and allow its contributors (in this case students) to feel a sense of responsibility and ownership. A comparison between two wiki studies will be made whereby one group employed user login and the other maintained anonymity throughout the course of the study. The results consider the democratic participation and evolution of the work requirements over time, which in fact ascertains the nonvalidity of administrative identification.

Relevância:

30.00% 30.00%

Publicador: