9 resultados para Political of security

em AMS Tesi di Dottorato - Alm@DL - Università di Bologna


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The times following international or civil conflicts but also violent revolutions often come with unequal share of the peace dividend for men and women. Delusions for women who gained freedom of movement and of roles during conflict but had to step back during reconstruction and peace have been recorded in all regions of the world. The emergence of peacebuilding as a modality for the international community to ensure peace and security has slowly incorporated gender sensitivity at the level of legal and policy instruments. Focusing on Rwanda, a country that has obtained significant gender advancement in the years after the genocide while also obtaining to not relapse into conflict, this research explores to what extent the international community has contributed to this transformation. From a review of evaluations, findings are that many of the interventions did not purse gender equality, and overall the majority understood gender and designed actions is a quite superficial way which would hardly account for the significative advancement in combating gender discrimination that the Government, for its inner political will, is conducting. Then, after a critique from a feminist standpoint to the concept of human security, departing from the assumption (sustained by the Governemnt of Rwanda as well) that domestic violence is a variable influencing level of security relevant at the national level, a review of available secondary data on GBV is conducted an trends over the years analysed. The emerging trends signal a steep increase in prevalence of GBV and in domestic violence in particular. Although no conclusive interpretation can be formulated on these data, there are elements suggesting the increase might be due to augmented reporting. The research concludes outlining possible further research pathways to better understand the link in Rwanda between the changing gender norms and the GBV.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The focus of this dissertation is the relationship between the necessity for protection and the construction of cultural identities. In particular, by cultural identities I mean the representation and construction of communities: national communities, religious communities or local communities. By protection I mean the need for individuals and groups to be reassured about dangers and risks. From an anthropological point of view, the relationship between the need for protection and the formation and construction of collective identities is driven by the defensive function of culture. This was recognized explicitly by Claude Lévi-Strauss and Jurij Lotman. To explore the “protective hypothesis,” it was especially useful to compare the immunitarian paradigm, proposed by Roberto Esposito, with a semiotic approach to the problem. According to Esposito, immunity traces borders, dividing Community from what should be kept outside: the enemies, dangers and chaos, and, in general, whatever is perceived to be a threat to collective and individual life. I recognized two dimensions in the concept of immunity. The first is the logic dimension: every element of a system makes sense because of the network of differential relations in which it is inscribed; the second dimension is the social praxis of division and definition of who. We are (or what is inside the border), and who They are (or what is, and must be kept, outside the border). I tested my hypothesis by analyzing two subject areas in particular: first, the security practices in London after 9/11 and 7/7; and, second, the Spiritual Guide of 9/11 suicide bombers. In both cases, one observes the construction of two entities: We and They. The difference between the two cases is their “model of the world”: in the London case, one finds the political paradigms of security as Sovereignty, Governamentality and Biopolitics. In the Spiritual Guide, one observes a religious model of the Community of God confronting the Community of Evil. From a semiotic point view, the problem is the origin of respective values, the origin of respective moral universes, and the construction of authority. In both cases, I found that emotional dynamics are crucial in the process of forming collective identities and in the process of motivating the involved subjects: specifically, the role of fear and terror is the primary factor, and represents the principal focus of my research.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Reliable electronic systems, namely a set of reliable electronic devices connected to each other and working correctly together for the same functionality, represent an essential ingredient for the large-scale commercial implementation of any technological advancement. Microelectronics technologies and new powerful integrated circuits provide noticeable improvements in performance and cost-effectiveness, and allow introducing electronic systems in increasingly diversified contexts. On the other hand, opening of new fields of application leads to new, unexplored reliability issues. The development of semiconductor device and electrical models (such as the well known SPICE models) able to describe the electrical behavior of devices and circuits, is a useful means to simulate and analyze the functionality of new electronic architectures and new technologies. Moreover, it represents an effective way to point out the reliability issues due to the employment of advanced electronic systems in new application contexts. In this thesis modeling and design of both advanced reliable circuits for general-purpose applications and devices for energy efficiency are considered. More in details, the following activities have been carried out: first, reliability issues in terms of security of standard communication protocols in wireless sensor networks are discussed. A new communication protocol is introduced, allows increasing the network security. Second, a novel scheme for the on-die measurement of either clock jitter or process parameter variations is proposed. The developed scheme can be used for an evaluation of both jitter and process parameter variations at low costs. Then, reliability issues in the field of “energy scavenging systems” have been analyzed. An accurate analysis and modeling of the effects of faults affecting circuit for energy harvesting from mechanical vibrations is performed. Finally, the problem of modeling the electrical and thermal behavior of photovoltaic (PV) cells under hot-spot condition is addressed with the development of an electrical and thermal model.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Gli ultimi anni hanno visto importanti cambiamenti positivi nella cooperazione interstatale in Asia centrale. Crescenti minacce come il terrorismo internazionale, l'estremismo religioso e politico, il traffico di droga, ecc, causati dagli interessi geopolitici e geo-economici delle potenze mondiali, hanno contribuito alla formazione di una politica estera più coordinata e coerente degli Stati della regione. Questo processo si manifesta nella partecipazione attiva dell’istituzionalizzazione della Shanghai Organizzazione del Commonwealth (SOC), Conferenza sulle misure di costruzione d’interazione e fiducia in Asia (CICA) e Organizzazione del Trattato di Sicurezza Collettiva (CSTO). Problemi moderni di sicurezza in Asia centrale dovrebbero essere risolti in dei nuovi modi, non convenzionali. Le nuove minacce alla sicurezza richiedono modi non standard per risolvere il problema. Considerate le differenze fondamentali dell'Unione europea e degli Stati dell'Asia centrale nei valori e dal punto di vista in materia di sicurezza. I paesi dell'Asia centrale non sono pronti per l'integrazione politica. Nonostante questo, nell’Asia centrale sono state adottate misure per contrastare le minacce non convenzionali. L’esperienza europea di unire gli sforzi della regione per garantire la sicurezza interna, può essere utilizzata dai paesi dell'Asia centrale, soprattutto, in primo luogo sulla formazione del quadro istituzionale e giuridico per la cooperazione operativa delle forze dell'ordine per le seguenti aree: • prevenzione del traffico di droga attraverso gli Stati dell'Asia centrale; • lotta contro nuove forme di terrorismo ed estremismo; • limitare la dimensione della migrazione clandestina; • migliorare la protezione giuridica dei cittadini. Fino a poco tempo fa, questi temi hanno ricevuto poca attenzione, sia nella teoria sia nella pratica, poiché i problemi di sicurezza della società erano principalmente ridotti per evitare il pericolo di guerra.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Recent technological advancements have played a key role in seamlessly integrating cloud, edge, and Internet of Things (IoT) technologies, giving rise to the Cloud-to-Thing Continuum paradigm. This cloud model connects many heterogeneous resources that generate a large amount of data and collaborate to deliver next-generation services. While it has the potential to reshape several application domains, the number of connected entities remarkably broadens the security attack surface. One of the main problems is the lack of security measures to adapt to the dynamic and evolving conditions of the Cloud-To-Thing Continuum. To address this challenge, this dissertation proposes novel adaptable security mechanisms. Adaptable security is the capability of security controls, systems, and protocols to dynamically adjust to changing conditions and scenarios. However, since the design and development of novel security mechanisms can be explored from different perspectives and levels, we place our attention on threat modeling and access control. The contributions of the thesis can be summarized as follows. First, we introduce a model-based methodology that secures the design of edge and cyber-physical systems. This solution identifies threats, security controls, and moving target defense techniques based on system features. Then, we focus on access control management. Since access control policies are subject to modifications, we evaluate how they can be efficiently shared among distributed areas, highlighting the effectiveness of distributed ledger technologies. Furthermore, we propose a risk-based authorization middleware, adjusting permissions based on real-time data, and a federated learning framework that enhances trustworthiness by weighting each client's contributions according to the quality of their partial models. Finally, since authorization revocation is another critical concern, we present an efficient revocation scheme for verifiable credentials in IoT networks, featuring decentralization, demanding minimum storage and computing capabilities. All the mechanisms have been evaluated in different conditions, proving their adaptability to the Cloud-to-Thing Continuum landscape.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

La ricerca esamina il ruolo delle imprese che svolgono attività di sicurezza privata in Italia (oggi definita anche "sussidiaria" o "complementare") in relazione allo sviluppo delle recenti politiche sociali che prevedono il coinvolgimento di privati nella gestione della sicurezza in una prospettiva di community safety. Nel 2008/2009 le politiche pubbliche di sicurezza legate al controllo del territorio hanno prodotto norme con nuovi poteri “di polizia” concessi agli amministratori locali e la previsione di associazione di cittadini per la segnalare eventi dannosi alla sicurezza urbana (“ronde”). Nello stesso periodo è iniziata un’importante riforma del settore della sicurezza privata, ancora in fase di attuazione, che definisce le attività svolte dalle imprese di security, individua le caratteristiche delle imprese e fissa i parametri per la formazione del personale. Il quadro teorico del lavoro esamina i concetti di sicurezza/insicurezza urbana e di società del rischio alla luce delle teorie criminologiche legate alla prevenzione situazionale e sociale e alla community policing. La ricerca sul campo si basa sull’analisi del contenuto di diverse interviste in profondità con esponenti del mondo della sicurezza privata (imprenditori, dirigenti, studiosi). Le interviste hanno fatto emergere che il ruolo della sicurezza privata in Italia risulta fortemente problematico; anche la riforma in corso sulla normativa del settore è considerata con scarso entusiasmo a causa delle difficoltà della congiuntura economica che rischia di compromettere seriamente la crescita. Il mercato della sicurezza in Italia è frastagliato e scarsamente controllato; manca un’azione di coordinamento fra le diverse anime della sicurezza (vigilanza privata, investigazione, facility/security management); persiste una condizione di subalternità e di assenza di collaborazione con il settore pubblico che rende la sicurezza privata relegata in un ruolo marginale, lontano dalle logiche di sussidiarietà.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The present work, then, is concerned with the forgotten elements of the Lebanese economy, agriculture and rural development. It investigates the main problematic which arose from these forgotten components, in particular the structure of the agricultural sector, production technology, income distribution, poverty, food security, territorial development and local livelihood strategies. It will do so using quantitative Computable General Equilibrium (CGE) modeling and a qualitative phenomenological case study analysis, both embedded in a critical review of the historical development of the political economy of Lebanon, and a structural analysis of its economy. The research shows that under-development in Lebanese rural areas is not due to lack of resources, but rather is the consequence of political choices. It further suggests that agriculture – in both its mainstream conventional and its innovative locally initiated forms of production – still represents important potential for inducing economic growth and development. In order to do so, Lebanon has to take full advantage of its human and territorial capital, by developing a rural development strategy based on two parallel sets of actions: one directed toward the support of local rural development initiatives, and the other directed toward intensive form of production. In addition to its economic returns, such a strategy would promote social and political stability.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Persistent food insecurity and famines have continued to significantly shape the development policies of Ethiopia for decades. Over the decades, frequent famines caused not only the death of hundreds of thousands of victims but also significantly contributed to two revolutions that swept away the Haile Selassie and Derg regimes, as well as significantly taxing the legitimacy of the incumbent regime. As a result, agriculture and food security have become increasingly the top policy priorities for all political regimes in Ethiopia. However, the development policies of the ruling elites of Ethiopia have consistently failed to transform backward agriculture and ensure food security. The failures of the development policies of the Ethiopian governments over the years were attributed to several factors. Ethiopian authoritarian politics, centralized rule with a lack of transparency and accountability; the isolation of peasants from the development and governance process, and the lack of coherent agricultural development strategies that invest in peasant agriculture and create synergy among sectors are identified as key issues that have contributed to the persistence of food insecurity in the country. The literature on the failure of Ethiopia's political regimes to address food insecurity and famine has two major gaps that this study aims to fill. First, the cumulative and path-dependent food security and agricultural development policy environment were not adequately considered. Second, the strategy of extraversion by subsequent political regimes to use external support as a relief to prevent the famine-induced political crisis. This study used a mixed approach to collect data and present the evolution of the interplays of development policies and food security in three regimes within the context of international food security discourses. This study found out how the historical patterns of approaches of Ethiopia’s regimes to development and governance led to frequent famines and persistent food insecurity.