9 resultados para security development
em AMS Tesi di Dottorato - Alm@DL - Università di Bologna
Resumo:
The times following international or civil conflicts but also violent revolutions often come with unequal share of the peace dividend for men and women. Delusions for women who gained freedom of movement and of roles during conflict but had to step back during reconstruction and peace have been recorded in all regions of the world. The emergence of peacebuilding as a modality for the international community to ensure peace and security has slowly incorporated gender sensitivity at the level of legal and policy instruments. Focusing on Rwanda, a country that has obtained significant gender advancement in the years after the genocide while also obtaining to not relapse into conflict, this research explores to what extent the international community has contributed to this transformation. From a review of evaluations, findings are that many of the interventions did not purse gender equality, and overall the majority understood gender and designed actions is a quite superficial way which would hardly account for the significative advancement in combating gender discrimination that the Government, for its inner political will, is conducting. Then, after a critique from a feminist standpoint to the concept of human security, departing from the assumption (sustained by the Governemnt of Rwanda as well) that domestic violence is a variable influencing level of security relevant at the national level, a review of available secondary data on GBV is conducted an trends over the years analysed. The emerging trends signal a steep increase in prevalence of GBV and in domestic violence in particular. Although no conclusive interpretation can be formulated on these data, there are elements suggesting the increase might be due to augmented reporting. The research concludes outlining possible further research pathways to better understand the link in Rwanda between the changing gender norms and the GBV.
Resumo:
Persistent food insecurity and famines have continued to significantly shape the development policies of Ethiopia for decades. Over the decades, frequent famines caused not only the death of hundreds of thousands of victims but also significantly contributed to two revolutions that swept away the Haile Selassie and Derg regimes, as well as significantly taxing the legitimacy of the incumbent regime. As a result, agriculture and food security have become increasingly the top policy priorities for all political regimes in Ethiopia. However, the development policies of the ruling elites of Ethiopia have consistently failed to transform backward agriculture and ensure food security. The failures of the development policies of the Ethiopian governments over the years were attributed to several factors. Ethiopian authoritarian politics, centralized rule with a lack of transparency and accountability; the isolation of peasants from the development and governance process, and the lack of coherent agricultural development strategies that invest in peasant agriculture and create synergy among sectors are identified as key issues that have contributed to the persistence of food insecurity in the country. The literature on the failure of Ethiopia's political regimes to address food insecurity and famine has two major gaps that this study aims to fill. First, the cumulative and path-dependent food security and agricultural development policy environment were not adequately considered. Second, the strategy of extraversion by subsequent political regimes to use external support as a relief to prevent the famine-induced political crisis. This study used a mixed approach to collect data and present the evolution of the interplays of development policies and food security in three regimes within the context of international food security discourses. This study found out how the historical patterns of approaches of Ethiopia’s regimes to development and governance led to frequent famines and persistent food insecurity.
Resumo:
The activity of the Ph.D. student Juri Luca De Coi involved the research field of policy languages and can be divided in three parts. The first part of the Ph.D. work investigated the state of the art in policy languages, ending up with: (i) identifying the requirements up-to-date policy languages have to fulfill; (ii) defining a policy language able to fulfill such requirements (namely, the Protune policy language); and (iii) implementing an infrastructure able to enforce policies expressed in the Protune policy language. The second part of the Ph.D. work focused on simplifying the activity of defining policies and ended up with: (i) identifying a subset of the controlled natural language ACE to express Protune policies; (ii) implementing a mapping between ACE policies and Protune policies; and (iii) adapting the ACE Editor to guide users step by step when defining ACE policies. The third part of the Ph.D. work tested the feasibility of the chosen approach by applying it to meaningful real-world problems, among which: (i) development of a security layer on top of RDF stores; and (ii) efficient policy-aware access to metadata stores. The research activity has been performed in tight collaboration with the Leibniz Universität Hannover and further European partners within the projects REWERSE, TENCompetence and OKKAM.
Resumo:
Food Security has become an important issue in the international debate, particularly during the latest economic crisis. It relevant issue also for the Mediterranean Countries (MCs), particularly those of the southern shore, as they are is facing complex economic and social changes. On the one hand there is the necessity to satisfy the increasing and changing food demand of the growing population; on the other hand it is important to promote economic growth and adjust the agricultural production to food demand in a sustainable perspective. The assessment of food security conditions is a challenging task due to the multi-dimensional nature and complexity of the matter. Many papers in the scientific literature focus on the nutritional aspects of food security, while its economic issues have been addressed less frequently and only in recent times. Thus, the main objective of the research is to assess food (in)security conditions in the MCs. The study intends to identify and implement appropriate theoretical concepts and methodological tools to be used in the assessment of food security, with a particular emphasis on its economic dimension within MCs. The study follows a composite methodological approach, based on the identification and selection of a number of relevant variables, a refined set of indicators is identified by means of a two-step Principal Component Analysis applied to 90 countries and the PCA findings have been studied with particular attention to the MCs food security situation. The results of the study show that MCs have an higher economic development compared to low-income countries, however the economic and social disparities of this area show vulnerability to food (in)security, due to: dependency on food imports, lack of infrastructure and agriculture investment, climate condition and political stability and inefficiency. In conclusion, the main policy implications of food (in)security conditions in MCs are discussed.
Resumo:
This work presents first a study of the national and international laws in the fields of safety, security and safeguards. The international treaties and the recommendations issued by the IAEA as well as the national regulations in force in France, the United States and Italy are analyzed. As a result of this, a comparison among them is presented. Given the interest of the Japan Atomic Energy Agency for the aspects of criminal penalties and monetary, also the Japanese case is analyzed. The main part of this work was held at the JAEA in the field of proliferation resistance (PR) and physical protection (PP) of a GEN IV sodium fast reactor. For this purpose the design of the system is completed and the PR & PP methodology is applied to obtain data usable by designers for the improvement of the system itself. Due to the presence of sensitive data, not all the details can be disclosed. The reactor site of a hypothetical and commercial sodium-cooled fast neutron nuclear reactor system (SFR) is used as the target NES for the application of the methodology. The methodology is applied to all the PR and PP scenarios: diversion, misuse and breakout; theft and sabotage. The methodology is applied to the SFR to check if this system meets the target of PR and PP as described in the GIF goal; secondly, a comparison between the SFR and a LWR is performed to evaluate if and how it would be possible to improve the PR&PP of the SFR. The comparison is implemented according to the example development target: achieving PR&PP similar or superior to domestic and international ALWR. Three main actions were performed: implement the evaluation methodology; characterize the PR&PP for the nuclear energy system; identify recommendations for system designers through the comparison.
Resumo:
Network monitoring is of paramount importance for effective network management: it allows to constantly observe the network’s behavior to ensure it is working as intended and can trigger both automated and manual remediation procedures in case of failures and anomalies. The concept of SDN decouples the control logic from legacy network infrastructure to perform centralized control on multiple switches in the network, and in this context, the responsibility of switches is only to forward packets according to the flow control instructions provided by controller. However, as current SDN switches only expose simple per-port and per-flow counters, the controller has to do almost all the processing to determine the network state, which causes significant communication overhead and excessive latency for monitoring purposes. The absence of programmability in the data plane of SDN prompted the advent of programmable switches, which allow developers to customize the data-plane pipeline and implement novel programs operating directly in the switches. This means that we can offload certain monitoring tasks to programmable data planes, to perform fine-grained monitoring even at very high packet processing speeds. Given the central importance of network monitoring exploiting programmable data planes, the goal of this thesis is to enable a wide range of monitoring tasks in programmable switches, with a specific focus on the ones equipped with programmable ASICs. Indeed, most network monitoring solutions available in literature do not take computational and memory constraints of programmable switches into due account, preventing, de facto, their successful implementation in commodity switches. This claims that network monitoring tasks can be executed in programmable switches. Our evaluations show that the contributions in this thesis could be used by network administrators as well as network security engineers, to better understand the network status depending on different monitoring metrics, and thus prevent network infrastructure and service outages.
Resumo:
This thesis is a combination of research questions in development economics and economics of culture, with an emphasis on the role of ancestry, gender and language policies in shaping inequality of opportunities and socio-economic outcomes across different segments of a society. The first chapter shows both theoretically and empirically that heterogeneity in risk attitudes can be traced to the ethnic origins and ancestral way of living. In particular, I construct a measure of historical nomadism at the ethnicity level and link it to contemporary individual-level data on various proxies of risk attitudes. I exploit exogenous variation in biodiversity to build a novel instrument for nomadism: distance to domestication points. I find that descendants of ethnic groups that historically practiced nomadism (i) are more willing to take risks, (ii) value security less, and (iii) have riskier health behavior. The second chapter evaluates the nature of a trade-off between the advantages of female labor participation and the positive effects of female education. This work exploits a triple difference identification strategy relying on exogenous spike in cotton price and spatial variation in suitability for cotton, and split sample analyses based on the exogenous allocation of land contracts. Results show that gender differences in parental investments in patriarchal societies can be reinforced by the type of agricultural activity, while positive economic shocks may further exacerbate this bias, additionally crowding out higher possibilities to invest in female education. The third chapter brings novel evidence of the role of the language policy in building national sentiments, affecting educational and occupational choices. Here I focus on the case of Uzbekistan and estimate the effects of exposure to the Latin alphabet on informational literacy, education and career choices. I show that alphabet change affects people's informational literacy and the formation of certain educational and labour market trends.
Resumo:
Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.
Resumo:
Recent technological advancements have played a key role in seamlessly integrating cloud, edge, and Internet of Things (IoT) technologies, giving rise to the Cloud-to-Thing Continuum paradigm. This cloud model connects many heterogeneous resources that generate a large amount of data and collaborate to deliver next-generation services. While it has the potential to reshape several application domains, the number of connected entities remarkably broadens the security attack surface. One of the main problems is the lack of security measures to adapt to the dynamic and evolving conditions of the Cloud-To-Thing Continuum. To address this challenge, this dissertation proposes novel adaptable security mechanisms. Adaptable security is the capability of security controls, systems, and protocols to dynamically adjust to changing conditions and scenarios. However, since the design and development of novel security mechanisms can be explored from different perspectives and levels, we place our attention on threat modeling and access control. The contributions of the thesis can be summarized as follows. First, we introduce a model-based methodology that secures the design of edge and cyber-physical systems. This solution identifies threats, security controls, and moving target defense techniques based on system features. Then, we focus on access control management. Since access control policies are subject to modifications, we evaluate how they can be efficiently shared among distributed areas, highlighting the effectiveness of distributed ledger technologies. Furthermore, we propose a risk-based authorization middleware, adjusting permissions based on real-time data, and a federated learning framework that enhances trustworthiness by weighting each client's contributions according to the quality of their partial models. Finally, since authorization revocation is another critical concern, we present an efficient revocation scheme for verifiable credentials in IoT networks, featuring decentralization, demanding minimum storage and computing capabilities. All the mechanisms have been evaluated in different conditions, proving their adaptability to the Cloud-to-Thing Continuum landscape.