16 resultados para Democratic Security Policy
em Aston University Research Archive
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.
Resumo:
The Politics of the New Germany takes a new approach to understanding politics in the post-unification Federal Republic. Assuming only elementary knowledge, it focuses on debates and issues in order to help students understand both the workings of Germany's key institutions and some of the key policy challenges facing German politicians. Written in a straightforward style by four experts, each of the chapters draws on a rich variety of real-world examples. Packed with boxed summaries of key points, a guide to further reading and a range of seminar questions for discussion at the end of each chapter, this book highlights both the challenges and opportunities facing policy-makers in such areas as foreign affairs, economic policy, immigration, identity politics and institutional reforms. The book also takes a bird's-eye view of the big debates that define German politics over time, regardless of which party happens to be in power. It pinpoints three key themes that have characterised German politics over the last sixty years; reconciliation, consensus and transformation. Table of Contents: Introduction 1. Germany and the Burden of History 2. Germany’s Post-War Development, 1945-1989 3. Towards German Unity? 4. A Blockaded System of Government? 5. The Party System and Electoral Behaviour: The Path to Stable Instability? 6. Economic Management: The End of the German Model? 7. Citizenship and Demographics: A Country of Immigration? 8. The Reform of the Welfare State? 9. Germany and the European Union: A European Germany or a German Europe? 10. Foreign and Security Policy: A New Role for the Twenty-First Century? 11. Conclusion
Resumo:
The role of the European Union in global politics has been of growing interest over the past decade. The EU is a key player in global institutions such as the World Trade Organization (WTO) and NATO. It continues to construct an emerging identity and project its values and interests throughout contemporary international relations. The capacity of the EU to both formulate and realise its goals, however, remains contested. Some scholars claim the EU’s `soft power’ attitude rivals that of the USA’s `hard power’ approach to international relations. Others view the EU as insufficiently able to produce a co-ordinated position to project upon global politics. Regardless of the position taken within this debate, the EU’s relationship with its external partners has an increasingly important impact upon economic, political and security concerns on an international level. Trade negotiations, military interventions, democracy promotion, international development and responses to the global economic crisis have all witnessed the EU playing a central role. This has seen the EU become both a major force in contemporary institutions of global governance and a template for supranational governance that might influence other attempts to construct regional and global institutions. This volume brings together a collection of leading EU scholars to provide a state-of-the-art overview covering these and other debates relating to the EU’s role in contemporary global governance. The Handbook is divided into four main sections: Part I: European studies and global governance – provides an overview and critical assessment of the leading theoretical approaches through which the EU’s role in global governance has been addressed within the literature. Part II: Institutions – examines the role played by the key EU institutions in pursuing a role for the EU in contemporary international relations. Part III: Policy and issue areas – explores developments within particular policy sectors, assessing the different impact that the EU has had in different issue areas, including foreign and security policy, environmental policy, common commercial policy, the Common Agricultural Policy, development policy, accession policy, the Neighbourhood Policy and conflict transformation. Part IV: The global multilevel governance complex and the EU – focuses on the relationship between the EU and the institutions, regions and countries with which it forms a global multilevel governance complex, including chapters on the EU’s relationship with the WTO, United Nations, East Asia, Africa and the USA.
Resumo:
Based on extensive quantitative and qualitative analyses of a corpus of American presidential speeches that includes all inaugural addresses and State of the Union messages from 1789 to 2008, as well as major foreign and security policy speeches after 1945, this research monograph analyzes the various forms and functions of intertextual references found in the discourse of American presidents. Working within an original, interdisciplinary theoretical framework established by theories of intertextuality, discourse analysis, and presidential studies, the book discusses five different types of presidential intertextuality, all of which contribute jointly to creating a set of carefully manipulated and politically powerful images of both the American nation and the American presidency. The book is intended for scholars and students in political and presidential studies, communications, American cultural studies, and linguistics, as well as anyone interested in the American presidency in general.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
In this article we introduce the notions of knowledge policy and the politics of knowledge. These have to be distinguished from the older, well-known terms of research policy, or science and technology policy. While the latter aim to foster the development of innovations in knowledge and its applications, the former is aware of side effects of new knowledge and tries to address them. While research policy takes the aims of innovations as largely unproblematic (insofar as they help improving national competitiveness), knowledge policy tries to govern (regulate, control, restrict, or even forbid) the production of knowledge.
Resumo:
In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.
Resumo:
While the city offers the potential of dynamic agglomeration economies which can spur the achievement of economic growth and act as an engine that powers the economy, it often appears as a centre of crisis in mature ‘developed’ regions and countries, even before the most recent economic downturn. This paper attempts to reconcile these two seemingly paradoxical observations by bringing in a strategic choice perspective to explain how concentrated strategic decision making in the corporate entities that dominate our cities has diminished the very diversity that Jacobs identified as being essential for cities to flourish and develop. The industrial policy implications for cities are subsequently explored in terms of building new industrial districts, developing high skill ecosystems, and fostering multinational webs of cities, all with the aim of ensuring the conditions exist in cities for creativity and development to flourish, notably a diverse and democratic economic system.
Resumo:
When comparisons in terms of industrial policy lessons to be learned have taken place, it has tended to be solely vis-a-vis the ‘development state’ East Asian experience. This paper broadens the analysis and considers lessons which African countries can learn from other so-called ‘tiger’ economies including Ireland and the East and South Asian countries. We recognise that the latter are indeed clearly significant as many African countries at the time of independence had economic structures and levels of income quite similar to East Asian countries, yet have grown at vastly different rates since then. Exploring why this has been the case can thus offer important insights into possibilities for industrial policy. Yet this comes with some health warnings over East Asian experience. We suggest that another important contribution can come by looking at the Irish example, given its emphasis on corporatism rather than simply relying on state direction in the operation of industrial policy. The Irish model is also more democratic in some senses and has protected workers’ rights during the development process in contrast to the often highly dirigisite East Asian model. Overall we suggest that some immediate actions are needed, notably with regard to the financial system in small African economies. Without such changes, a poorly functioning financial system will continue to keep investment at low levels. In relation to the small size of the African economies, the paper recommends regional integration and sufficient overseas development assistance (ODA) for infrastructural development. It is also critical to note that the various small African economies each face their own industrial and economic development challenges, and that a ‘one size fits all’ approach is not appropriate; rather the key is to tailor policies and systems to the unique opportunities and development challenges in each African country.
Resumo:
The accession of the East-Central European (ECE) countries carried a promise of enhancing and enriching the EU’s Eastern policy. The new member states had the strongest interests among EU member states to ensure that countries in the East are prosperous, stable and democratic. Yet, EU’s Eastern policy has been largely criticised for its ineffectiveness. So why have they not been able to address the shortcomings in the EU’s Eastern policies? The article argues that the ECE countries supported the way the EU’s Eastern policies were conceived and implemented because they saw it as a potent vehicle to promote their own transition experience not only in the region but also within the EU. We argue that the ECE states have experienced three types of challenges when promoting their transition experience. First, uploading to the EU level remained largely at a rhetorical level. Second, there are conceptual and practical difficulties in defining what constitutes transition experience and harnessing it, as well as coordinating its transfer between the ECE states. Finally, while using transition experience as the basis for their development assistance strategies, the ECE countries actually insufficiently conceptualised the ‘development’ aspect in these policies. Being so driven by their own experience, they have not drawn the lessons from enlargement to use in a non-accession context, especially by incorporating the broader lessons with regard to development.
Resumo:
With automotive plants being closed in Australia and western Europe, this article reflects on the employment status of ex-MG Rover (MGR) workers following the closure of the Longbridge plant in 2005. In particular, it draws on Standing's typology of labour market insecurity and uses a mixed-methods approach including an analysis of a longitudinal survey of some 200 ex-MGR workers, and in-depth interviews with ex-workers and policy-makers. While the policy response to the closure saw significant successes in terms of the great majority of workers successfully adjusting into re-employment, and with positive findings in terms of re-training and education, the paper finds significant challenges in terms of security of employment, income, job quality and representation at work years after closure. In particular, the paper posits that the general lack of attention to employment security at the macrolevel effectively undermined elements of a positive policy response over the longer run. This in turn suggests longer-term policy measures are required to address aspects of precariousness at work.
Resumo:
Over the past two decades, the Democratic People's Republic of Korea has allegedly developed nuclear energy while suffering near collapse caused by catastrophic economic policies. This article presents an evaluation of North Korea's contemporary energy policies and suggests that despite retaining communist ideals and "Chu'che" policies, North Korea has slowly started to modernise its energy sector and recognises the necessity to start engaging with the international community. While it is argued that Pyongyang's newfound concerns for sustainable development, equity and the environment are a welcomed departure from its usual belligerent rhetoric and present a number of exciting engagement opportunities, the regime has not abandoned its nuclear energy programme.
Resumo:
This article examines how the governance of justice and internal security in Scotland could be affected by the outcome of the Scottish independence referendum in September 2014. The article argues that it is currently impossible to equate a specific result in the referendum with a given outcome for the governance of justice and internal security in Scotland. This is because of the complexities of the current arrangements in that policy area and the existence of several changes that presently affect them and are outside the control of the government and of the people of Scotland. This article also identifies an important paradox. In the policy domain of justice and internal security, a ‘no’ vote could, in a specific set of circumstances, actually lead to more changes than a victory of the ‘yes’ camp.