26 resultados para Herolf, Gunilla: Non-alignment and European security policy
em Aston University Research Archive
Resumo:
In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.
Resumo:
Extended Summary.
Resumo:
In this chapter we track emerging issues in public participation and involvement in European policymaking. We focus on the politics, legitimacy and accountability of different actors as well as exploring how European participation processes relate to globalization in general and global and regional governance in particular. Health policies tend to be understood as national or even local, yet they are often shaped and defined by regulatory decisions and policies that are determined globally and regionally.
Resumo:
This article examines how the governance of justice and internal security in Scotland could be affected by the outcome of the Scottish independence referendum in September 2014. The article argues that it is currently impossible to equate a specific result in the referendum with a given outcome for the governance of justice and internal security in Scotland. This is because of the complexities of the current arrangements in that policy area and the existence of several changes that presently affect them and are outside the control of the government and of the people of Scotland. This article also identifies an important paradox. In the policy domain of justice and internal security, a ‘no’ vote could, in a specific set of circumstances, actually lead to more changes than a victory of the ‘yes’ camp.
Resumo:
This paper examines the question of technology transfer from the perspective of techno-economic security and how companies respond to the possibility of losing competitive advantage through misappropriation or leakage. It explores transfers from Europe to China and addresses in particular the operations of Scandinavian companies within the context of the general picture for other European firms. Its point of departure is the authors' earlier research that looked at the motivations for transfer and the awareness of companies of techno-economic security issues. This has been supplemented by new data gathered by the authors from a number of Scandinavian companies in China. Specific actions have been identified and the ownership issue is introduced together with consideration of the role of the companies against the 'Ferdows' model. The analysis shows that the nature of the security question has changed together with the evolving context in which the companies are operating. In turn, the response of companies is contingent on a number of factors including the time horizon of the strategy for a unit in China and the nature of the strategy. It is also influenced by the form of ownership and management style in a particular organisation. © 2002 Elsevier Science Ltd. All rights reserved.
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
While the city offers the potential of dynamic agglomeration economies which can spur the achievement of economic growth and act as an engine that powers the economy, it often appears as a centre of crisis in mature ‘developed’ regions and countries, even before the most recent economic downturn. This paper attempts to reconcile these two seemingly paradoxical observations by bringing in a strategic choice perspective to explain how concentrated strategic decision making in the corporate entities that dominate our cities has diminished the very diversity that Jacobs identified as being essential for cities to flourish and develop. The industrial policy implications for cities are subsequently explored in terms of building new industrial districts, developing high skill ecosystems, and fostering multinational webs of cities, all with the aim of ensuring the conditions exist in cities for creativity and development to flourish, notably a diverse and democratic economic system.
Resumo:
By comparing the HRM practices in Indian and European MNE subsidiaries located in four of the Southern African Development Community countries, this paper tests the relevance of the country-of-origin effect and analyses the strength of institutional and firm-level influences. Examining data from 865 MNE subsidiaries obtained from the World Bank enterprise survey data, the paper finds that Indian MNEs have higher labour costs in relation to total sales than their European counterparts, that Indian MNEs make more use of temporary labour than their European counterparts, that Indian MNEs invest in less training than their European counterparts. No support is found for the hypothesis that Indian MNEs have a lower ratio of skilled workers in comparison to European-owned subsidiaries. The study shows that country-of-origin effects are weakened if they are not consistent with host country ideology and that as economies evolve so too do their expectations of HR policy and practices. © 2014 © 2014 Taylor & Francis.
Resumo:
The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.
Resumo:
This paper discusses critical findings from a two-year EU-funded research project involving four European countries: Austria, England, Slovenia and Romania. The project had two primary aims. The first of these was to develop a systematic procedure for assessing the balance between learning outcomes acquired in education and the specific needs of the labour market. The second aim was to develop and test a set of meta-level quality indicators aimed at evaluating the linkages between education and employment. The project was distinctive in that it combined different partners from Higher Education, Vocational Training, Industry and Quality Assurance. One of the key emergent themes identified in exploratory interviews was that employers and recent business graduates in all four countries want a well-rounded education which delivers a broad foundation of key business knowledge across the various disciplines. Both groups also identified the need for personal development in critical skills and competencies. Following the exploratory study, a questionnaire was designed to address five functional business areas, as well as a cluster of 8 business competencies. Within the survey, questions relating to the meta-level quality indicators assessed the impact of these learning outcomes on the workplace, in terms of the following: 1) value, 2) relevance and 3) graduate ability. This paper provides an overview of the study findings from a sample of 900 business graduates and employers. Two theoretical models are proposed as tools for predicting satisfaction with work performance and satisfaction with business education. The implications of the study findings for education, employment and European public policy are discussed.
Resumo:
Allergic eye disease encompasses a group of hypersensitivity disorders which primarily affect the conjunctiva and its prevalence is increasing. It is estimated to affect 8% of patients attending optometric practice but is poorly managed and rarely involves ophthalmic assessment. Seasonal allergic conjunctivitis (SAC) is the most common form of allergic eye disease (90%), followed by perennial allergic conjunctivitis (PAC; 5%). Both are type 1 IgE mediated hypersensitivity reactions where mast cells play an important role in pathophysiology. The signs and symptoms are similar but SAC occurs periodically whereas PAC occurs year round. Despite being a relatively mild condition, the effects on the quality of life can be profound and therefore they demand attention. Primary management of SAC and PAC involves avoidance strategies depending on the responsible allergen(s) to prevent the hypersensitivity reaction. Cooled tear supplements and cold compresses may help bring relief. Pharmacological agents may become necessary as it is not possible to completely avoid the allergen(s). There are a wide range of anti-allergic medications available, such as mast cell stabilisers, antihistamines and dual-action agents. Severe cases refractory to conventional treatment require anti-inflammatories, immunomodulators or immunotherapy. Additional qualifications are required to gain access to these medications, but entry-level optometrists must offer advice and supportive therapy. Based on current evidence, the efficacy of anti-allergic medications appears equivocal so prescribing should relate to patient preference, dosing and cost. More studies with standardised methodologies are necessary elicit the most effective anti-allergic medications but those with dual-actions are likely to be first line agents.
Resumo:
This paper discusses the use of the non-parametric free disposal hull (FDH) and the parametric multi-level model (MLM) as alternative methods for measuring pupil and school attainment where hierarchical structured data are available. Using robust FDH estimates, we show how to decompose the overall inefficiency of a unit (a pupil) into a unit specific and a higher level (a school) component. By a sample of entry and exit attainments of 3017 girls in British ordinary single sex schools, we test the robustness of the non-parametric and parametric estimates. Finally, the paper uses the traditional MLM model in a best practice framework so that pupil and school efficiencies can be computed.
Resumo:
State-owned enterprises in China have been given greater autonomy and responsibility, have freer access to foreign technology, and are being encouraged to form groups to gain from rationalization and integration. This article uses case studies to identify the key strategic issues that affect the commercial viability of foreign technology acquisition by state-owned enterprises within the context of enterprise reforms. All the case study enterprises used technology transfer to develop new or improved products. Technologies acquired as parts of subcontracting arrangements and well-established technologies to produce end-use products are easier to manage and operate profitably. However, the latter type of technology has been imported by numerous enterprises and has led to fierce competition and industy restructuring. Importing capital-intensive and complex technology to produce major components for products, such as cars, is more difficult and requires closer coordination with customers and suppliers.
Resumo:
This paper examines the impact on stock price predictability that the removal of exchange controls had on major European countries during the late 1970s and 1980s. It is found that for Germany, Switzerland and France, the removal of exchange controls led to an increase in the interdependence between these and other markets. In contrast, there is little evidence of an increase in interdependence for the UK and Italy.