25 resultados para legitimate autority


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growth of criminal gangs and organized crime groups has created unprecedented challenges in Central America. Homicide rates are among the highest in the world, countries spend on average close to 10 percent of GDP to respond to the challenges of public insecurity, and the security forces are frequently overwhelmed and at times coopted by the criminal groups they are increasingly tasked to counter. With some 90 percent of the 700 metric tons of cocaine trafficked from South America to the United States passing through Central America, the lure of aiding illegal traffickers through provision of arms, intelligence, or simply withholding or delaying the use of force is enormous. These conditions raise the question: to what extent are militaries in Central America compromised by illicit ties to criminal groups? The study focuses on three cases: Nicaragua, El Salvador, and Honduras. It finds that: Although illicit ties between the military and criminal groups have grown in the last decade, militaries in these countries are not yet “lost’ to criminal groups. Supplying criminal groups with light arms from military stocks is typical and on the rise, but still not common. In general the less exposed services, the navies and air forces, are the most reliable and effective ones in their roles in interdiction. Of the three countries in the study, the Honduran military is the most worrying because it is embedded in a context where civilian corruption is extremely common, state institutions are notoriously weak, and the political system remains polarized and lacks the popular legitimacy and political will needed to make necessary reforms. Overall, the armed forces in the three countries remain less compromised than civilian peers, particularly the police. However, in the worsening crime and insecurity context, there is a limited window of opportunity in which to introduce measures targeted toward the military, and such efforts can only succeed if opportunities for corruption in other sectors of the state, in particular in law enforcement and the justice system, are also addressed. Measures targeted toward the military should include: Enhanced material benefits and professional education opportunities that open doors for soldiers in promising legitimate careers once they leave military service. A clear system of rewards and punishments specifically designed to deter collusion with criminal groups. More effective securing of military arsenals. Skills and external oversight leveraged through combined operations, to build cooperation among those sectors of the military that have successful and clean records in countering criminal groups, and to expose weaker forces to effective best practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Context: With the increase in athletic training education programs, the demand for a highly qualified faculty member to serve as program director (PD) and fill the multiple roles and responsibilities of the position has increased. A successful PD must possess leadership skills crucial for the evolving academic environment. Research suggests that educational leaders must provide both transactional and transformational leadership if athletic trainers are to secure a legitimate place as healthcare providers. Objective: To describe the leadership styles and behaviors of athletic training education PDs and to describe the associations between leadership style, behavior, outcome, and experience. Design: We will utilize a survey design to identify the leadership styles, behaviors, outcomes, and experiences of athletic training education PDs. Setting: On-line questionnaire. Participants: The population of this study will be limited to the academic PDs of the 360 accredited entry-level athletic training education programs in the United States. Intervention: The investigation will utilize the Multifactor Leadership Questionnaire (MLQ). The MLQ is a validated tool composed of 45 items that identify and measure key leadership and effectiveness behaviors shown to be strongly linked with both individual and organizational success. In addition to the leader, it is recommended that all persons working above, below, and directly at the same organizational level as the leader rate the leader. Raters evaluate how frequently, or to what degree, they have observed the leader engage in 32 specific behaviors. Main Outcome Measure(s): Statistical analysis will be utilized to describe the associations between leadership styles, behaviors, outcomes, and experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation analyzes six twenty-first century novels that reflect Spain's current intellectual trends on the Spanish Civil War, Francoism and the transition to a democratic system. These novels deal with the complex correlation between memory and amnesia caused by the traumatic events of the Civil War. Despite the abundance of literature on this topic, these writers insist on the need for the recovery of historical and collective memory in order to halt the negative historical revisionism of recent years. Beginning with the death of Francisco Franco, this work focuses on the historical-theoretical framework that leads to the development of this mnemonic narrative and outlines the politics of memory effectuated during the transitional period, a lieu de mémoire frequently revisited and examined by new generations of writers. The novels analyzed also call for the retelling of history from the perspective of everyday people and address the need to pay overdue homage to victims of the post-war era.^ This work concludes that, while the texts may be considered settings for posthumous tributes, they could likewise advocate for a national reconciliation. Thus, as this narrative reveals, by focusing more on the need for a work on memory than on political and ideological polarizations, the memory of restitution does not interfere with the memory of reconciliation. The writers in question are nonetheless aware that reconciliation cannot be based on a spurious amnesia. The first step, therefore, towards reconciliation is to achieve a legitimate dialogue with regard to the traumatic past, and literary works may offer a tenable path. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Indigenous movements have become increasingly powerful in the last couple of decades and they are now important political actors in some South American countries, such as Bolivia, Ecuador, and, to a lesser extent, Peru and Chile. The rise of indigenous movements has provoked concern among U.S. policymakers and other observers who have feared that these movements will exacerbate ethnic polarization, undermine democracy, and jeopardize U.S. interests in the region. This paper argues that concern over the rise of indigenous movements is greatly exaggerated. It maintains that the rise of indigenous movements has not brought about a market increase in ethnic polarization in the region because most indigenous organizations have been ethnically inclusive and have eschewed violence. Although the indigenous movements have at times demonstrated a lack of regard for democratic institutions and procedures, they have also helped deepen democracy in the Andean region by promoting greater political inclusion and participation and by aggressively combating ethnic discrimination and inequality. Finally, this study suggests that the indigenous population has opposed some U.S. –sponsored initiatives, such as coca eradication and market reform, for legitimate reasons. Such policies have had some negative environmental, cultural, and economic consequences for indigenous people, which U.S. policymakers should try to address. The conclusion provides some specific policy recommendations on how to go about this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Colombia's increasingly effective efforts to mitigate the power of the FARC and other illegitimately armed groups in the country can offer important lessons for the Peruvian government as it strives to prevent a resurgence of Sendero Luminoso and other illegal non-state actors. Both countries share certain particular challenges: deep economic, social, and in the case of Peru ethnic divisions, the presence of and/or the effects of violent insurgencies, a large-scale narcotics production and trafficking, and a history of weak state presence in large tracts of isolated and scarcely-populated areas. Important differences exist, however in the nature of the insurgencies in the two countries, the government response to them and the nature of government and society that affects the applicability of Colombia's experience to Peru. The security threat to Panama from drug trafficking and Colombian insurgents --often a linked phenomenon-- are in many ways different from the drug/insurgent factor in Colombia itself and in Peru, although there are similar variables. Unlike the Colombian and Peruvian cases, the security threat in Panama is not directed against the state, there are no domestic elements seeking to overthrow the government -- as the case of the FARC and Sendero Luminoso, security problems have not spilled over from rural to urban areas in Panama, and there is no ideological component at play in driving the threat. Nor is drug cultivation a major factor in Panama as it is in Colombia and Peru. The key variable that is shared among all three cases is the threat of extra-state actors controlling remote rural areas or small towns where state presence is minimal. The central lesson learned from Colombia is the need to define and then address the key problem of a "sovereignity gap," lack of legitimate state presence in many part of the country. Colombia's success in broadening the presence of the national government between 2002 and the presence is owed to many factors, including an effective national strategy, improvements in the armed forces and police, political will on the part of government for a sustained effort, citizen buy-in to the national strategy, including the resolve of the elite to pay more in taxes to bring change about, and the adoption of a sequenced approach to consolidated development in conflicted areas. Control of territory and effective state presence improved citizen security, strengthened confidence in democracy and the legitimate state, promoted economic development, and helped mitigate the effect of illegal drugs. Peru can benefit from the Colombian experience especially in terms of the importance of legitimate state authority, improved institutions, gaining the support of local citizens, and furthering development to wean communities away from drugs. State coordinated "integration" efforts in Peru as practiced in Colombia have the potential for success if properly calibrated to Peruvian reality, coordinated within government, and provided with sufficient resources. Peru's traditionally weak political institutions and lack of public confidence in the state in many areas of the country must be overcome if this effort is to be successful.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2009, South American military spending reached a total of $51.8 billion, a fifty percent increased from 2000 expenditures. The five-year moving average of arms transfers to South America was 150 percent higher from 2005 to 2009 than figures for 2000 to 2004.[1] These figures and others have led some observers to conclude that Latin America is engaged in an arms race. Other reasons, however, account for Latin America’s large military expenditure. Among them: Several countries have undertaken long-prolonged modernization efforts, recently made possible by six years of consistent regional growth.[2] A generational shift is at hand. Armed Forces are beginning to shed the stigma and association with past dictatorial regimes.[3] Countries are pursuing specific individual strategies, rather than reacting to purchases made by neighbors. For example, Brazil wants to attain greater control of its Amazon rainforests and offshore territories, Colombia’s spending demonstrates a response to internal threats, and Chile is continuing a modernization process begun in the 1990s.[4] Concerns remain, however: Venezuela continues to demonstrate poor democratic governance and a lack of transparency; neighbor-state relations between Colombia and Venezuela, Peru and Chile, and Bolivia and Paraguay, must all continue to be monitored; and Brazil’s military purchases, although legitimate, will likely result in a large accumulation of equipment.[5] These concerns can be best addressed by strengthening and garnering greater participation in transparent procurement mechanism.[6] The United States can do its part by supporting Latin American efforts to embrace the transparency process. _________________ [1] Bromley, Mark, “An Arms Race in Our Hemisphere? Discussing the Trends and Implications of Military Expenditures in South America,” Brookings Institution Conference, Washington, D.C., June 3rd, 2010, Transcript Pgs. 12,13, and 16 [2] Robledo, Marcos, “The Rearmament Debate: A Chilean Perspective,” Power Point presentation, slide 18, 2010 Western Hemisphere Security Colloquium, Miami, Florida, May 25th-26th, 2010 [3] Yopo, Boris, “¿Carrera Armamentista en la Regiόn?” La Tercera, November 2nd, 2009, http://www.latercera.com/contenido/895_197084_9.shtml, accessed October 8th, 2010 [4] Walser, Ray, “An Arms Race in Our Hemisphere? Discussing the Trends and Implications of Military Expenditures in South America,” Brookings Institution Conference, Washington, D.C., June 3rd, 2010, Transcript Pgs. 49,50,53 and 54 [5] Ibid., Guevara, Iñigo, Pg. 22 [6] Ibid., Bromley, Mark, Pgs. 18 and 19

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern comprehensive high schools do not formally track students into different programs, but schools offer different curricular sequences with important and stratified consequences for students' post-secondary education. This study used qualitative methodology to examine how schools' organizational cultures influence the maintenance of tracking practices in four comprehensive high schools in Miami. The methodology included long-term participant observation in each of the four schools, unstructured and semi-structured interviews and the collection of written documents produced by the district. A framework based on the concepts of environment, mission,, information, strategy, and leadership was used to analyze the data. It was found that school cultures shared deeply held beliefs that regard ability as a fixed trait. This prevented schools from providing access to information about the consequences of course selection to the majority of the student body, with the exception of those students defined as "college bound." State and County level policies that reward achievement in standardized tests combined with school overcrowding, resulted in organizational cultures that favored the adoption of strategies stressing efficiency, as opposed to a challenging education for all students. Only one of the four schools in the study had a policy requiring students to attempt courses that were more challenging. The practice was resented by both teachers and counselors, since it was perceived as interfering with other goals of the institution, i.e.: graduating students in four years. The culture of the schools stressed college as the only legitimate post-secondary option; consequently, the majority of counselors did not encourage students-even those already defined as "not college material"-to consider other alternatives, such as vocational education. The elimination of formal tracks in these comprehensive high schools resulted in the school culture lacking a clear mission in regards to non-college bound students. Findings are discussed in relation to current theoretical explanations for educational policy and equality of opportunity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines what many scholars have neglected to investigate when addressing post Civil War issues in Lebanon. Most studies have addressed political issues surrounding activities of Shiite movements, such as Harakat Amal or Hizb Allah, while socioeconomic issues have been neglected. Imam Musa Sadr challenged the power of traditional Shiite leaders by creating official Shiites institutions and movements like Amal. The Iranian Revolution and the Israeli invasion of Lebanon in 1982 sparked the creation of Hizb Allah which, not only struggled against its foes, but also provided social services to the Shiites. This development program has been central in creating political legitimacy for Hizb Allah, regardless of its military situation, which suggests that socioeconomic development can transform a militia into a legitimate actor on the Lebanese political scene. The survivability of Shiite parties is therefore tantamount to not only their military might, but also to their social involvement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.