866 resultados para (In)security feelings
Resumo:
Over the last decades the issue of insecurity due to an increase in crime rates and its possible impact on the stability of Latin American democracies has sparked an ongoing debate. In this context, the present article studies, for the case of Argentina, how experiences and sensations of insecurity may be articulated to demands for greater punitive rigor. The analysis is based on two types of information. Initially, data from international surveys such as Latinoabarometer are considered. Then, these are compared to data from prolonged on-site observations in a poor neighborhood of a mid-sized Argentine city. The combination of these different types of data shows the complexity of the process. Contrary to what is often assumed, experiences and sensations of insecurity do not lineally lead to demands for greater punitive rigor. The way in which social actors elaborate their experiences of insecurity is highly situational and not systematic. We have found that there is not necessarily a consistent process of ‘meaning construction’ that articulates experiences and sensations of insecurity with political demands.
Resumo:
We prove the existence of a competitive equilibrium for exchange economies with a measure space of agents and for which the commodity space is ` p, 1 < p < +∞. A vector x = (xn) in ` p may be interpreted as a security which promises to deliver xn units of numeraire at state (or date) n. Under assumptions imposing uniform bounds on marginal rates of substitution, positive results on core-Walras equivalence were established in Rustichini–Yannelis [21] and Podczeck [20]. In this paper we prove that under similar assumptions on marginal rates of substitution, the set of competitive equilibria (and thus the core) is non-empty.
Resumo:
Russian gas industry: The current condition of the gas industry is one of the most crucial factors influencing the Russian state·s functioning, internal situation and international position. Not only is gas the principal energy resource in Russia, it also subsidises other sectors of the economy. Status of the main European gas exporter strengthens also Russia's importance in the international arena. New regional in-security: Ten years have passed since the Central Asian states declared their independence, but their relationship with Russia still remains close, and the latter treats them as its exclusive zone of influence. A crucial reason for keeping Central Asia within the orbit of Moscow·s influence is the fact that Russia exercises control over the most important transport routes out of the region of raw materials for the power industry, on which the economic development of Asia depends on. But this is the only manifestation of Central Asia·s economic dependence on Russia. Moscow lacks solid economic instruments (i.e. investment input or power industry dependence) to shape the situation in the region. Caspian oil and gas: Caspian stocks of energy resources are not, and most probably will not be, of any great significance on the world scale. Nevertheless it is the Caspian region which will have the opportunity to become an oil exporter which will reduce the dependence of the European countries on Arabian oil, and which will guarantee Russia the quantities of gas which are indispensable both for meeting its internal demands and for maintaining its current level of export. For Azerbaijan, Kazakhstan and Turkmenistan, the confirmation of the existence of successive oil strata is not only an opportunity to increase income, but also an additional bargaining chip in the game for the future of the whole region. The stake in this game is the opportunity to limit the economic, and by extension the political influences of Russia in the region.
Resumo:
Range of leading stocks for eighteen years: p. 193-209.
Resumo:
Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.
Resumo:
This paper briefly reviews CMOS image sensor technology and its utilization in security and medical applications. The role and future trends of image sensors in each of the applications are discussed. To provide the reader deeper understanding of the technology aspects the paper concentrates on the selected applications such as surveillance, biometrics, capsule endoscopy and artificial retina. The reasons for concentrating on these applications are due to their importance in our daily life and because they present leading-edge applications for imaging systems research and development. In addition, review of image sensors implementation in these applications allows the reader to investigate image sensor technology from the technical and from other views as well.
Resumo:
In this paper we discuss how an innovative audio-visual project was adopted to foster active, rather than declarative learning, in critical International Relations (IR). First, we explore the aesthetic turn in IR, to contrast this with forms of representation that have dominated IR scholarship. Second, we describe how students were asked to record short audio or video projects to explore their own insights through aesthetic and non-written formats. Third, we explain how these projects are understood to be deeply embedded in social science methodologies. We cite our inspiration from applying a personal sociological imagination, as a way to counterbalance a ‘marketised’ slant in higher education, in a global economy where students are often encouraged to consume, rather than produce knowledge. Finally, we draw conclusions in terms of deeper forms of student engagement leading to new ways of thinking and presenting new skills and new connections between theory and practice.
Resumo:
O grooming online – aliciamento de crianças e jovens através da internet – tem sido alvo de preocupação e estudos a nível internacional. No entanto, o contexto português caracteriza-se pelo relativo desconhecimento sobre o fenómeno. O presente estudo tem como objetivos conhecer as experiências, perceções e inseguranças dos/as jovens acerca do grooming online, bem como revelar números de vitimação. Pretende-se, ainda, analisar as diferenças de género e etárias, quer ao nível da vitimação quer ao nível da perceção da gravidade do grooming online e do sentimento de insegurança relativamente ao fenómeno. Optou-se por um estudo exploratório de natureza quantitativa e os dados foram recolhidos através de um questionário construído para o efeito. A amostra foi constituída por 151 participantes, 76 (50,3%) do sexo masculino e 75 (49,7%) do sexo feminino. Os resultados encontrados neste estudo, nomeadamente uma percentagem de 20,5% de vitimação por grooming online, revelam uma realidade preocupante em Portugal, pelo que este fenómeno deve ser alvo de maior atenção e discussão no nosso país, inclusive através de modificações legislativas para que se possa atuar sobre o mesmo.
Resumo:
Multiobjective matrix games have been traditionally analyzed from two different points of view: equiibrium concepts and security strategies. This paper is based upon the idea that both players try to reach equilibrium points playing pairs of security strategies, as it happens in scalar matrix games. We show conditions guaranteeing the existence of equilibria in security strategies, named security equilibria
Resumo:
Multiobjective matrix games have been traditionally analyzed from two different points of view: equiibrium concepts and security strategies. This paper is based upon the idea that both players try to reach equilibrium points playing pairs of security strategies, as it happens in scalar matrix games. We show conditions guaranteeing the existence of equilibria in security strategies, named security equilibria
Resumo:
The ninth annual Suomenlinna seminar, organised by the Department of Strategic and Defence Studies, Finnish National Defence College, was held in May 2006. It brought together a representative group of specialists in security studies for two days of presentations and discussion about the most pressing issues of today – the challenges facing European Union’s crisis management in Africa.
Resumo:
Food Security has become an important issue in the international debate, particularly during the latest economic crisis. It relevant issue also for the Mediterranean Countries (MCs), particularly those of the southern shore, as they are is facing complex economic and social changes. On the one hand there is the necessity to satisfy the increasing and changing food demand of the growing population; on the other hand it is important to promote economic growth and adjust the agricultural production to food demand in a sustainable perspective. The assessment of food security conditions is a challenging task due to the multi-dimensional nature and complexity of the matter. Many papers in the scientific literature focus on the nutritional aspects of food security, while its economic issues have been addressed less frequently and only in recent times. Thus, the main objective of the research is to assess food (in)security conditions in the MCs. The study intends to identify and implement appropriate theoretical concepts and methodological tools to be used in the assessment of food security, with a particular emphasis on its economic dimension within MCs. The study follows a composite methodological approach, based on the identification and selection of a number of relevant variables, a refined set of indicators is identified by means of a two-step Principal Component Analysis applied to 90 countries and the PCA findings have been studied with particular attention to the MCs food security situation. The results of the study show that MCs have an higher economic development compared to low-income countries, however the economic and social disparities of this area show vulnerability to food (in)security, due to: dependency on food imports, lack of infrastructure and agriculture investment, climate condition and political stability and inefficiency. In conclusion, the main policy implications of food (in)security conditions in MCs are discussed.
Resumo:
Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.
Resumo:
The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.