863 resultados para Information security policy
Resumo:
This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.
Resumo:
In responding, IPH identify a number of potential health impacts including providing employment opportunities through farm diversification. Other issues include access to open space and housing located close to traditional focal points. The Institute of Public Health in Ireland (IPH) is an all-island body which aims to improve health in Ireland, by working to combat health inequalities and influence public policies in favour of health. IPH promotes co-operation in research, training, information and policy in order to contribute to policies which tackle inequalities in health. IPH is particularly interested in the Draft Planning Policy Statement 21 due to the impact on the countryside and potential implications on health for the population of Northern Ireland. IPH conducted a Health Impact Assessment on the proposed West Tyrone Area Plan 2019 and through this work has developed extensive knowledge when looking at health and rural issues.
Resumo:
The Institute of Public Health in Ireland is an all-island body which aims to improve health in Ireland by working to combat health inequalities and influence public policies in favour of health. The Institute promotes North-South co-operation in research, training, information and policy. The Institute commends the Department of Health and Children for producing the Discussion Paper on Proposed Health Information Bill (June 2008) and welcomes the opportunity to comment on it. The first objective of the Health Information: A National Strategy (2004) is to support the implementation of Quality and Fairness: A Health System for You (2001).The National Health Goals - such as ‘Better health for everyone’, ‘Fair access’ and ‘Responsive and appropriate care delivery’ - are expressed in terms of the health of the public as well as patients. The Discussion Paper focuses on personal information, and the data flows within the health system, that are needed to enhance medical care and maximise patient safety. The Institute believes that the Health Information Bill should also aim to more fully support the achievement of the National Health Goals and the public health function. This requires the development of more integrated information systems that link the healthcare sector and other sectors. Assessment of health services performance - in terms of the public’s health, health inequalities and achievement of the National Health Goals - require such information systems. They will enable the construction of public health key performance indicators for the healthcare services.
Resumo:
The Institute of Public Health in Ireland is an all-island body which aims to improve health in Ireland, by working to combat health inequalities and influence public policies in favour of health. The Institute promotes co-operation in research, training, information and policy in order to contribute to policies which tackle inequalities in health. He Institute houses the all-Ireland population health observatory, INIsPHO. The Institute has enjoyed good working relations with HIQA and welcomes the opportunity to submit its views for inclusion in HIQA’s forthcoming Corporate Plan. Our response highlights the inter-relatedness of the four Functions of HIQA. The Institute believes that HIQA’s first Corporate Plan should aim to develop all four Functions in a co-ordinated manner that recognizes and takes advantage of their inter-dependence. For example; the Health Information Function should include a strong focus on, but not be limited to, information requirements to support the delivery of the other three Functions. As well as gathering relevant information in a complementary way, these other Functions can help define priorities for the Health Information Function. This approach will have implications for the organizational structures and processes within HIQA, and the way it conducts its business.
Resumo:
The primary goal of this paper is to discuss how the leading position of Brazil in South America could contribute to boost security cooperation between the European Union and Mercosur. Both parties share common foreign and security policy concerns, including immigration, terrorism and drug trafficking. Through its great influence on the regional security agenda, Brazil could seek closer bilateral cooperation with Europe in tackling these global challenges, acting at the same time as a representative of regional interests.
Resumo:
Many political economic theories use and emphasize the process of votingin their explanation of the growth of Social Security, governmentspending, and other public policies. But is there an empirical connectionbetween democracy and Social Security program size or design? Using somenew international data sets to produce both country-panel econometricestimates as well as case studies of South American and southern Europeancountries, we find that Social Security policy varies according toeconomic and demographic factors, but that very different politicalhistories can result in the same Social Security policy. We find littlepartial effect of democracy on the size of Social Security budgets, onhow those budgets are allocated, or how economic and demographic factorsaffect Social Security. If there is any observed difference, democraciesspend a little less of their GDP on Social Security, grow their budgetsa bit more slowly, and cap their payroll tax more often, than doeconomically and demographically similar nondemocracies. Democracies andnondemocracies are equally likely to have benefit formulas inducingretirement and, conditional on GDP per capita, equally likely to induceretirement with a retirement test vs. an earnings test.
Resumo:
This paper provides a quantitative evaluation of the intra--cohortredistributive elements of the United States social security system in thecontext of a computable general equilibrium model. I determine how thewell--being of individuals that differ across {\sl gender, race} and {\sl education}is affected by government social security policy. I find that females, whitesand non--college graduates stand less to gain (lose) from reductions(increases) in the size of social security than males, non--whites andcollege graduates, respectively. Differences in mortality risk and laborproductivity translate into differences in the magnitudes of capitalaccumulation and labor supply distortions, that are responsible for theobserved welfare difference between types. Results imply that the currentprogram is lifetime progressive across gender and education, yet lifetimeregressive across race.
Resumo:
Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.
Resumo:
Peer-reviewed
Resumo:
Minna Karvosen esitys Europeana työpajassa 20.11.2012 Helsingissä.
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.