906 resultados para Security Measures.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

With a growing number of threats to governance in the international system that result from globalization and technological innovation, it is no surprise that states have come to rely more heavily on each other and the global community for support. While the EU is partially constrained by the ultimate outcome of its own integration process, limited knowledge on this issue, and the national interests of its Member States, other governments are also experiencing difficulty in domestic implementation of international resolutions. To better understand the impact of the most recent sanctioning efforts, this paper will explore the development of the non-proliferation regime, examine implementation mechanisms of non-proliferation agreements, and analyze the impact of increased cooperation among states to thwart the spread of WMD technology and material. Case studies of unilateral measures undertaken by the US and EU against Iran will provide insight into the political and economic implications of economic sanctions from individual governments. New and emerging methods for limiting rogue states and non-state actors from acquiring the means to develop WMD will also be discussed in an effort to further discussion for future policy debates on this critical topic.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper offers an academic examination of the legal regimes surrounding the criminalisation of irregular migrants in the EU and of acts of solidarity with irregular migrants, such as assisting irregular migrants to enter or remain in the EU, and other behaviour that is motivated by humanitarian instincts. The research analyses EU law and its relationship with national provisions regarding the criminalisation of irregular migration and of acts of solidarity vis-á-vis irregular migrants. A comparative analysis was made of the laws of the UK, France and Italy, supplemented by an analysis of the laws of Germany, the Netherlands and Spain. By considering the role of public trust in fostering compliance with the law, the paper explores the impact of criminalisation measures on institutions’ authority to compel individuals to comply with the law (institutional legitimacy). The study finds that certain indicators question institutional legitimacy and reveals the varied nature and extent of penalties imposed by different member states. The paper concludes that there is an important role for public trust in immigration law compliance, not just in measures directed towards irregular migrants but also towards those acting in solidarity with irregular migrants.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the main EU-level initiatives that have been put forward in the weeks following the attacks in Paris in January 2015, which will be discussed in the informal European Council meeting of 12 February 2015. It argues that a majority of these proposals predated the Paris shootings and had until that point proved contentious as regards their efficacy, legitimacy and lawfulness. The paper finds that EU counterterrorism responses raise two fundamental challenges: A first challenge is posed to the freedom of movement, Schengen and EU citizenship. Priority is being given to the expanded use of large-scale surveillance and systematic monitoring of all travellers including EU citizens, which stands in contravention of Schengen and the free movement principle. A second challenge concerns EU democratic rule of law. Current pressures calling for the adoption of measures such as the EU Passenger Name Record challenge the scrutiny roles held by the European Parliament and the Court of Justice of the EU on counterterrorism measures in a post-Lisbon Treaty setting. The paper proposes that the EU adopts a new European Agenda on Security and Liberty based on an EU security (criminal justice-led) cooperation model that is firmly anchored in current EU legal principles and rule of law standards. This model would call for ‘less is more’ concerning the use, processing and retention of data by police and intelligence communities. Instead, it would pursue better and more accurate use of data meeting the quality standards of evidence in criminal judicial proceedings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this Security Policy Brief Jo Coelmont examines the challenges Belgium is facing at present. On the one hand there is the declared political objective to henceforth provide its defence forces with the means of achieving all of its tasks and, furthermore, to develop a new Strategic Plan, while taking decisions on replacing its current fleet of F16 fighter aircraft and determine strategic orientations on the replacement of frigates, mine hunter vessels and other major equipment programmes. On the other hand, the already taken austerity measures impose severe structural cuts on its defence budget for the upcoming five years. In this context the author is proposing some « dos and don’ts«.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the EU’s counter-terrorism policies responding to the Paris attacks of 13 November 2015. It argues that these events call for a re-think of the current information-sharing and preventive-justice model guiding the EU’s counter-terrorism tools, along with security agencies such as Europol and Eurojust. Priority should be given to independently evaluating ‘what has worked’ and ‘what has not’ when it comes to police and criminal justice cooperation in the Union. Current EU counter-terrorism policies face two challenges: one is related to their efficiency and other concerns their legality. ‘More data’ without the necessary human resources, more effective cross-border operational cooperation and more trust between the law enforcement authorities of EU member states is not an efficient policy response. Large-scale surveillance and preventive justice techniques are also incompatible with the legal and judicial standards developed by the Court of Justice of the EU. The EU can bring further added value first, by boosting traditional policing and criminal justice cooperation to fight terrorism; second, by re-directing EU agencies’ competences towards more coordination and support in cross-border operational cooperation and joint investigations, subject to greater accountability checks (Europol and Eurojust +); and third, by improving the use of policy measures following a criminal justice-led cooperation model focused on improving cross-border joint investigations and the use of information that meets the quality standards of ‘evidence’ in criminal judicial proceedings. Any EU and national counter-terrorism policies must not undermine democratic rule of law, fundamental rights or the EU’s founding constitutional principles, such as the free movement of persons and the Schengen system. Otherwise, these policies will defeat their purpose by generating more insecurity, instability, mistrust and legal uncertainty for all.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Baltic states have responded to the annexation of Crimea and the increased Russian military activity in the Nordic and Baltic region by taking measures to strengthen their own military potential. At the same time, they have intensified efforts to have the USA and NATO step up their military presence on their respective territories. Changes concerning the security policies and the armed forces of Lithuania, Latvia and Estonia have included increases in defence spending, the number of soldiers and members of volunteer Territorial Defence Forces, speeding up modernisation programmes, and – in the case of Lithuania – the reintroduction of conscription. In the coming years the Baltic states will focus on developing those of their military capabilities directly related to the defence of the country’s territory. However, Lithuania, Latvia and Estonia will not stop participating in the foreign missions of NATO, which is the guarantor of their security. The extent to which these plans can be implemented will depend primarily on the economic and demographic situations of Lithuania, Latvia and Estonia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

How can we reinforce internal security without destroying basic freedoms? This dilemma will become increasingly topical in the context of rising terrorist threats and in view of some of the responses already put in place at the national level. Many observers have pointed out the threat that these measures pose to individual freedom. But few have highlighted their relative inefficiency. Indeed, if the right to security is one of the founding reasons for political government and one of its main sources of legitimacy, can states still guarantee this basic right? This article examines this dilemma and focuses more specifically on its implications for the notion and practice of sovereignty. It also sketches a strong, but nuanced, rescue of sovereignty at the European level in order to assure individual security while, at the same time, protecting our freedoms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite reports that adopted persons are destined for poor psychological and relational adjustment, this conclusion remains controversial. Previous research on this topic has been inconclusive, and has failed to provide a complex assessment of the predictors of adjustment. For instance, whether attachment security plays a key role in later relationship outcomes remains unresolved. This paper presents the results of a longitudinal study of adults who were adopted as infants, and a comparison sample of adults who grew up with both biological parents. Two research questions were addressed: differences in attachment security between the two samples, and the predictive relations between initial attachment scales and relationship variables (e.g., risk in intimacy, loneliness) assessed at follow-up. Attachment profiles at Time 1 indicated less security in the adopted sample than the comparison sample, and these differences were maintained at follow-up. However, adoptees who had not searched for birth relatives did not differ from the comparison sample. Although sample (adopted / comparison) was an important predictor of some relationship variables, it became less influential when attachment measures were included. Discussion focused on the complex factors that influence attachment security, and the need for in-depth study of the relational experiences of adopted people.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Danish companies are especially prevalent in China where they have found opportunities to exploit their niche position in a number of specialised product areas. As a result, their operations are often well advanced in terms of the levels of technology transferred and the extent of transfer. Transferring technology brings with it risks as well as benefits. Its absorption and dissemination can, in the longer term, bring about new competitors unless measures are taken to prevent leakage of know-how or the technology supplier can stay ahead of the technological race. This paper draws on data from three Danish case companies that are transferring technology to China. The cases are examined within a framework that allows the identification of the companies’ motivations for transfer against their awareness of the techno-economic security issues. In this way it is possible to highlight the strategic and operational approaches that can be taken to obviate the risks involved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Organized crime and illegal economies generate multiple threats to states and societies. But although the negative effects of high levels of pervasive street and organized crime on human security are clear, the relationships between human security, crime, illicit economies, and law enforcement are highly complex. By sponsoring illicit economies in areas of state weakness where legal economic opportunities and public goods are seriously lacking, both belligerent and criminal groups frequently enhance some elements of human security of the marginalized populations who depend on illicit economies for basic livelihoods. Even criminal groups without a political ideology often have an important political impact on the lives of communities and on their allegiance to the State. Criminal groups also have political agendas. Both belligerent and criminal groups can develop political capital through their sponsorship of illicit economies. The extent of their political capital is dependent on several factors. Efforts to defeat belligerent groups by decreasing their financial flows through suppression of an illicit economy are rarely effective. Such measures, in turn, increase the political capital of anti-State groups. The effectiveness of anti-money laundering measures (AML) also remains low and is often highly contingent on specific vulnerabilities of the target. The design of AML measures has other effects, such as on the size of a country’s informal economy. Multifaceted anti-crime strategies that combine law enforcement approaches with targeted socio-economic policies and efforts to improve public goods provision, including access to justice, are likely to be more effective in suppressing crime than tough nailed-fist approaches. For anti-crime policies to be effective, they often require a substantial, but politically-difficult concentration of resources in target areas. In the absence of effective law enforcement capacity, legalization and decriminalization policies of illicit economies are unlikely on their own to substantially reduce levels of criminality or to eliminate organized crime. Effective police reform, for several decades largely elusive in Latin America, is one of the most urgently needed policy reforms in the region. Such efforts need to be coupled with fundamental judicial and correctional systems reforms. Yet, regional approaches cannot obliterate the so-called balloon effect. If demand persists, even under intense law enforcement pressures, illicit economies will relocate to areas of weakest law enforcement, but they will not be eliminated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent studies on the economic status of women in Miami-Dade County (MDC) reveal an alarming rate of economic insecurity and significant obstacles for women to achieve economic security. Consistent barriers to women's economic security affect not only the health and wellbeing of women and their families, but also economic prospects for the community. A key study reveals in Miami-Dade County, "Thirty-nine percent of single female-headed families with at least one child are living at or below the federal poverty level" and "over half of working women do not earn adequate income to cover their basic necessities" (Brion 2009, 1). Moreover, conventional measures of poverty do not adequately capture women's struggles to support themselves and their families, nor do they document the numbers of women seeking basic self-sufficiency. Even though there is lack of accurate data on women in the county, which is a critical problem, there is also a dearth of social science research on existing efforts to enhance women's economic security in Miami-Dade County. My research contributes to closing the information gap by examining the characteristics and strategies of women-led community development organizations (CDOs) in MDC, working to address women's economic insecurity. The research is informed by a framework developed by Marilyn Gittell, who pioneered an approach to study women-led CDOs in the United States. On the basis of research in nine U.S. cities, she concluded that women-led groups increased community participation and "by creating community networks and civic action, they represent a model for community development efforts" (Gittell, et al. 2000, 123). My study documents the strategies and networks of women-led CDOs in MDC that prioritize women's economic security. Their strategies are especially important during these times of economic recession and government reductions in funding towards social services. The focus of the research is women-led CDOs that work to improve social services access, economic opportunity, civic participation and capacity, and women's rights. Although many women-led CDOs prioritize building social infrastructures that promote change, inequalities in economic and political status for women without economic security remain a challenge (Young 2004). My research supports previous studies by Gittell, et al., finding that women-led CDOs in Miami-Dade County have key characteristics of a model of community development efforts that use networking and collaboration to strengthen their broad, integrated approach. The resulting community partnerships, coupled with participation by constituents in the development process, build a foundation to influence policy decisions for social change. In addition, my findings show that women-led CDOs in Miami-Dade County have a major focus on alleviating poverty and economic insecurity, particularly that of women. Finally, it was found that a majority of the five organizations network transnationally, using lessons learned to inform their work of expanding the agency of their constituents and placing the economic empowerment of women as central in the process of family and community development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We analyze democratic equity in council voting games (CVGs). In a CVG, a voting body containing all members delegates decision-making to a (time-varying) subset of its members, as describes, e.g., the relationship between the United Nations General Assembly and the United Nations Security Council (UNSC). We develop a theoretical framework for analyzing democratic equitability in CVGs at both the country and region levels, and for different assumptions regarding preference correlation. We apply the framework to evaluate the equitability of the UNSC, and the claims of those who seek to reform it. We find that the individual permanent members are overrepresented by between 21.3 times (United Kingdom) and 3.8 times (China) from a country-level perspective, while from a region perspective Eastern Europe is the most heavily overrepresented region with more than twice its equitable representation, and Africa the most heavily underrepresented. Our equity measures do not preclude some UNSC members from exercising veto rights, however.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and restrictions would not be accepted by them. On the contrary, companies are obliged to employ substantial organizational and technical measures to ensure data security and compliance when allowing to use mobile devices at the workplace. So far, only individual arrangements have been presented addressing single issues in ensuring data security and compliance. However, companies need to follow a comprehensive set of measures addressing all relevant aspects of data security and compliance in order to play it safe. Thus, in this paper at first technical architectures for using mobile devices in enterprise IT are reviewed. Thereafter a set of compliance rules is presented and, as major contribution, technical measures are explained that enable a company to integrate mobile devices into enterprise IT while still complying with these rules comprehensively. Depending on the company context, one or more of the technical architectures have to be chosen impacting the specific technical measures for compliance as elaborated in this paper. Altogether this paper, for the first time, correlates technical architectures for using mobile devices at the workplace with technical measures to assure data security and compliance according to a comprehensive set of rules.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.