894 resultados para private security military company
Resumo:
The paper reviews the provisions of the White Book on National Security of the Republic of Poland. It states that the issue of health security is not given adequate significance there. The accessibility of health services is considered, in general, solely in terms of their availability. The assumptions concerning the concept of providing the number of beds required in a state of threat to national security and in time of war do not take into account the current socio-economic conditions and need to be reviewed. The conclusions emphasize the dilemmas that emerge as a result of the unilateral promotion of a single category of national security, that is military security, in the context of ensuring health security.
Resumo:
This paper contests traditional analyses of high policing, suggesting that it needs to be decoupled (in theoretical terms) from its umbilical linkage to public actors and the preservation and augmentation of state authority. Arguing that conventional conceptualizations of high policing fail to acknowledge the role of private actors, we adopt the term `private high policing' to more accurately reflect the complexity of this paradigm. In particular, we note a long legacy of protecting dominant interests within corporate power structures, as well as increased involvement in outsourced security services for Western states. This has reached its zenith in the recent conflict/reconstruction efforts in Iraq. Eschewing conventional notions of the `proxy' debate, we propose a more complex relationship of obfuscation whereby both public and private high policing actors cross-permeate and coalesce in the pursuit of symbiotic state and corporate objectives.
Resumo:
The objective of this thesis was to determine whether the establishment and operation of an archives services by the Hudson's Bay Company had an effect on the company's ability to carry out document repairs. Data collection methods included reviews of published material, archival records of the Hudson's Bay Company, and semi-structured interviews. The study found that the Hudson's Bay Company's commitment to operating a modern archives service in accordance with accepted archive administration practices had a substantial effect on its ability to carry out document repairs. The principled approach to repair, as practiced by the Public Record Office, was a major influence. A review of secondary sources placed this development squarely within the context of archival developments in 20th century England. Overall, the thesis findings add to the growing conversation about conservation history in England, in particular, archive conservation history as it occurred outside of the Public Record Office in the 20th century, by discussing how some methods of repair that were devised, adopted and extended by the Public Record Office in the 19th and 20th centuries were adopted and applied in the 20th century by a well-established business corporation.
Resumo:
In this paper I examine the scope of publicly available information on the religious composition of employees in private-sector companies in Northern Ireland. I highlight the unavailability of certain types of monitoring data and the impact of data aggregation at company as opposed to site level. Both oversights lead to underestimates of the extent of workplace segregation in Northern Ireland. The ability to provide more-coherent data on workplace segregation, by religion, in Northern Ireland is crucial in terms of advancing equality and other social-justice agendas. I argue that a more-accurate monitoring of religious composition of workplaces is part of an overall need to develop a spatial approach in which the importance of ethnically territorialised spaces in the reproduction of ethnosectarian disputation is understood.
Resumo:
This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.
Resumo:
In 1924 the Cumann na nGaedheal government introduced the first Military Service Pensions Act to provide monetary compensation for those who fought for Irish independence between 1916 and 1923. Pensioners who were in receipt of remuneration from the state as civil and public servants had a portion of their pension deducted commensurate with their state income. This controversial provision was criticised by all political parties as representing a mean-spirited attitude towards veterans of the independence campaign and treating civil and public servants differently from those in private employment. It was eventually modified in the 1940s and abolished in the 1950s. This article provides a case study that highlights the parsimonious attitude of Irish governments towards veterans of the independence campaign and shows how the treatment of public and civil servants reflected tensions between the government and the civil service in the early years of the state.
Resumo:
The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.
Resumo:
This paper presents a multimodal analysis of online self-representations of the Elite Squad of the military police of Rio de Janeiro, the Special Police Operations Battalion BOPE. The analysis is placed within the wider context of a “new military urbanism”, which is evidenced in the ongoing “Pacification” of many of the city’s favelas, in which BOPE plays an active interventionist as well as a symbolic role, and is a kind of solution which clearly fails to address the root causes of violence which lie in poverty and social inequality. The paper first provides a sociocultural account of BOPE’s role in Rio’s public security and then looks at some of the mainly visual mediated discourses the Squad employs in constructing a public image of itself as a modern and efficient, yet at the same time “magical” police force.
Resumo:
Even before the Russian air force launched its first strikes over Syria, there was already a Russian presence on the battleground. These were not the spetsnaz, Kremlin’s special forces, but war correspondents from the leading Russian media outlets. This was as clear a sign as any that the Russia’s priority has shifted from Ukraine, where these reporters spent most of the past 18 months, to Syria.
There is, however, no unanimity on Russia’s latest escalation in Syria. As Russian state TV stations report successes of Russia’s high-precision weapons projecting an image of a high-tech Russian military equal to the US, doubts persist about the latest adventure in the Middle East.
Resumo:
Attitudes towards a regional military force are of paramount importance when exploring public support for regional integration. Until now, however, scholarly research has not considered the influence of attitudes towards a regional military mechanism in the sub-Saharan African context. Using Afrobarometer data, we demonstrate that military concerns are vital when exploring Tanzanian attitudes towards the proposed political federation of the East African Community (EAC), the East African Federation (EAF). More specifically, opposition to military cooperation strongly influences Tanzanian scepticism of the EAF. This finding is highly relevant given that referendums in the participating member states must be passed to facilitate political integration. Heightened opposition towards military cooperation raises the possibility of the public rejecting a politically integrated EAC. This poses a potential obstacle to the implementation of joint security policies and crucial mechanisms to provide a more stable region at large. We account for alternative explanations of Tanzanian opinion formation and reflect on the strength of military-orientated concerns for investigating public support for the East African project specifically and regional integration in sub-Saharan Africa more widely.
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
Resumo:
COMTEMP – Companhia de Temperos, Lda. is a Portuguese company that produces vinegars (e.g. CRISTAL vinegars), sauces and condiments. This case study aims to analyze its attractiveness to receive a venture capital investment. The main covered topics are arranged into the following sections: foundation, company, industry, competition, industrial kitchen opportunity, financial strategy and decision.