701 resultados para Political of security
Resumo:
The Finnish society developed rapidly in the 1960´s and 1970´s. This was result of international trends. Development of education, urbanization and wide organization of society increased discontent towards prevailing social structure and towards the power elite. Development of technology created possibility to present radical perspectives in mass media. This caused widely spread discussions dividing opinions. The purpose of this thesis was to complement research on national defence and the Finnish Defence Forces especially between years 1965 and 1975. The task of research was to clarify how changes in society and how the significance of this change was interpreted in public discussion about national defence and development of the Defence Forces. The most essential points for this thesis turned out to be discourses structured from public discussion. Main research material consisted of approximately 35000 news, editorials, articles and opinions presented in mass media supplemented by literature, committee reports and other archival sources. Frame of reference for this thesis is based on relativistic worldview. According to this, social reality is relative and there is no single truth. Environment has significant influence on the issue how knowledge and truth are formed. Data analysis was based on critical discourse. The key objective was to clarify the effects of broad changes in society using discursive methods. One essential goal was to form order of discourse using linguistic analysis and also connect discourses to wider sociocultural custom. On this thesis I came to the conclusion that on the review period there were five significant ensembles of discourse. They consisted of several discussions focused on different themes. The discourse of official security policy aimed to define national defence and the position of the Defence Forces as parts of foreign policy. Foreign policy is often perceived as the most significant part of security policy. Historical memory, geographical position of Finland and also the state contracts, changes in international warfare, tasks of the Defence Forces and increasing critic of national defence and the difference in thinking between generations formed the discourse of security policy. In the discourse of the liability to military service, the issue was about individual responsibility to society and national defence. Resisters and unarmed defence demands, encouraged by international examples were the themes. The discourse pointed out how mass media is used to influence and forced the Defence Forces to develop the practices in public information. The discourses of democracy and politics were closer to internal development of the Defence Forces to integrate more into society. The discourse of democracy focused in changing power relationships of the Defence Forces that were known as authoritarian. Issues like conscript and personnel union activity had lot of similarities to general social development. The discourse of politics presented how the Defence Forces were pushed towards parliamentary decision making. The personnel was granted the same rights as other population. Themes related to the discourse on the will to national defence were development of mental national defence, increasing education on national defence and creation of more open public information culture. According to discourses presented above I can state, that the position of the Defence Forces in society was changed between years 1965-1975. This change was advanced by the Defence Forces reformed attitude towards mass media and public information in general. Active participation in public information important became important instead of only answering topics. This positive development created an atmosphere, that was easier for the public to understand and create own pictures of the armed forces. Due to this, I can describe that the defenders and supporters of the armed forces were stuck in their trenches, until discussions presented in discourses and themes developed the Defence Forces to be better fitting part of society. Key words; society, national defence, Defence Forces, discourse, mass media, security policy, liability to military service, conscription, democracy
Resumo:
Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding through composite-order pairings led to a more efficient dual system IBE scheme using asymmetric pairings whose security is based on non-standard but static assumptions. In this work, we have systematically simplified Waters 2009 IBE scheme in the setting of asymmetric pairing. The simplifications retain tags used in the original description. This leads to several variants, the first one of which is based on standard assumptions and in comparison to Waters’ original scheme reduces ciphertexts and keys by two elements each. Going through several stages of simplifications, we finally obtain a simple scheme whose security can be based on two standard assumptions and a natural and minimal extension of the decision Diffie-Hellman problem for asymmetric pairing groups. The scheme itself is also minimal in the sense that apart from the tags, both encryption and key generation use exactly one randomiser each. This final scheme is more efficient than both the previous dual system IBE scheme in the asymmetric setting due to Lewko and Waters and the more recent dual system IBE scheme due to Lewko. We extend the IBE scheme to hierarchical IBE (HIBE) and broadcast encryption (BE) schemes. Both primitives are secure in their respective full models and have better efficiencies compared to previously known schemes offering the same level and type of security.
Resumo:
The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
Esta dissertação teve como objetivo acompanhar o crescimento da Policia Política no Brasil, articulando-a ao papel desempenhado pela Delegacia Especial de Segurança Política e Social DESPS no combate ao chamado Perigo Estrangeiro, conceito desenvolvido pelas agências de segurança durante o governo Getúlio Vargas, bem como pelas atividades de informação e contra-informação durante a Segunda Guerra Mundial.Para alcançar este objetivo acompanhamos as investigações desenvolvidas pela DESPS sobre a comunidade britânica na cidade do Rio de Janeiro, entre 1939 e 1942, baseando-me em documentos produzidos pela Policia Política durante o período relatórios, boletins, cartas e notas que se encontram sob a guarda do Arquivo Público do Estado do Rio de Janeiro, arrolados no fundo DOPS/DPPS.
Conselhos Comunitários de Segurança: a violência em diálogo políticas governamentais e suas práticas
Resumo:
Os conselhos comunitários de segurança pública do Rio de Janeiro representam uma mudança institucional na área das políticas públicas de segurança. Trata-se de um canal de abertura que permite a participação no plano local, caracterizado pela busca da instauração de diferentes padrões de interação entre governo e sociedade em torno do tema segurança. Baseado nas recentes análises acerca da sociedade civil, em que esta vem sendo tratada cada vez mais como instância aproximada da esfera governamental. O trabalho propõe expor uma análise político-social do conselho comunitário do bairro Méier e suas adjacências, localizados na Zona Norte do Rio de Janeiro. Esta região é conhecida pelos contrastes sociais e elevados índices de violência, por concentrar, de uma só vez, um comércio próspero, grande número de habitantes e diversas comunidades carentes dominadas pelo tráfico de drogas e de armas. A experiência deste conselho permite conhecer que a consolidação desta arena depende não só da presença de organizações e representantes sociais aptos a reivindicar múltiplos interesses, mas também do comprometimento do governo em reconhecer essas arenas como canais privilegiados na relação entre poder público e sociedade. O conselho caracteriza-se como uma ferramenta inovadora à medida que trata de um tema conflituoso como a segurança pública. Esta arena permite a aproximação entre comunidade e instituições historicamente fechadas como as polícias militar e civil. O exercício dos conselhos comunitários de segurança pública pode colaborar para o aprofundamento de uma democracia brasileira mais participativa e de um Estado mais poroso, na medida em que aposta no envolvimento de uma sociedade civil mais organizada e atuante, de um Poder Executivo e órgãos governamentais mais dispostos ao diálogo.
Resumo:
Booth, Ken, Critical Security Studies and World Politics (Boulder, CO: Lynne Rienner Publishers, 2005), pp.ix+321 RAE2008
Resumo:
Trabalho de Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para a obtenção do grau de Mestre em Cooperação Internacional e Desenvolvimento
Resumo:
The SafeWeb anonymizing system has been lauded by the press and loved by its users; self-described as "the most widely used online privacy service in the world," it served over 3,000,000 page views per day at its peak. SafeWeb was designed to defeat content blocking by firewalls and to defeat Web server attempts to identify users, all without degrading Web site behavior or requiring users to install specialized software. In this article we describe how these fundamentally incompatible requirements were realized in SafeWeb's architecture, resulting in spectacular failure modes under simple JavaScript attacks. These exploits allow adversaries to turn SafeWeb into a weapon against its users, inflicting more damage on them than would have been possible if they had never relied on SafeWeb technology. By bringing these problems to light, we hope to remind readers of the chasm that continues to separate popular and technical notions of security.
Resumo:
Study Objective: Work-place violence, harassment and abuse is an increasing feature of nurses’ experience of work in many countries. There is some evidence that the experience of workplace violence affects levels of job satisfaction (Hesketh et al 2003) and career decisions (e.g. Mayer et al 1999, Fernandes et al 1999). This paper reports on verbal and physical abuse by patients, relatives and carers, as well as racial and sexual harassment in Acute Hospitals in London and investigates whether workplace violence affects nurses’ intentions to leave either their current job or the nursing profession, controlling for a number of other factors that are known to affect career decisions, such as workload, pay and own health. Method: A questionnaire designed by two of the authors (Reeves and West) to assess many different aspects of nurses work life was used in a postal survey of nurses grades A to I practising in twenty London acute trusts in 2002. A total of 6,160 clinical nurses were mailed the questionnaires and 2,880 returned completed questionnaires, resulting in an overall response rate of 47%, discounting undelivered questionnaires. Respondents worked in a wide variety of clinical settings but mainly in acute medical and surgical wards. In addition to descriptive statistics, results were analysed using logistic regression with robust standard errors: the appropriate test when the dependent variable is dichotomous and the individual respondents clustered within units (nurses working within hospitals are not statistically independent). Results: Our results show high levels of racial (%), sexual (%) and other, unspecified forms of harassment (%), as well as verbal and physical abuse (14% had been physically assaulted with 5% being assaulted more than once), over the previous 6 months. A very small number (1%) reported experiencing all three forms of harassment; 12% two forms and 29% one form. Only 45% of this sample intended to stay in nursing for at least 3 years; 40% were undecided and 15% intended to leave. Logistic regression estimates showed that reported levels of abuse and harassment had a significant impact on respondents’ career intentions, even in models that controlled for known factors affecting career decisions. About 70% of our respondents reported that they had had too little training in dealing with aggressive behaviour—or none at all—but there was no statistical relationship between lack of training and reported assaults. Conclusions: The international shortage of health care workers is due at least in part to low retention rates. It is crucial to investigate nurses’ experiences of work to identify the factors that shape their career decisions. Workplace violence is increasingly acknowledged as an international, service-wide, health care problem. This paper adds to the literature that shows that workplace violence has an impact on nurses’ career decisions. The implications for managers and policy makers are that strengthening systems of security and providing nurses with training in interpersonal relationships including dealing with aggressive patients could slow nurse turnover.
Resumo:
The inaugural lecture of Professor Stephen Thomas at the University of Greenwich, 4th February 2010. It examines whether further pursuit of competition in energy markets and expansion in the role of nuclear power can be the main elements in a policy to meet goals of security, sustainability and affordability.
Resumo:
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).
Resumo:
Side-channel attacks (SCA) threaten electronic cryptographic devices and can be carried out by monitoring the physical characteristics of security circuits. Differential Power Analysis (DPA) is one the most widely studied side-channel attacks. Numerous countermeasure techniques, such as Random Delay Insertion (RDI), have been proposed to reduce the risk of DPA attacks against cryptographic devices. The RDI technique was first proposed for microprocessors but it was shown to be unsuccessful when implemented on smartcards as it was vulnerable to a variant of the DPA attack known as the Sliding-Window DPA attack.Previous research by the authors investigated the use of the RDI countermeasure for Field Programmable Gate Array (FPGA) based cryptographic devices. A split-RDI technique wasproposed to improve the security of the RDI countermeasure. A set of critical parameters wasalso proposed that could be utilized in the design stage to optimize a security algorithm designwith RDI in terms of area, speed and power. The authors also showed that RDI is an efficientcountermeasure technique on FPGA in comparison to other countermeasures.In this article, a new RDI logic design is proposed that can be used to cost-efficiently implementRDI on FPGA devices. Sliding-Window DPA and realignment attacks, which were shown to beeffective against RDI implemented on smartcard devices, are performed on the improved RDIFPGA implementation. We demonstrate that these attacks are unsuccessful and we also proposea realignment technique that can be used to demonstrate the weakness of RDI implementations.
Resumo:
A dynamic global security-aware synthesis flow using the SystemC language is presented. SystemC security models are first specified at the system or behavioural level using a library of SystemC behavioural descriptions which provide for the reuse and extension of security modules. At the core of the system is incorporated a global security-aware scheduling algorithm which allows for scheduling to a mixture of components of varying security level. The output from the scheduler is translated into annotated nets which are subsequently passed to allocation, optimisation and mapping tools for mapping into circuits. The synthesised circuits incorporate asynchronous secure power-balanced and fault-protected components. Results show that the approach offers robust implementations and efficient security/area trade-offs leading to significant improvements in turnover.
Resumo:
This article reviews ongoing work to increase awareness of, and raise standards in relation to, freedom of peaceful assembly across Europe, the South Caucasus, and Central Asia. The work is led by the Office of Democratic Institutions and Human Rights (ODIHR) at the Organisation of Security and Co-operation in Europe (OCSE). The article begins by highlighting the importance of freedom of peaceful assembly within democratic societies, and then describes the development of the ODIHR Guidelines on Peaceful Assembly. The article outlines some of the key issues of contention relating to the regulation of freedom of assembly, and discusses the process of reviewing the existing and draft legislation against the standards articulated in the Guidelines. In this context, the article also explores the potential for constructive engagement between government, civil society, and the OSCE to facilitate legislative amendments that respect key human rights norms and principles. Finally, the article reviews recent developments in training monitors of public assemblies with the aim of building local monitoring capacity and thus developing an evidence base of the practical implementation of laws relating to freedom of peaceful assembly. © The Author (2009). Published by Oxford University Press. All rights reserved.