982 resultados para Security community
Resumo:
Descriptions of vegetation communities are often based on vague semantic terms describing species presence and dominance. For this reason, some researchers advocate the use of fuzzy sets in the statistical classification of plant species data into communities. In this study, spatially referenced vegetation abundance values collected from Greek phrygana were analysed by ordination (DECORANA), and classified on the resulting axes using fuzzy c-means to yield a point data-set representing local memberships in characteristic plant communities. The fuzzy clusters matched vegetation communities noted in the field, which tended to grade into one another, rather than occupying discrete patches. The fuzzy set representation of the community exploited the strengths of detrended correspondence analysis while retaining richer information than a TWINSPAN classification of the same data. Thus, in the absence of phytosociological benchmarks, meaningful and manageable habitat information could be derived from complex, multivariate species data. We also analysed the influence of the reliability of different surveyors' field observations by multiple sampling at a selected sample location. We show that the impact of surveyor error was more severe in the Boolean than the fuzzy classification. © 2007 Springer.
Resumo:
Over the past two decades, the Democratic People's Republic of Korea has allegedly developed nuclear energy while suffering near collapse caused by catastrophic economic policies. This article presents an evaluation of North Korea's contemporary energy policies and suggests that despite retaining communist ideals and "Chu'che" policies, North Korea has slowly started to modernise its energy sector and recognises the necessity to start engaging with the international community. While it is argued that Pyongyang's newfound concerns for sustainable development, equity and the environment are a welcomed departure from its usual belligerent rhetoric and present a number of exciting engagement opportunities, the regime has not abandoned its nuclear energy programme.
Resumo:
The purpose of this dissertation was to investigate cross-cultural differences in the use of the Internet. Hofstede's model of national culture was employed as the theoretical foundation for the analysis of cross-cultural differences. Davis's technology acceptance model was employed as the theoretical foundation for the analysis of Internet use. ^ Secondary data from an on-line survey of Internet users in 22 countries conducted in April 1997 by the Georgia Tech Research Corporation measured the dependent variables of Internet use and the independent variables of attitudes toward technology. Hofstede's stream of research measured the independent variables of the five dimensions of national culture. ^ Contrary to expectations, regression analyses at the country level of analysis did not detect cultural differences. As expected, regression analyses at the individual level of analysis did detect cultural differences. The results indicated that perceived usefulness was related to the frequency of Internet shopping in the Germanic and Anglo clusters, where masculinity was high. Perceived ease of use was related to the frequency of Internet shopping in the Latin cluster, where uncertainty avoidance was high. Neither perceived usefulness nor perceived ease of use was related to the frequency of Internet shopping in the Nordic cluster, where masculinity and uncertainty avoidance were low. ^ As expected, analysis of variance at the cluster level of analysis indicated that censorship was a greater concern in Germany and Anglo countries, where masculinity was high. Government regulation of the Internet was less preferred in Germany, where power distance was low. Contrary to expectations, concern for transaction security. was lower in the Latin cluster, where uncertainty avoidance was high. Concern for privacy issues was lower in the U.S., where individualism was high. ^ In conclusion, results suggested that Internet users represented a multicultural community, not a standardized virtual community. Based on the findings, specific guidance was provided on how international managers and marketers could develop culturally sensitive strategies for training and promoting Internet services. ^
Resumo:
The primary research question was: What is the nature and degree of alignment between the tenets of learning organizations and the policies and practices of a community college concerning adjunct instructors? I investigated the employment experiences of 8 adjunct instructors at a large community college in the Southeastern U.S. to (a) describe and explain the perspectives of the adjuncts, (b) describe and explain my own adjunct employment experience at the same college, (c) determine how the adjunct policies and practices collectively encountered were congruent with or at variance with the tenets of learning organizations, and (d) to use this framework to support recommendations that may help the college achieve more favorable alignment with these tenets. ^ Data on perceived adjunct policies and practices were reduced into 11 categories and, using matrices, were compared with 5 major categories of learning organization tenets. The 5 categories of tenets were: (a) inputs, (b) information flow/communication, (c) employee inclusion/value, (d) teamwork, and (e) facilitation of change. The 11 categories of the college's policies and practices were (a) becoming an adjunct, (b) full-time employment aspirations, (c) salary, (d) benefits, (e) job security and predictability, (f) job satisfaction, (g) respect, (h) support services, (i) professional development, (j) institutional inclusion, and (k) future role of adjuncts. The reflective journal component relied on a 5-year (1995–2000) personal and professional journal maintained by me during employment with the same college as the participants. ^ Findings indicate that the college's adjunct policies and practices were most incongruent with 25 of the 70 learning organization tenets. These incongruencies spanned the 5 categories, although most occurred in the Employee/Inclusion/Value category. Adjunct instructors wanted inclusion, respect, value, trust, and empowerment in decision making processes that affect adjunct policies and practices of the college, but did not perceive this to be a part of the present situation. ^
Resumo:
This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^
Resumo:
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these "focusing events" (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas. ^ This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these "focusing events." In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS). ^ To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996–2011. It is the pattern of interconnections that occur over time that are the focus of this study. ^ The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters.^
Resumo:
Exclusive Fishing Zones (EFZs) are a type of place-based management tool often used to mitigate conflicts between fishing sectors by granting fishing rights to one of the sectors. This case study enhances our knowledge of the pre- and post-implementation processes associated with EFZs as well as its consequences for fish stocks and artisanal fishers and their families. The study draws upon interviews with artisanal fishers and key informants related to an EFZ established in 2008 in Colombia (the Chocó-EFZ). The findings of this research indicate that conflicts at sea and on land between artisanal and industrial fisheries triggered the Chocó-EFZ process. Results also show some potential benefits of the Chocó-EFZ including: a) mitigating conflicts between artisanal fishers and industrial shrimpers; b) contributing to the food security of artisanal fishing households and sustaining local fish stocks; c) supporting an existing informal community-based management as well as promoting the development of a co-management regime. Potential negative effects of the Chocó-EFZ include: a) displacement of industrial fishing effort and, b) job loss within the industrial shrimp industry. The findings of this research also indicate that there are multiple factors that jeopardize the effectiveness and continuation of the Chocó-EFZ, some of which include diversity of fisheries, power struggles among stakeholders, and disagreement about exclusive access to fish resources.
Resumo:
The authors thank M. C. Romano, I. Stansfield, L. Ciandrini, A. Kort, and M. Rehberg for helpful discussions. This work was funded by BBSRC grants BB/F00513/X1 and BB/G010722, and the Scottish Universities Life Science Alliance (SULSA).
Resumo:
The authors thank M. C. Romano, I. Stansfield, L. Ciandrini, A. Kort, and M. Rehberg for helpful discussions. This work was funded by BBSRC grants BB/F00513/X1 and BB/G010722, and the Scottish Universities Life Science Alliance (SULSA).
Resumo:
The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.
Resumo:
This article considers the opportunities of civilians to peacefully resist violent conflicts or civil wars. The argument developed here is based on a field-based research on the peace community San José de Apartadó in Colombia. The analytical and theoretical framework, which delimits the use of the term ‘resistance’ in this article, builds on the conceptual considerations of Hollander and Einwohner (2004) and on the theoretical concept of ‘rightful resistance’ developed by O’Brien (1996). Beginning with a conflict-analytical classification of the case study, we will describe the long-term socio-historical processes and the organizational experiences of the civilian population, which favoured the emergence of this resistance initiative. The analytical approach to the dimensions and aims of the resistance of this peace community leads to the differentiation of O`Brian’s concept of ‘rightful resistance’.
Resumo:
The proliferation of weapons of mass destruction (WMD), nuclear, biological and chemical (NBC) is one of the main security challenges facing the international community today. However the new Global Security Strategy of 2016 raises the question of non-proliferation of WMD only as an incidental matter, not addressing directly the threat, a fundamental threat in the regional and global security. This is a clear step backwards for the European common security.
Resumo:
In the face of mass human rights violations and constant threats to security, there is growing recognition of the resilience of people and communities. This paper builds on such work by investigating the effects of individual coping strategies, perceived community cohesion, and their interaction on mental health symptoms in Colombia. The study was conducted five years after the mass demobilisation of the former paramilitaries and takes an exploratory quantitative approach to identify two distinct forms of coping approaches among participants living in the Caribbean coast of Colombia. A constructive coping approach included active engagement, planning behaviours, emotional support, acceptance and positive reframing of daily stressors. A destructive coping approach in this study entailed denial of problems, substance use and behavioural disengagement from day-to-day stress. In addition, the strength of perceived community cohesion, or how close-knit and effective the individuals feel about the community in which they live, was examined. Structural equation modelling revealed that a constructive coping approach was significantly related to lower depression, while a destructive coping approach predicted more symptoms of depression. Although there was not a significant direct effect of perceived community cohesion on mental health outcomes, it did enhance the effect of constructive coping strategies at the trend level. That is, individuals who used constructive coping strategies and perceived their communities to be more cohesive, reported fewer depression symptoms than those who lived in less cohesive settings. Implications for promoting constructive coping strategies, as well as fostering cohesion in the community, are discussed.
Resumo:
The intention of this article is to provide a structural and operational analysis of policing beyond the police in Northern Ireland. While the polity enjoys low levels of ‘officially’ recorded crime as part of its post-conflict status, little empirical analysis exists as to the epistemological roots of security production outside that of the Police Service of Northern Ireland. The empirical evidence presented seeks to establish that beyond more prominent analyses related to paramilitary ‘policing’, the country is in fact replete with a substantial reservoir of legitimate civil society policing – the collective mass of which contributes to policing, community safety and quality of life issues. While such non-state policing at the level of locale was recognised by the Independent Commission for Policing, structured understandings have rarely permeated governmental or academic discourse beyond anecdotal contentions. Thus, the present argument provides an empirical assessment of the complex, non-state policing landscape beyond the formal state apparatus; examines definitions and structures of such community-based policing activities; and explores issues related to co-opting this non-state security ‘otherness’ into more formal relations with the state.