190 resultados para DETERRENCE
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Item 1034-A, 1034-B (MF).
Resumo:
The Bush administration's continuing emphasis on US military deterrence of the PRC on behalf of Taiwan threatens to undermine the posture of 'strategic ambiguity' that the United States has proclaimed since 1979. This article argues for the retention of 'strategic ambiguity' and traces the origins of revisionist sentiment towards this effective conflict avoidance mechanism to reactions within the US foreign policy community to the 1995-96 Taiwan Strait crisis. Case studies of this crisis and its predecessors in 1954-55 and 1958 demonstrate that US military deterrence was not a decisive factor in their resolution. US and PRC initiatives and responses in the 1950s crises introduced the essential elements of 'strategic ambiguity' into the triangular relationship between themselves and Taiwan. In particular, they established a precedent for the United States and the PRC in circumscribing the issue of Taiwan so as to achieve a political accommodation.
Resumo:
Concern remains regarding the efficacy of legal sanctions to reduce drink driving behaviours among repeat offenders. The present study examined the impact of traditional legal sanctions (e.g., fines and licence disqualification periods), nonlegal sanctions, alcohol consumption and the frequency of recent offending behaviour(s) on intentions to re-offend for a group of recidivist drink drivers (N=166). The analysis indicated that participants perceived legal sanctions to be severe, but not entirely certain nor swift. In addition, self-reported recent drink driving behaviours and alcohol consumption levels were identified as predictors of future intentions to drink and drive. The findings of the study confirm the popular assumption that some repeat offenders are impervious to the threat and application of legal sanctions and suggests that additional interventions such as alcohol treatment programs are required if the drinking and driving sequence is to be broken for this population. (c) 2005 Elsevier Ltd. All rights reserved.
Resumo:
Trophodynamics of blooms of the toxic marine cyanobacterium Lyngkya majuscula were investigated to determine dietary specificity in two putative grazers: the opisthobranch molluscs, Stylocheilus striatus and Bursatella leachii. S. striatus is associated with L. majuscula blooms and is known to sequester L. majuscula metabolites. The dietary specificity and toxicodynamics of B. leachii in relation to L. majuscula is less well documented. In this study we found diet history had no significant effect upon dietary selectivity of S. striatus when offered a range of plant species. However, L. majuscula chemotype may alter S. striatus' selectivity for this cyanobacterium. Daily biomass increases between small and large size groups of both species were recorded in no-choice consumption trials using L. majuscula. Both S. striatus and B. leachii preferentially consumed L. majuscula containing lyngbyatoxin-a. Increase in mass over a 10-day period in B. leachii (915%) was significantly greater than S. striatus (150%), yet S. striatus consumed greater quantities of L. majuscula (g day(-1)) and thus had a lower conversion efficiency (0.038) than B. leachii (0.081) based on sea hare weight per gram of L. majuscula consumed day(-1). Our findings suggest that growth rates and conversion efficiencies may be influenced by sea hare maximum growth potential, acquisition of secondary metabolites or diet type. (C) 2005 Elsevier B.V. All rights reserved.
Resumo:
Catastrophic failure from intentional terrorist attacks on surface transportation infrastructure could he detrimental to the society. In order to minimize the vulnerabilities and to ensure a safe transportation system, the issue of security for transportation structures, primarily bridges, which are subjected to man-made hazards is investigated in this study. A procedure for identifying and prioritizing "critical bridges" using a screening and prioritization processes is established. For each of the "critical" bridges, a systematic risk-based assessment approach is proposed that takes into account the combination of threat occurrence likelihood, its consequences, and the socioeconomic importance of the bridge. A series of effective security countermeasures are compiled in the four categories of deterrence, detection, defense and mitigation to help reduce the vulnerability of critical bridges. The concepts of simplified equivalent I-shape cross section and virtual materials are proposed for integration into a nonlinear finite element model, which helps assess the performance of reinforced concrete structures with and without composite retrofit or hardening measures under blast loading. A series of parametric studies are conducted for single column and two-column pier frame systems as well as for an entire bridge. The parameters considered include column height, column type, concrete strength, longitudinal steel reinforcement ratio, thickness, fiber angle and tensile strength of the fiber reinforced polymer (FRP) tube, shape of the cross section, damping ratio and different bomb sizes. The study shows the benefits of hardening with composites against blast loading. The effect of steel reinforcement on blast resistance of the structure is more significant than the effect of concrete compressive strength. Moreover, multiple blasts do not necessarily lead to a more severe destruction than a single detonation at a strategically vulnerable location on the bridges.
Resumo:
Climate change has been a security issue for mankind since Homo sapiens first emerged on the planet, driving him to find new and better food, water, shelter, and basic resources for survival and the advancement of civilization. Only recently, however, has the rate of climate change coupled with man’s knowledge of his own role in that change accelerated, perhaps profoundly, changing the security paradigm. If we take a ―decades‖ look at the security issue, we see competition for natural resources giving way to Cold War ideological containment and deterrence, itself giving way to non-state terrorism and extremism. While we continue to defend against these threats, we are faced with even greater security challenges that inextricably tie economic, food and human security together and where the flash points may not provide clearly discernable causes, as they will be intrinsically tied to climate change. Several scientific reports have revealed that the modest development gains that can be realized by some regions could be reversed by climate change. This means that climate change is not just a long-term environmental threat as was widely believed, but an economic and developmental disaster that is unfolding. As such, addressing climate change has become central to the development and poverty reduction by the World Bank and other financial institutions. In Latin America, poorer countries and communities, such as those found in Central America, will suffer the hardest because of weaker resilience and greater reliance on climatesensitive sectors such as agriculture. The US should attempt to deliver capability to assist these states to deal with the effects of climate change.
Resumo:
Dengue fever, currently the most important arbovirus, is transmitted by the bite of the Aedes aegypti mosquito. Given the absence of a prophylactic vaccine, the disease can only be controlled by combating the vector insect. However, increasing reports of resistance and environmental damage caused by insecticides have led to the urgent search for new safer alternatives. Twenty - um plant s eed extracts from the Caatinga were prepared , tested and characterized . Sodium phosphate ( 50 mM pH 8.0) was used as extractor. All extracts showed larvicidal and ovipositional deterrence activity . Extracts of D. grandiflora, E. contortisiliquum, A. cearenses , C. ferrea and C. retusa were able to attract females for posture when in low co ncentration . In the attractive concentrations, the CE of E. contortisiliquum and A. cearenses were able to kill 52% and 100% of the larvae respectively . The extracts of A. cearenses , P. viridiflora, E. velutina, M. urundeuva and S. brasiliensis were also pupicides, while extracts of P. viridiflora, E. velutina, E. contortisiliquum , A. cearenses, A. colubrina, D. grandiflora , B. cheilantha , S. spectabilis, C. pyramidalis, M. regnelli e G. americana displayed adulticidal activity. All extracts were toxic to C. dubia zooplankton . The EB of E. velutina and E. contortisiliquum did not affect the viability of fibroblasts . In all extracts were identified at least two potential insecticidal proteins such as enzyme inhibitors, lectins and chitin - binding proteins and components of secondary metabolism . Considering all bioassays , the extracts from A. cearenses, P. viridiflora, E. contortisiliquum , S. brasiliensis, E. velutina and M. urundeuva were considered the most promising . The E. contortisiliquum extracts was the only one who did not show pupicida activity, indicating that its mechanism of action larvicide and adulticidal is related only to the ingesti on of toxic compounds by insect , so it was selected to be fragmenting. As observed for the CE , th e protein fractions of E. contortisiliquum also showed larvicidal activity, highlighting that F2 showed higher larvicidal activity and lower en vironmental toxicity than the CE source. The reduction in the proteolytic activity of larvae fed with crude extra ct and fractions of E. contortisiliquum suggest ed that the trypsin inhibitors ( ITEc) would be resp onsible for larvicidal activity . However the increase in the purification of this inhibitor resulted in loss of larvicidal activity , but the absence of trypsin inhibitor reduced the effectiveness of the fractions , indicating that the ITEC contributes to the larvicidal activity of this extract. Not been observed larvicidal activity and adulticide in rich fraction vicilin, nor evidence of the contribution o f this molecule for the larvicidal activity of the extract. The results show the potential of seeds from plant extracts of Caatinga as a source of active molecules against insects A. aegypti at different stages of its development cycle, since they are comp osed of different active compounds, including protein nature, which act on different mechanisms should result in the death of insec
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.
Resumo:
All teachers participate in self-directed professional development (PD) at some point in their careers; however, the degree to which this participation takes place varies greatly from teacher to teacher and is influenced by the leadership of the school principal. The motivation behind why teachers choose to engage in PD is an important construct. Therefore, there is a need for better understanding of the leader’s role with respect to how and why teachers engage in self-directed professional development. The purpose of the research was to explore the elementary teachers’ motivation for and the school principal’s influence on their engagement in self-directed professional development. Three research questions guided this study: 1. What motivates teachers to engage in self-directed professional development? 2. What are the conditions necessary for promoting teachers’ engagement in self-directed professional development? 3. What are teachers’ perceptions of the principal’s role in supporting, fostering, encouraging, and sustaining the professional development of teachers? A qualitative research approach was adopted for this study. Six elementary teachers from one south-eastern Ontario school board, consisting of three novice and three more experienced teachers, provided their responses to a consistent complement of 14 questions. Their responses were documented via individual interviews, transcribed verbatim, and thematically analysed. The findings suggested that, coupled with the individual motivating influences, the culture of the school was found to be a conditional dynamic that either stimulated or dissuaded participation in self-directed PD. The school principal provided an additional catalyst or deterrence via relational disposition. When teachers felt their needs for competency, relatedness, and autonomy were satisfied, the conditions necessary to motivate teachers to engage in PD were fulfilled. A principal who personified the tenets of transformational leadership served to facilitate teachers’ inclinations to take on PD. A leadership style that was collaborative and trustful and allowed for personal autonomy was a dominant foundational piece that was critical for participant participation in self-directed PD. Finally, the principals were found to positively impact school climate by partaking in PD alongside teachers and ensuring there was a shared vision of the school so that teachers could tailor PD to parallel school interests.
Resumo:
This project looks at the ways Northeastern Ontario citizens in rural communities regulate their private property through traditional and contemporary surveillance means. Through art and objects, this project allows viewers the opportunity to experience surveillance in rural areas through visual and creative ways that encourage interaction and critique. This project defines organic surveillance by looking at the ways ruralists in Markstay Ontario practice surveillance and deterrence which is influenced by characteristics of land, risks and other determining factors such as psychology, resourcefulness, sustainability, technology and private property. Organic surveillance argues that surveillance and deterrence is prevalent far beyond datamining, GPS tracking and social media. Surveillance and deterrence as methods of survival are found everywhere, even in the farthest, most “wild” and forested areas.
Resumo:
Tucídides es una de nuestras mejores fuentes de información para conocer la práctica argumentativa de la deliberación democrática. En este trabajo se analiza uno de los vicios que, según el historiador, haría su aparición en la escena política ateniense a la muerte de Pericles: la instrumentalización del miedo para obtener la victoria momentánea en la asamblea. El temor prudente, que fuera una arma periclea para conducir la deliberación racional en aras del bien común, habría desaparecido siendo sustituido por el amedrentamiento del rival, la calumnia, el obstruccionismo y la parálisis de la confrontación dialéctica. Instauradas en la ciudad la desconfianza y la sospecha de ocultación, los golpistas del 411 hallaron el terreno abonado para callar las voces contrarias y, gracias al silencio, instaurar el terror.
Resumo:
The proliferation of weapons of mass destruction (WMD), nuclear, biological and chemical (NBC) is one of the main security challenges facing the international community today. However the new Global Security Strategy of 2016 raises the question of non-proliferation of WMD only as an incidental matter, not addressing directly the threat, a fundamental threat in the regional and global security. This is a clear step backwards for the European common security.