701 resultados para Political of security
Resumo:
The focus of this dissertation is the relationship between the necessity for protection and the construction of cultural identities. In particular, by cultural identities I mean the representation and construction of communities: national communities, religious communities or local communities. By protection I mean the need for individuals and groups to be reassured about dangers and risks. From an anthropological point of view, the relationship between the need for protection and the formation and construction of collective identities is driven by the defensive function of culture. This was recognized explicitly by Claude Lévi-Strauss and Jurij Lotman. To explore the “protective hypothesis,” it was especially useful to compare the immunitarian paradigm, proposed by Roberto Esposito, with a semiotic approach to the problem. According to Esposito, immunity traces borders, dividing Community from what should be kept outside: the enemies, dangers and chaos, and, in general, whatever is perceived to be a threat to collective and individual life. I recognized two dimensions in the concept of immunity. The first is the logic dimension: every element of a system makes sense because of the network of differential relations in which it is inscribed; the second dimension is the social praxis of division and definition of who. We are (or what is inside the border), and who They are (or what is, and must be kept, outside the border). I tested my hypothesis by analyzing two subject areas in particular: first, the security practices in London after 9/11 and 7/7; and, second, the Spiritual Guide of 9/11 suicide bombers. In both cases, one observes the construction of two entities: We and They. The difference between the two cases is their “model of the world”: in the London case, one finds the political paradigms of security as Sovereignty, Governamentality and Biopolitics. In the Spiritual Guide, one observes a religious model of the Community of God confronting the Community of Evil. From a semiotic point view, the problem is the origin of respective values, the origin of respective moral universes, and the construction of authority. In both cases, I found that emotional dynamics are crucial in the process of forming collective identities and in the process of motivating the involved subjects: specifically, the role of fear and terror is the primary factor, and represents the principal focus of my research.
Resumo:
Reliable electronic systems, namely a set of reliable electronic devices connected to each other and working correctly together for the same functionality, represent an essential ingredient for the large-scale commercial implementation of any technological advancement. Microelectronics technologies and new powerful integrated circuits provide noticeable improvements in performance and cost-effectiveness, and allow introducing electronic systems in increasingly diversified contexts. On the other hand, opening of new fields of application leads to new, unexplored reliability issues. The development of semiconductor device and electrical models (such as the well known SPICE models) able to describe the electrical behavior of devices and circuits, is a useful means to simulate and analyze the functionality of new electronic architectures and new technologies. Moreover, it represents an effective way to point out the reliability issues due to the employment of advanced electronic systems in new application contexts. In this thesis modeling and design of both advanced reliable circuits for general-purpose applications and devices for energy efficiency are considered. More in details, the following activities have been carried out: first, reliability issues in terms of security of standard communication protocols in wireless sensor networks are discussed. A new communication protocol is introduced, allows increasing the network security. Second, a novel scheme for the on-die measurement of either clock jitter or process parameter variations is proposed. The developed scheme can be used for an evaluation of both jitter and process parameter variations at low costs. Then, reliability issues in the field of “energy scavenging systems” have been analyzed. An accurate analysis and modeling of the effects of faults affecting circuit for energy harvesting from mechanical vibrations is performed. Finally, the problem of modeling the electrical and thermal behavior of photovoltaic (PV) cells under hot-spot condition is addressed with the development of an electrical and thermal model.
Resumo:
Gli ultimi anni hanno visto importanti cambiamenti positivi nella cooperazione interstatale in Asia centrale. Crescenti minacce come il terrorismo internazionale, l'estremismo religioso e politico, il traffico di droga, ecc, causati dagli interessi geopolitici e geo-economici delle potenze mondiali, hanno contribuito alla formazione di una politica estera più coordinata e coerente degli Stati della regione. Questo processo si manifesta nella partecipazione attiva dell’istituzionalizzazione della Shanghai Organizzazione del Commonwealth (SOC), Conferenza sulle misure di costruzione d’interazione e fiducia in Asia (CICA) e Organizzazione del Trattato di Sicurezza Collettiva (CSTO). Problemi moderni di sicurezza in Asia centrale dovrebbero essere risolti in dei nuovi modi, non convenzionali. Le nuove minacce alla sicurezza richiedono modi non standard per risolvere il problema. Considerate le differenze fondamentali dell'Unione europea e degli Stati dell'Asia centrale nei valori e dal punto di vista in materia di sicurezza. I paesi dell'Asia centrale non sono pronti per l'integrazione politica. Nonostante questo, nell’Asia centrale sono state adottate misure per contrastare le minacce non convenzionali. L’esperienza europea di unire gli sforzi della regione per garantire la sicurezza interna, può essere utilizzata dai paesi dell'Asia centrale, soprattutto, in primo luogo sulla formazione del quadro istituzionale e giuridico per la cooperazione operativa delle forze dell'ordine per le seguenti aree: • prevenzione del traffico di droga attraverso gli Stati dell'Asia centrale; • lotta contro nuove forme di terrorismo ed estremismo; • limitare la dimensione della migrazione clandestina; • migliorare la protezione giuridica dei cittadini. Fino a poco tempo fa, questi temi hanno ricevuto poca attenzione, sia nella teoria sia nella pratica, poiché i problemi di sicurezza della società erano principalmente ridotti per evitare il pericolo di guerra.
Resumo:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.
Resumo:
What can we learn about the way that folk storytelling operates for tellers and audience members by examining the telling of stories by characters within such narratives? I examine Maithil women’s folktales in which stories of women’s suffering at the hands of other women are first suppressed and later overheard by men who have the power to alleviate such suffering. Maithil women are pitted against one another in their pursuit of security and resources in the context of patrilineal formations. The solidarities such women nonetheless form—in part through sharing stories and keeping each other’s secrets—serve to mitigate their suffering and maintain a counter-system of ideational patterns and practices.
Resumo:
Theoretical studies of the problems of the securities markets in the Russian Federation incline to one or other of the two traditional approaches. The first consists of comparing the definition of "valuable paper" set forth in the current legislation of the Russian Federation, with the theoretical model of "Wertpapiere" elaborated by German scholars more than 90 years ago. The problem with this approach is, in Mr. Pentsov's opinion, that any new features of the definition of "security" that do not coincide with the theoretical model of "Wertpapiere" (such as valuable papers existing in non-material, electronic form) are claimed to be incorrect and removed from the current legislation of the Russian Federation. The second approach works on the basis of the differentiation between the Common Law concept of "security" and the Civil Law concept of "valuable paper". Mr. Pentsov's research, presented in an article written in English, uses both methodological tools and involves, firstly, a historical study of the origin and development of certain legal phenomena (securities) as they evolved in different countries, and secondly, a comparative, synchronic study of equivalent legal phenomena as they exist in different countries today. Employing the first method, Mr. Pentsov divided the historical development of the conception of "valuable paper" in Russia into five major stages. He found that, despite the existence of a relatively wide circulation of valuable papers, especially in the second half of the 19th century, Russian legislation before 1917 (the first stage) did not have a unified definition of valuable paper. The term was used, in both theoretical studies and legislation, but it covered a broad range of financial instruments such as stocks, bonds, government bonds, promissory notes, bills of exchange, etc. During the second stage, also, the legislation of the USSR did not have a unified definition of "valuable paper". After the end of the "new economic policy" (1922 - 1930) the stock exchanges and the securities markets in the USSR, with a very few exceptions, were abolished. And thus during the third stage (up to 1985), the use of valuable papers in practice was reduced to foreign economic relations (bills of exchange, stocks in enterprises outside the USSR) and to state bonds. Not surprisingly, there was still no unified definition of "valuable paper". After the beginning of Gorbachev's perestroika, a securities market began to re-appear in the USSR. However, the successful development of securities markets in the USSR was retarded by the absence of an appropriate regulatory framework. The first effort to improve the situation was the adoption of the Regulations on Valuable Papers, approved by resolution No. 590 of the Council of Ministers of the USSR, dated June 19, 1990. Section 1 of the Regulation contained the first statutory definition of "valuable paper" in the history of Russia. At the very beginning of the period of transition to a market economy, a number of acts contained different definitions of "valuable paper". This diversity clearly undermined the stability of the Russian securities market and did not achieve the goal of protecting the investor. The lack of unified criteria for the consideration of such non-standard financial instruments as "valuable papers" significantly contributed to the appearance of numerous fraudulent "pyramid" schemes that were outside of the regulatory scheme of Russia legislation. The situation was substantially improved by the adoption of the new Civil Code of the Russian Federation. According to Section 1 of Article 142 of the Civil Code, a valuable paper is a document that confirms, in compliance with an established form and mandatory requisites, certain material rights whose realisation or transfer are possible only in the process of its presentation. Finally, the recent Federal law No. 39 - FZ "On the Valuable Papers Market", dated April 22 1996, has also introduced the term "emission valuable papers". According to Article 2 of this Law, an "emission valuable paper" is any valuable paper, including non-documentary, that simultaneously has the following features: it fixes the composition of material and non-material rights that are subject to confirmation, cession and unconditional realisation in compliance with the form and procedure established by this federal law; it is placed by issues; and it has equal amount and time of realisation of rights within the same issue regardless of when the valuable paper was purchased. Thus the introduction of the conception of "emission valuable paper" became the starting point in the Russian federation's legislation for the differentiation between the legal regimes of "commercial papers" and "investment papers" similar to the Common Law approach. Moving now to the synchronic, comparative method of research, Mr. Pentsov notes that there are currently three major conceptions of "security" and, correspondingly, three approaches to its legal definition: the Common Law concept, the continental law concept, and the concept employed by Japanese Law. Mr. Pentsov proceeds to analyse the differences and similarities of all three, concluding that though the concept of "security" in the Common Law system substantially differs from that of "valuable paper" in the Continental Law system, nevertheless the two concepts are developing in similar directions. He predicts that in the foreseeable future the existing differences between these two concepts will become less and less significant. On the basis of his research, Mr. Pentsov arrived at the conclusion that the concept of "security" (and its equivalents) is not a static one. On the contrary, it is in the process of permanent evolution that reflects the introduction of new financial instruments onto the capital markets. He believes that the scope of the statutory definition of "security" plays an extremely important role in the protection of investors. While passing the Securities Act of 1933, the United States Congress determined that the best way to achieve the goal of protecting investors was to define the term "security" in sufficiently broad and general terms so as to include within the definition the many types of instruments that in the commercial world fall within the ordinary concept of "security' and to cover the countless and various devices used by those who seek to use the money of others on the promise of profits. On the other hand, the very limited scope of the current definition of "emission valuable paper" in the Federal Law of the Russian Federation entitled "On the Valuable Papers Market" does not allow the anti-fraud provisions of this law to be implemented in an efficient way. Consequently, there is no basis for the protection of investors. Mr. Pentsov proposes amendments which he believes would enable the Russian markets to become more efficient and attractive for both foreign and domestic investors.
Resumo:
It has been noted that immigrant women often initiate prenatal care late in their pregnancy and thus may be inadequately prepared for their birth experience. This leads to poorer maternal outcomes and higher morbidity statistics compared to Swiss women. Tamil women of Sri Lanka represent the largest group of immigrant women being seen at the antenatal care clinic of a Swiss University Hospital. To get a deeper understanding of their needs and expectations relative to their antenatal care, a qualitative study was undertaken. Problem centred interviews were conducted with seven Tamil women before and after delivery. An interpreter was consulting. Data were analyzed using content analysis methods as described by Mayring. Four main themes emerged, demonstrating the need of the women and their resulting expectation: 1) to receive esteem--to show respect and attention; 2) to consult with somebody--to ensure communication; 3) to alleviate worries and fear--to give a sense of security and be in charge; and 4) to make up for lack of experience and knowledge--to pass on experience and knowledge. The quality of the relationships to caregivers is viewed as pivotal and seems to influence Tamil women's satisfaction and their motivation to receive prenatal care.
Resumo:
In this dissertation, the National Survey of Student Engagement (NSSE) serves as a nodal point through which to examine the power relations shaping the direction and practices of higher education in the twenty-first century. Theoretically, my analysis is informed by Foucault’s concept of governmentality, briefly defined as a technology of power that influences or shapes behavior from a distance. This form of governance operates through apparatuses of security, which include higher education. Foucault identified three essential characteristics of an apparatus—the market, the milieu, and the processes of normalization—through which administrative mechanisms and practices operate and govern populations. In this project, my primary focus is on the governance of faculty and administrators, as a population, at residential colleges and universities. I argue that the existing milieu of accountability is one dominated by the neoliberal assumption that all activity—including higher education—works best when governed by market forces alone, reducing higher education to a market-mediated private good. Under these conditions, what many in the academy believe is an essential purpose of higher education—to educate students broadly, to contribute knowledge for the public good, and to serve as society’s critic and social conscience (Washburn 227)—is being eroded. Although NSSE emerged as a form of resistance to commercial college rankings, it did not challenge the forces that empowered the rankings in the first place. Indeed, NSSE data are now being used to make institutions even more responsive to market forces. Furthermore, NSSE’s use has a normalizing effect that tends to homogenize classroom practices and erode the autonomy of faculty in the educational process. It also positions students as part of the system of surveillance. In the end, if aspects of higher education that are essential to maintaining a civil society are left to be defined solely in market terms, the result may be a less vibrant and, ultimately, a less just society.
Resumo:
This dissertation presents a detailed study in exploring quantum correlations of lights in macroscopic environments. We have explored quantum correlations of single photons, weak coherent states, and polarization-correlated/polarization-entangled photons in macroscopic environments. These included macroscopic mirrors, macroscopic photon number, spatially separated observers, noisy photons source and propagation medium with loss or disturbances. We proposed a measurement scheme for observing quantum correlations and entanglement in the spatial properties of two macroscopic mirrors using single photons spatial compass state. We explored the phase space distribution features of spatial compass states, such as chessboard pattern by using the Wigner function. The displacement and tilt correlations of the two mirrors were manifested through the propensities of the compass states. This technique can be used to extract Einstein-Podolsky-Rosen correlations (EPR) of the two mirrors. We then formulated the discrete-like property of the propensity Pb(m,n), which can be used to explore environmental perturbed quantum jumps of the EPR correlations in phase space. With single photons spatial compass state, the variances in position and momentum are much smaller than standard quantum limit when using a Gaussian TEM00 beam. We observed intrinsic quantum correlations of weak coherent states between two parties through balanced homodyne detection. Our scheme can be used as a supplement to decoy-state BB84 protocol and differential phase-shift QKD protocol. We prepared four types of bipartite correlations ±cos2(θ12) that shared between two parties. We also demonstrated bits correlations between two parties separated by 10 km optical fiber. The bits information will be protected by the large quantum phase fluctuation of weak coherent states, adding another physical layer of security to these protocols for quantum key distribution. Using 10 m of highly nonlinear fiber (HNLF) at 77 K, we observed coincidence to accidental-coincidence ratio of 130±5 for correlated photon-pair and Two-Photon Interference visibility >98% entangled photon-pair. We also verified the non-local behavior of polarization-entangled photon pair by violating Clauser-Horne-Shimony-Holt Bell’s inequality by more than 12 standard deviations. With the HNLF at 300 K (77 K), photon-pair production rate about factor 3(2) higher than a 300 m dispersion-shifted fiber is observed. Then, we studied quantum correlation and interference of photon-pairs; with one photon of the photon-air experiencing multiple scattering in a random medium. We observed that depolarization noise photon in multiple scattering degrading the purity of photon-pair, and the existence of Raman noise photon in a photon-pair source will contribute to the depolarization affect. We found that quantum correlation of polarization-entangled photon-pair is better preserved than polarization-correlated photon-pair as one photon of the photon-pair scattered through a random medium. Our findings showed that high purity polarization-entangled photon-pair is better candidate for long distance quantum key distribution.
Resumo:
This paper examines the impact of disastrous and ‘ordinary’ floods on human societies in what is now Austria. The focus is on urban areas and their neighbourhoods. Examining institutional sources such as accounts of the bridge masters, charters, statutes and official petitions, it can be shown that city communities were well acquainted with this permanent risk: in fact, an office was established for the restoration of bridges and the maintenance of water defences and large depots for timber and water pipes ensured that the reconstruction of bridges and the system of water supply could start immediately after the floods had subsided. Carpenters and similar groups gained 10 to 20 per cent of their income from the repair of bridges and other flood damage. The construction of houses in endangered zones was adapted in order to survive the worst case experiences. Thus, we may describe those communities living along the central European rivers as ‘cultures of flood management’. This special knowledge vanished, however, from the mid-nineteenth century onwards, when river regulations gave the people a false feeling of security.
Resumo:
The purpose of this study was to assess the relationship of role conflict and role ambiguity to job dissatisfaction among 169 hospital executives in Houston and San Antonio, Texas. Organizational characteristics were studied as moderators.^ Role conflict and role ambiguity scores among respondents were found to be lower than in studies reported in the literature. Job dissatisfaction scores were slightly lower (indicating less dissatisfaction) than those reported elsewhere for the constructs of security, social, and esteem needs; comparable for self-fulfillment; and slightly higher for autonomy needs. Conclusions were that role ambiguity and role conflict were related to job dissatisfaction among the respondents; that the same relationships hold true when controlling for organizational characteristics; that those highest on the organizational ladder were the least dissatisfied; and that those with the greatest amount of budget responsibility had the lowest levels of job dissatisfaction. ^
Resumo:
El artículo revisa el concepto de cohesión social y la noción de seguridad, partiendo del análisis de los profundos desequilibrios y desigualdades sociales que el modelo económico dominante a escala global desde los años 1980 crea o intensifica en América Latina. Centrado en las transformaciones que generaron la pérdida de confianza en las instituciones, en el Estado, en el mercado del trabajo, en la educación, incluso en la religión y en la familia, sobre las cuales reposaba la solidaridad orgánica en el marco de la sociedad industrial capitalista, examina cinco indicadores de la existencia de problemas de inseguridad en relación con la cohesión social. Pone de relieve que el problema de la inseguridad se asocia con la ruptura o la fragilidad de los mecanismos de integración y de mediación social y sostiene la necesidad de reconstruir la cohesión social para alcanzar la seguridad ciudadana, destacando que este proceso se funda en una profunda modificación política, económica y social enfocada en la inclusión social, de la que son co-responsables el Estado y los ciudadanos como actores de su propio desarrollo.
Resumo:
Against the background of closer diplomatic, political and security ties between Myanmar and China since 1988, their economic relations have also grown stronger throughout the 1990s and up to 2005. China is now a major supplier of consumer and capital goods to Myanmar, in particular through border trade. China also provides a large amount of economic cooperation in the areas of infrastructure, energy and state-owned economic enterprises. Nevertheless, Myanmar’s trade with China has failed to have a substantial impact on its broad-based economic and industrial development. China’s economic cooperation apparently supports the present regime, but its effects on the whole economy will be limited with an unfavorable macroeconomic environment and distorted incentives structure. As a conclusion, strengthened economic ties with China will be instrumental in regime survival, but will not be a powerful force affecting the process of economic development in Myanmar.
Resumo:
This paper explores the development of civil–military relations in Myanmar since 1988. After the Tatmadaw (Myanmar Armed Forces) took over the state by means of a coup d’état in 1988, the top generals ruled the country without recourse to significant formal political institutions such as a constitution, elections and parliament. A unique authoritarian regime, where political power was predominantly under the military’s influence, lasted for more than 20 years in the country. It seemed to many observers that the military regime was highly durable and that its dictator, General Than Shwe, had no intention of altering the highly repressive character of the political system. However, a new leader, President Thein Sein, who came to power in March 2011, has decided to implement some political and economic reforms that could undermine the Tatmadaw’s dominant role in politics and the economy. This paper examines the background to this sudden political change in Myanmar, focusing on the relationship between its dictator, the military and the state. This paper’s main argument is that Than Shwe has carefully prepared the transition of 2011 as a generational change in the Tatmadaw and in state leadership. The argument is also made that the challenges created by Thein Sein can be understood as a result of his redefinition of national security and balancing of security-centralism with state-led developmentalism.