785 resultados para Governance of security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The promotion of women’s rights is described as a priority within the external action of the European Union (EU). As a result of the Arab Spring uprisings which have been ongoing since 2011, democracy and human rights have been pushed to the forefront of European policy towards the Euro-Mediterranean region. The EU could capitalise on these transformations to help positively reshape gender relations or it could fail to adapt. Thus, the Arab Spring can be seen to serve as a litmus test for the EU’s women’s rights policy. This paper examines how and to what extent the EU diffuses women’s rights in this region, by using Ian Manners’ ‘Normative Power Europe’ as the conceptual framework. It argues that while the EU tries to behave as a normative force for women’s empowerment by way of ‘informational diffusion’, ‘transference’ ‘procedural diffusion’ and ‘overt diffusion’; its efforts could, and should, be strengthened. There are reservations over the EU’s credibility, choice of engagement and its commitment in the face of security and ideological concerns. Moreover, it seems that the EU focuses more intently on women’s political rights than on their social and economic freedoms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fifteen years have passed since the adoption of Security Council Resolution 1325 on Women, Peace and Security, through which time the EU has grown as a security actor. The keys to produce a change in implementing gender mainstreaming in the Common Security and Defence Policy (CSDP) are well known by member states; the EU and external implementation reports1 are repeated again and again, but real change requires real willingness on the part of member states, and leadership.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

By contrast to the far-reaching devolution settlements elsewhere in the UK, political agreement on the governance of England outside London remains unsettled. There is cross- party consensus on the need to 'decentre down' authority to regions and localities, but limited agreement on how this should be achieved. This paper explores the welter of initiatives adopted by the recent Labour government that were ostensibly designed to make the meso-level of governance more coherent, accountable and responsive to meeting territorial priorities. Second, it explores the current Conservative-Liberal Democrat Coalition's programme of reform that involves the elimination of Labour's regional institutional architecture and is intended to restore powers to local government and communities and promote local authority co-operation around sub-regions. Labour's reforms were ineffective in achieving any substantial transfer of authority away from Whitehall and, given the Coalition's plans to cut public expenditure, the likelihood of any significant recalibration in central-local relations also appears improbable. © 2012 Copyright Taylor and Francis Group, LLC.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

SSince the external dimension of the European Union’s Justice and Home Affairs (JHA) began to be considered, a substantial amount of literature has been dedicated to discussing how the EU is cooperating with non-member states in order to counter problems such as terrorism, organized crime and illegal migration. According to the EU, the degree of security interconnectedness has become so relevant that threats can only be adequately controlled if there is effective concerted regional action. This reasoning has led the EU to develop a number of instruments, which have resulted in the exporting of certain elements of its JHA policies, either through negotiation or socialization. Although the literature has explored how this transfer has been applied to the field of terrorism and immigration, very little has been written on the externalisation of knowledge, practice and norms in the area of organized crime. This article proposes to bridge this gap by looking at EU practice in the development of the external dimension of organized crime policies, through the theoretical lens of the EU governance framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this dissertation is to contribute to a better understanding of how global seafood trade interacts with the governance of small-scale fisheries (SSFs). As global seafood trade expands, SSFs have the potential to experience significant economic, social, and political benefits from participation in export markets. At the same time, market connections that place increasing pressures on resources pose risks to both the ecological and social integrity of SSFs. This dissertation seeks to explore the factors that mediate between the potential benefits and risks of global seafood markets for SSFs, with the goal of developing hypotheses regarding these relationships.

The empirical investigation consists of a series of case studies from the Yucatan Peninsula, Mexico. This is a particularly rich context in which to study global market connections with SSFs because the SSFs in this region engage in a variety of market-oriented harvests, most notably for octopus, groupers and snappers, lobster, and sea cucumber. Variation in market forms and the institutional diversity of local-level governance arrangements allows the dissertation to explore a number of examples.

The analysis is guided primarily by common-pool resource (CPR) theory because of the insights it provides regarding the conditions that facilitate collective action and the factors that promote long-lasting resource governance arrangements. Theory from institutional economics and political ecology contribute to the elaboration of a multi-faceted conceptualization of markets for CPR theory, with the aim of facilitating the identification of mechanisms through which markets and CPR governance actually interact. This dissertation conceptualizes markets as sets of institutions that structure the exchange of property rights over fisheries resources, affect the material incentives to harvest resources, and transmit ideas and values about fisheries resources and governance.

The case studies explore four different mechanisms through which markets potentially influence resource governance: 1) Markets can contribute to costly resource governance activities by offsetting costs through profits, 2) markets can undermine resource governance by generating incentives for noncompliance and lead to overharvesting resources, 3) markets can increase the costs of resource governance, for example by augmenting monitoring and enforcement burdens, and 4) markets can alter values and norms underpinning resource governance by transmitting ideas between local resource users and a variety of market actors.

Data collected using participant observation, survey, informal and structured interviews contributed to the elaboration of the following hypotheses relevant to interactions between global seafood trade and SSFs governance. 1) Roll-back neoliberalization of fisheries policies has undermined cooperatives’ ability to achieve financial success through engagement with markets and thus their potential role as key actors in resource governance (chapter two). 2) Different relations of production influence whether local governance institutions will erode or strengthen when faced with market pressures. In particular, relations of production in which fishers own their own means of production and share the collective costs of governance are more likely to strengthen resource governance while relations of production in which a single entrepreneur controls capital and access to the fishery are more likely to contribute to the erosion of resource governance institutions in the face of market pressures (chapter three). 3) By serving as a new discursive framework within which to conceive of and talk about fisheries resources, markets can influence norms and values that shape and constitute governance arrangements.

In sum, the dissertation demonstrates that global seafood trade manifests in a diversity of local forms and effects. Whether SSFs moderate risks and take advantage of benefits depends on a variety of factors, and resource users themselves have the potential to influence the outcomes of seafood market connections through local forms of collective action.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article deals with several international instruments which provide legal guarantees for media diversity, which is essential for the promotion of cultural diversity. Based on several articles of the Convention of cultural diversity, the General Comment of the Committee on Economic, Social and Cultural Rights No. 21 on the right to take part in cultural life, as well as the work of the UN Independent Expert on Cultural Rights, this article aims to identify legal tools for the establishing of measures promoting cultural diversity in the media. This article looks at the case study of Honduran Garifuna community radios. It emphasizes the importance of taking into account the economic aspects of cultural and communicational rights.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The intention of this article is to provide a structural and operational analysis of policing beyond the police in Northern Ireland. While the polity enjoys low levels ofofficially’ recorded crime as part of its post-conflict status, little empirical analysis exists as to the epistemological roots of security production outside that of the Police Service of Northern Ireland. The empirical evidence presented seeks to establish that beyond more prominent analyses related to paramilitary ‘policing’, the country is in fact replete with a substantial reservoir of legitimate civil society policing – the collective mass of which contributes to policing, community safety and quality of life issues. While such non-state policing at the level of locale was recognised by the Independent Commission for Policing, structured understandings have rarely permeated governmental or academic discourse beyond anecdotal contentions. Thus, the present argument provides an empirical assessment of the complex, non-state policing landscape beyond the formal state apparatus; examines definitions and structures of such community-based policing activities; and explores issues related to co-opting this non-state security ‘otherness’ into more formal relations with the state.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

320 p.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.