701 resultados para Political of security
Resumo:
The main goal of this thesis is to report patterns of perceived safety in the context of airport infrastructure, taking the airport of Bologna as reference. Many personal and environmental attributes are investigated to paint the profile of the sensitive passenger and to understand why precise factors of the transit environment are so impactful on the individual. The main analyses are based on a 2014-2015 passengers’ survey, involving almost six thousand of incoming and outgoing passengers. Other reports are used to implement and support the resource. The analysis is carried out by using a combination of Chi-square tests and binary logistic regressions. Findings shows that passengers result to be particularly affected by the perception of airport’s environment (e.g., state and maintenance of facilities, clarity and efficacy of information system, functionality of elevators and escalators), but also by the way how the passenger reaches the airport and the quality of security checks. In relation to such results, several suggestions are provided for the improvement of passenger satisfaction with safety. The attention is then focused on security checkpoints and related operations, described on a theoretical and technical ground. We present an example of how to realize a proper model of the security checks area of Bologna’s airport, with the aim to assess present performances of the system and consequences of potential variations. After a brief introduction to Arena, a widespread simulation software, the existing model is described, pointing out flaws and limitations. Such model is finally updated and changed in order to make it more reliable and more representative of the reality. Different scenarios are tested and results are compared using graphs and tables.
Resumo:
"October 1983."
Resumo:
Mode of access: Internet.
Resumo:
"January 1988."
Resumo:
Older people’s travel behaviour is affected by negative or positive critical incidents in the public transport environment. With the objective of identifying such inci- dents during whole trips and examining how travel beha- viour had changed, we have conducted in-depth interviews with 30 participants aged 65–91 years in the County of Stockholm, Sweden. Out of 469 incidents identified, 77 were reported to have resulted in travel behaviour change, 67 of them in a negative way. Most critical incidents were encountered in the physical environment on-board vehicles and at stations/stops as well as in pricing/ticketing. The findings show that more personal assistance, better driving behaviour, and swift maintenance of elevators and escala- tors are key facilitators that would improve predictability in travelling and enhance vulnerable older travellers’ feeling of security. The results demonstrate the benefit of involving different groups of end users in future planning and design, such that transport systems would meet the various needs of its end users.
Resumo:
Two nuclear crises recently haunted the Korean peninsula, one in 1993/4, the other in 2002/3. In each case the events-were strikingly similar: North Korea made public its ambition to acquire nuclear weapons and withdrew from the Nonproliferation Treaty. Then the situation rapidly deteriorated until the peninsular was literally on the verge of war. The dangers of North Korea's actions, often interpreted as nuclear brinkmanship, are evident. and much discussed, but not so the underlying patterns that have shaped the conflict in the first place. This article sheds light on some of them. It examines the role of the United States in the crisis, arguing that Washington's inability to see North Korea as anything but a threatening 'rogue state' seriously hinders both an adequate understanding and possible resolution of the conflict. Particularly significant is the current policy of pre-emptive strikes against rogue states, for it reinforces half a century of American nuclear threats towards North Korea. The problematic role of these threats has been largely obscured, not least because the highly technical discourse of security analysis has managed to present the strategic situation on the peninsula in a manner that attributes responsibility for the crisis solely to North Korea's actions, even if the situation is in reality far more complex and interactive.
Resumo:
This article examines ways in which art can help broaden understandings of contemporary security challenges, especially in view of the limits of conventional forms of strategic and policy analysis. The article focuses especially on responses to 9/11 in literature, the visual arts, architecture, and music, and considers some epistemological questions about the status of art as a way of knowing political events, like those of 9/11, that escape state-based forms of security analysis.
Resumo:
The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.
Resumo:
During 1999 and 2000 a large number of articles appeared in the financial press which argued that the concentration of the FTSE 100 had increased. Many of these reports suggested that stock market volatility in the UK had risen, because the concentration of its stock markets had increased. This study undertakes a comprehensive measurement of stock market concentration using the FTSE 100 index. We find that during 1999, 2000 and 2001 stock market concentration was noticeably higher than at any other time since the index was introduced. When we measure the volatility of the FTSE 100 index we do not find an association between concentration and its volatility. When we examine the variances and covariance’s of the FTSE 100 constituents we find that security volatility appears to be positively related to concentration changes but concentration and the size of security covariances appear to be negatively related. We simulate the variance of four versions of the FTSE 100 index; in each version of the index the weighting structure reflects either an equally weighted index, or one with levels of low, intermediate or high concentration. We find that moving from low to high concentration has very little impact on the volatility of the index. To complete the study we estimate the minimum variance portfolio for the FTSE 100, we then compare concentration levels of this index to those formed on the basis of market weighting. We find that realised FTSE index weightings are higher than for the minimum variance index.
Resumo:
This is the first paper to examine the microstructure of the Irish Stock Market empirically and is motivated by the adoption, on June 7th of Xetra the modern pan European auction trading system. Prior to this the exchange utilized an antiquated floor based system. This change was an important event for the market as a rich literature exists to suggest that the trading system exerts a strong influence over the behavior of security returns. We apply the ICSS algorithm of Inclan and Tiao (1994) to discover whether the change to the trading system caused a shift in unconditional volatility at the time Xetra was introduced. Because the trading mechanism can influence volatility in a number of ways we also estimate the partial adjustment coefficients of the Amihud and Mendelson (1987) model prior and subsequent to the introduction of Xetra. Although we find no evidence of volatility changes associated with the introduction of Xetra we do find evidence of an increase in the speed of adjustment (JEL: G15).
Resumo:
The role of the European Union in global politics has been of growing interest over the past decade. The EU is a key player in global institutions such as the World Trade Organization (WTO) and NATO. It continues to construct an emerging identity and project its values and interests throughout contemporary international relations. The capacity of the EU to both formulate and realise its goals, however, remains contested. Some scholars claim the EU’s `soft power’ attitude rivals that of the USA’s `hard power’ approach to international relations. Others view the EU as insufficiently able to produce a co-ordinated position to project upon global politics. Regardless of the position taken within this debate, the EU’s relationship with its external partners has an increasingly important impact upon economic, political and security concerns on an international level. Trade negotiations, military interventions, democracy promotion, international development and responses to the global economic crisis have all witnessed the EU playing a central role. This has seen the EU become both a major force in contemporary institutions of global governance and a template for supranational governance that might influence other attempts to construct regional and global institutions. This volume brings together a collection of leading EU scholars to provide a state-of-the-art overview covering these and other debates relating to the EU’s role in contemporary global governance. The Handbook is divided into four main sections: Part I: European studies and global governance – provides an overview and critical assessment of the leading theoretical approaches through which the EU’s role in global governance has been addressed within the literature. Part II: Institutions – examines the role played by the key EU institutions in pursuing a role for the EU in contemporary international relations. Part III: Policy and issue areas – explores developments within particular policy sectors, assessing the different impact that the EU has had in different issue areas, including foreign and security policy, environmental policy, common commercial policy, the Common Agricultural Policy, development policy, accession policy, the Neighbourhood Policy and conflict transformation. Part IV: The global multilevel governance complex and the EU – focuses on the relationship between the EU and the institutions, regions and countries with which it forms a global multilevel governance complex, including chapters on the EU’s relationship with the WTO, United Nations, East Asia, Africa and the USA.
Resumo:
The role of the European Union in global politics has been of growing interest over the past decade. The EU is a key player in global institutions such as the World Trade Organization (WTO) and NATO. It continues to construct an emerging identity and project its values and interests throughout contemporary international relations. The capacity of the EU to both formulate and realise its goals, however, remains contested. Some scholars claim the EU’s `soft power’ attitude rivals that of the USA’s `hard power’ approach to international relations. Others view the EU as insufficiently able to produce a co-ordinated position to project upon global politics. Regardless of the position taken within this debate, the EU’s relationship with its external partners has an increasingly important impact upon economic, political and security concerns on an international level. Trade negotiations, military interventions, democracy promotion, international development and responses to the global economic crisis have all witnessed the EU playing a central role. This has seen the EU become both a major force in contemporary institutions of global governance and a template for supranational governance that might influence other attempts to construct regional and global institutions.
Conceptual Model and Security Requirements for DRM Techniques Used for e-Learning Objects Protection
Resumo:
This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements.
Resumo:
This paper introduces basic concepts of code access security, using and implementing security features, as well as types of security syntax and mechanism of checking and requesting specific permissions.