701 resultados para Political of security
Resumo:
A multi-sectorial regime of protection including international treaties, conservation and security measures, demand reduction campaigns and quasi-military interventions has been established to protect rhinos. Despite these efforts, the poaching of rhinos and trafficking of rhino horn continue unabated. This dissertation asks why the illegal market in rhinoceros horn is so resilient in spite of the myriad measures employed to disrupt it. A theoretical approach grounded in the sociology of markets is applied to explain the structure and functioning of the illegal market. The project follows flows of rhino horn from the source in southern Africa to illegal markets in Southeast Asia. The multi-sited ethnography included participant observations, interviews and focus groups with 416 informants during fourteen months of fieldwork. The sample comprised of, amongst others, convicted and active rhino poachers, smugglers and kingpins, private rhino breeders and hunting outfitters, African and Asian law enforcement officials, as well as affected local communities and Asian consumers. Court files, CITES trade data, archival materials, newspaper reports and social media posts were also analysed to supplement findings and to verify and triangulate data from interviews, focus groups and observations. Central to the analysis is the concept of “contested illegality”, a legitimization mechanism employed by market participants along the different segments of the horn supply chain. These actors' implicit or explicit contestation of the state-sponsored label of illegality serves as a legitimising and enabling mechanism, facilitating participation in gray or illegal markets for rhino horn. The research identified fluid interfaces between legal, illegal and gray markets, with recurring actors who have access to transnational trade structures, and who also possess market and product knowledge, as well as information about the regulatory regime and its loopholes. It is against the background of colonial, apartheid and neoliberal exploitation and marginalization of local communities that a second argument is introduced: the path dependency of conservation paradigms. Underpinning rhino conservation and regulation are archaic and elitist conservation regimes that discount the potential for harmonious relationships between local communities and wildlife. The increasing militarization of anti-poaching measures and green land grabs are exacerbating the rhino problem by alienating communities further from conservation areas and wild animals. The third argument looks at how actors deal with coordination problems in transnational illegal markets. Resolving the coordination problems of cooperation, value and competition are considered essential to the operation of formal markets. It is argued that the problem of security provides an additional and crucial obstacle to actors transacting in markets. The systematic analysis of flows between the researched sites of production, distribution and consumption of rhino horn shows that the social embeddedness of actors facilitates the flourishing of illegal markets in ways that escape an effective enforcement of CITES regulations.
Resumo:
The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicine chart. This process can be very strenuous and error-prone, given the number of sub-tasks involved in the entire workflow and the dynamic nature of the work environment. Therefore, efforts are being made to digitalise the medication dispensation process by introducing a mobile application called Smart Dosing application. The introduction of the Smart Dosing application into hospital workflow raises security concerns and calls for security requirement analysis. This thesis is written as a part of the smart medication management project at Embedded Systems Laboratory, A° bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive stateof- the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
This research examines the process of placemaking in LeDroit Park, a residential Washington, DC, neighborhood with a historic district at its core. Unpacking the entwined physical and social evolution of the small community within the context of the Nation’s Capital, this analysis provides insight into the role of urban design and development as well as historic designation on shaping collective identity. Initially planned and designed in 1873 as a gated suburb just beyond the formal L’Enfant-designed city boundary, LeDroit Park was intended as a retreat for middle and upper-class European Americans from the growing density and social diversity of the city. With a mixture of large romantic revival mansions and smaller frame cottages set on grassy plots evocative of an idealized rural village, the physical design was intentionally inwardly-focused. This feeling of refuge was underscored with a physical fence that surrounded the development, intended to prevent African Americans from nearby Howard University and the surrounding neighborhood, from using the community’s private streets to access the City of Washington. Within two decades of its founding, LeDroit Park was incorporated into the District of Columbia, the surrounding fence was demolished, and the neighborhood was racially integrated. Due to increasingly stringent segregation laws and customs in the city, this period of integration lasted less than twenty years, and LeDroit Park developed into an elite African American enclave, using the urban design as a bulwark against the indignities of a segregated city. Throughout the 20th century housing infill and construction increased density, yet the neighborhood never lost the feeling of security derived from the neighborhood plan. Highlighting the architecture and street design, neighbors successfully received historic district designation in 1974 in order to halt campus expansion. After a stalemate that lasted two decades, the neighborhood began another period of transformation, both racial and socio-economic, catalyzed by a multi-pronged investment program led by Howard University. Through interviews with long-term and new community members, this investigation asserts that the 140-year development history, including recent physical interventions, is integral to placemaking, shaping the material character as well as the social identity of residents.
Resumo:
This paper explores ethnic and religious minority youth perspectives of security and nationalism in Scotland during the independence campaign in 2014. We discuss how young people co-construct narratives of Scottish nationalism alongside minority ethnic and faith identities in order to feel secure. By critically combining literatures from feminist geopolitics, international relations (IR) and children’s emotional geographies, we employ the concept of ‘ontological security’. The paper departs from state-centric approaches to security to explore the relational entanglements between geopolitical discourses and the ontological security of young people living through a moment of political change. We examine how everyday encounters with difference can reflect broader geopolitical narratives of security and insecurity, which subsequently trouble notions of ‘multicultural nationalism’ in Scotland and demonstrate ways that youth ‘securitize the self’ (Kinnvall, 2004). The paper responds to calls for empirical analyses of youth perspectives on nationalism and security (Benwell, 2016) and on the nexus between security and emotional subjectivity in critical geopolitics (Pain, 2009; Shaw et al., 2014). Funded by the Arts and Humanities Research Council (AHRC), this paper draws on focus group and interview data from 382 ethnic and religious minority young people in Scotland collected over the 12-month period of the campaign. Keywords: nationalism, young people, race and ethnicity, ontological security, everyday geopolitics
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicinechart. This process can be very strenuous and error-prone, given the number of sub-tasksinvolved in the entire workflow and the dynamic nature of the work environment.Therefore, efforts are being made to digitalise the medication dispensation process byintroducing a mobile application called Smart Dosing application. The introduction ofthe Smart Dosing application into hospital workflow raises security concerns and callsfor security requirement analysis. This thesis is written as a part of the smart medication management project at EmbeddedSystems Laboratory, A˚bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive state-of-the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
This study investigates the renegotiation of security alliances, specifically the structural conditions surrounding their revision. Although the field of international relations offers a rich discussion of the formation and violation of alliance treaties, few scholars have addressed the reasons why alliance members amend security obligations. After the formation of an alliance, a member may become dissatisfied owing to changes in the external and domestic security environments. A failure to address this discontent increases the risk of alliance breakdown. Members manage their alliance relationship through a negotiation process or intra-alliance bargaining in the search for a new arrangement that can endure. Factors that help to show commitment to the alliance and communicate a set of feasible solutions are crucial if members are to find a mutually acceptable arrangement. By taking these factors into account, allies are more likely to revise an existing treaty. Examining a set of bilateral alliances dating from 1945 to 2001, this research demonstrates that public requests for renegotiation compel allies to change the status quo. It is found that alliance-related fixed assets and the formation of external alliances increase the likelihood of treaty revision, though institutionalization of an alliance does not help to resolve interest divergence. In addition, this study examines the strategy of delay in intra-alliance bargaining. Allies may postpone a dispute by ignoring it while working to maintain the alliance. Tension among allies thus increases, but the alliance endures. I examine three alliances in order to illustrate this renegotiation process. Among these, the Anglo-Japanese alliance demonstrates two successful renegotiations that prolonged a wavering alliance relationship; the Sino-Soviet alliance is an example of failure owing to the lack of substantive cooperation; and the US-Taiwan alliance during the 1970s demonstrates successful use of a strategy of delay that appeases a dissatisfied member.
Resumo:
Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.
Resumo:
The aim of this special issue is to widen the existing debates on security privatization by looking at how and why an increasing number of private actors beyond private military and/or security companies (PMSCs) have come to perform various security related functions. While PMSCs produce security for profit, most other private sector actors make profit by selling goods and services that were originally not connected with security in the traditional understanding of the term. However, due to the continuous introduction of new legal and technical regulations by public authorities, many non- security related private businesses nowadays have to perform at least some security functions. Little research, however, has been done thus far, both in terms of security practices of non- security related private businesses and their impact on security governance. This introduction explains how this special issue contributes to closing this glaring gap by 1) extending the conceptual and theoretical arguments in the existing body of literature; and 2) offering a range of original case studies on the specific roles of non- security related private companies of all sizes, areas of businesses, and geographic origin.
Resumo:
The recent development of the concept of microgrid (μGrid), associated to the emergent interest in microgeneration (μGen), has raised a number of challenges regarding the evaluation of the technical, economical and regulatory impacts of a high penetration of this kind of solutions in the power systems. In this paper, the topic of security of supply is addressed, aiming at evaluating the influence of μGen and μGrids in the medium- and long-term availability of generation to serve the forecasted load. A Monte-Carlo based methodology is used to evaluate this influence and to assess the capacity credit of those entities.
Resumo:
Esta investigación se interesa en evaluar los logros y retos que ha presentado el proyecto ASEAN Community en cada una de sus tres áreas de acción (Comunidad económica, comunidad de política y seguridad, y comunidad socio-cultural) ante su aplicación en Tailandia. De esta manera, se busca analizar la incidencia que ha tenido el proyecto en el Desarrollo Humano de Tailandia durante el periodo 2004-2014. A través del análisis del estatus actual a la luz del concepto de libertades instrumentales se realiza la evaluación de los resultados de los proyectos y su conveniencia o no para el desarrollo humano de la sociedad tailandesa.
Resumo:
Con el fin de la Segunda Guerra Mundial y el escenario que planteaba la Guerra Fría, la manera de entender y explicar la seguridad en la comunidad internacional se amplió, y pasó de ser concebida únicamente en términos políticos y militares, a incluir aspectos como el medio ambiente, la economía y la sociedad. Por esta razón el concepto de seguridad se complejizó dando paso a la construcción de distintas definiciones y debates alrededor de la ampliación de la agenda de seguridad y los temas que en ella se debían tratar. Así pues el fin principal del presente trabajo es el análisis de un fenómeno socialmente relevante en el marco de las relaciones internacionales como lo es la configuración de seguridad, a partir de intervenciones de terceros actores que involucran poblaciones afectadas como en el caso somalí, la cual enfrentó una situación de crisis como producto de la emergencia de seguridad que se produce en el año 1991 con la expulsión de Siad Barre del poder. Su importancia radica en la reivindicación de la trascendencia tanto de los derechos humanos, como de la relevancia del papel de las organizaciones internacionales y de los Estados más poderosos del Sistema Internacional, en la protección de esos derechos y de las comunidades vulnerables que conforman dicho sistema.
Resumo:
El propósito del trabajo es exponer de qué manera el tráfico ilícito de armas pequeñas y ligeras constituye una amenaza a la seguridad en Guatemala durante el 2000 y 2005. La aproximación conceptual se centrará en las ideas de la Seguridad de Charles-Philippe David, puesto que servirá como herramienta para el análisis de la coyuntura guatemalteca. Así, se pretende dar cuenta del fortalecimiento de actores ilegales de crimen internacional organizado, narcotráfico, maras y pandillas, lo que da lugar al incremento de la violencia armada afectando diferentes esferas como la política, societal y económica.
Resumo:
El presente estudio de caso tiene como objetivo analizar la influencia de la gobernación de Tokio en la formulación de la política exterior de Japón durante la disputa territorial por las islas Senkaku/Diaoyu. Para ello, se identifican los puntos más relevantes de la política exterior de seguridad de Japón después de la Segunda Guerra Mundial. Se hace un énfasis en la política bilateral de seguridad sino-japonesa, con el fin de ubicar el conflicto territorial por las islas Senkaku/Diaoyu como un punto importante en la agenda internacional de seguridad de ambos países. Se estudia y analiza el concepto de paradiplomacia; articulado, a su vez, por los conceptos de identidad y rol en política exterior de la perspectiva teórica del Constructivismo de las Relaciones Internacionales, para así analizar la influencia de Tokio en el manejo de la política exterior de Japón en el marco del conflicto territorial por las islas Senkaku/Diaoyu.
Resumo:
Palaces, as an architectural typology, can be found in recreation Quintas that surrounded the main cities in Portugal, which preserved its rural character since the 16th century until the middle of the 19th century. Consisting of cultivated land and farm buildings, the palace of the Quinta was the owner´s temporary residence, for summer holidays and festive events, with gardens, pavilions, fountains and lakes for recreational purposes and leisure. The focus on palaces, as a historic building and as in need of new uses, clearly shows how current the debate on contemporary interventions in this heritage typology is. Interventions in architectural heritage require multidisciplinary teams to identify conservation strategies which enable a qualified use of its spaces, such as for example the experience of security and well-being, which can contribute to a better quality of life and simultaneously to the quality of the urban environment. This paper presents the Palace of Quinta Alegre and its rehabilitation project for contemporary use and public esteem, both of which are considered fundamental prerequisites for its sustainable maintenance in space, in time and in memory. [versão Portuguesa] Sob a denominação de tipologia arquitectónica, o edifício Palácio pode ser encontrado nas Quintas de Recreio que rodeavam as principais cidades Portuguesas, tendo preservado o seu carácter rural, desde o século XVI até metade do século XIX. Consistindo as Quintas em terra cultivada e edifícios rurais, o Palácio da Quinta consistia na residência temporária do proprietário, para férias de verão e eventos comemorativos, dispondo de jardins, pavilhões, fontes e lagos para recreação e lazer. O tema dos Palácios, entendido como edifício histórico que procura novos usos, demonstra como é actual o debate sobre intervenções contemporâneas nesta tipologia de valor patrimonial. A intervenção em património arquitectónico requer a definição de estratégias de conservação por equipas multidisciplinares que permitam estabelecer um uso qualificado dos seus espaços, proporcionando experiências sensoriais de bem-estar e segurança, contribuindo para uma melhor qualidade de vida e, simultaneamente, para a qualidade do ambiente urbano em que se insere. Este artigo tem por objectivo apresentar o Palácio da Quinta Alegre e o projecto de reabilitação, devolvendo-o a um uso contemporâneo e à estima pública, factores fundamentais para a sua manutenção sustentável no espaço, no tempo e na memória.