835 resultados para Security Studies - Military


Relevância:

30.00% 30.00%

Publicador:

Resumo:

While many studies have demonstrated the sensitivities of plants and of crop yield to a changing climate, a major challenge for the agricultural research community is to relate these findings to the broader societal concern with food security. This paper reviews the direct effects of climate on both crop growth and yield and on plant pests and pathogens and the interactions that may occur between crops, pests, and pathogens under changed climate. Finally, we consider the contribution that better understanding of the roles of pests and pathogens in crop production systems might make to enhanced food security. Evidence for the measured climate change on crops and their associated pests and pathogens is starting to be documented. Globally atmospheric [CO(2)] has increased, and in northern latitudes mean temperature at many locations has increased by about 1.0-1.4 degrees C with accompanying changes in pest and pathogen incidence and to farming practices. Many pests and pathogens exhibit considerable capacity for generating, recombining, and selecting fit combinations of variants in key pathogenicity, fitness, and aggressiveness traits that there is little doubt that any new opportunities resulting from climate change will be exploited by them. However, the interactions between crops and pests and pathogens are complex and poorly understood in the context of climate change. More mechanistic inclusion of pests and pathogen effects in crop models would lead to more realistic predictions of crop production on a regional scale and thereby assist in the development of more robust regional food security policies.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Why are some states more willing to adopt military innovations than others? Why, for example, were the great powers of Europe able to successfully reform their military practices to better adapt to and participate in the so-called military revolution of the sixteenth and seventeenth centuries while their most important extra-European competitor, the Ottoman Empire, failed to do so? This puzzle is best explained by two factors: civil-military relations and historical timing. In the Ottoman Empire, the emergence of an institutionally strong and internally cohesive army during the early stages of state formationâin the late fourteenth centuryâequipped the military with substantial bargaining powers. In contrast, the great powers of Europe drew heavily on private providers of military power during the military revolution and developed similar armies only by the second half of the seventeenth century, limiting the bargaining leverage of European militaries over their rulers. In essence, the Ottoman standing army was able to block reform efforts that it believed challenged its parochial interests. Absent a similar institutional challenge, European rulers initiated military reforms and motivated officers and military entrepreneurs to participate in the ongoing military revolution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Existing research on the legitimacy of the UN Security Council is conceptual or theoretical, for the most part, as scholars tend to make legitimacy assessments with reference to objective standards. Whether UN member states perceive the Security Council as legitimate or illegitimate has yet to be investigated systematically; nor do we know whether states care primarily about the Council's compliance with its legal mandate, its procedures, or its effectiveness. To address this gap, our article analyzes evaluative statements made by states in UN General Assembly debates on the Security Council, for the period 1991â2009. In making such statements, states confer legitimacy on the Council or withhold legitimacy from it. We conclude the following: First, the Security Council suffers from a legitimacy deficit because negative evaluations of the Council by UN member states far outweigh positive ones. Nevertheless, the Council does not find itself in an intractable legitimacy crisis because it still enjoys a rudimentary degree of legitimacy. Second, the Council's legitimacy deficit results primarily from states' concerns regarding the body's procedural shortcomings. Misgivings as regards shortcomings in performance rank second. Whether or not the Council complies with its legal mandate has failed to attract much attention at all.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The reestablishment of democracy in Chile has seen an intense debate about the events of the recent past, especially on the issue of human rights. From the very beginning, the Concertacion Government has been determined to discover the truth of the repression carried out by the national security forces with a series of commissions that have gathered the testimonies of victims and their relatives. These efforts have been resisted by conservative sectors linked to the dictatorship and the Armed Forces. There has been intense conflict in the media during the past 20 years about events that occurred during the rule of Salvador Allende and the Military Regime. In this regard, a great diversity of information has been produced which, together with the debate evoked, has enabled historians not only to rigorously and thoroughly reconstruct the operation of the state terror but also to explain how a significant sector of Chileâs civil society allowed that situation. This article presents, on one hand, different methodological tools in order to study the recent past and, on the other hand, the social discussion on how to do it.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The narrative of the United States is of a "nation of immigrants" in which the language shift patterns of earlier ethnolinguistic groups have tended towards linguistic assimilation through English. In recent years, however, changes in the demographic landscape and language maintenance by non-English speaking immigrants, particularly Hispanics, have been perceived as threats and have led to calls for an official English language policy.This thesis aims to contribute to the study of language policy making from a societal security perspective as expressed in attitudes regarding language and identity originating in the daily interaction between language groups. The focus is on the role of language and American identity in relation to immigration. The study takes an interdisciplinary approach combining language policy studies, security theory, and critical discourse analysis. The material consists of articles collected from four newspapers, namely USA Today, The New York Times, Los Angeles Times, and San Francisco Chronicle between April 2006 and December 2007.Two discourse types are evident from the analysis namely Loyalty and Efficiency. The former is mainly marked by concerns of national identity and contains speech acts of security related to language shift, choice and English for unity. Immigrants are represented as dehumanised, and harmful. Immigration is given as sovereignty-related, racial, and as war. The discourse type of Efficiency is mainly instrumental and contains speech acts of security related to cost, provision of services, health and safety, and social mobility. Immigrants are further represented as a labour resource. These discourse types reflect how the construction of the linguistic 'we' is expected to be maintained. Loyalty is triggered by arguments that the collective identity is threatened and is itself used in reproducing the collective 'we' through hegemonic expressions of monolingualism in the public space and semi-public space. The denigration of immigrants is used as a tool for enhancing societal security through solidarity and as a possible justification for the denial of minority rights. Also, although language acquisition patterns still follow the historical trend of language shift, factors indicating cultural separateness such as the appearance of speech communities or the use of minority languages in the public space and semi-public space have led to manifestations of intolerance. Examples of discrimination and prejudice towards minority groups indicate that the perception of worth of a shared language differs from the actual worth of dominant language acquisition for integration purposes. The study further indicates that the efficient working of the free market by using minority languages to sell services or buy labour is perceived as conflicting with nation-building notions since it may create separately functioning sub-communities with a new cultural capital recognised as legitimate competence. The discourse types mainly represent securitising moves constructing existential threats. The perception of threat and ideas of national belonging are primarily based on a zero-sum notion favouring monolingualism. Further, the identity of the immigrant individual is seen as dynamic and adaptable to assimilationist measures whereas the identity of the state and its members are perceived as static. Also, the study shows that debates concerning language status are linked to extra-linguistic matters. To conclude, policy makers in the US need to consider the relationship between four factors, namely societal security based on collective identity, individual/human security, human rights, and a changing linguistic demography, for proposed language intervention measures to be successful.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book is a collection of papers originally presented at a workshop entitled 'After Nine Eleven: Ethics in the Time of Terror' hosted by Monash University on 24 June 2005. The workshop participants included members of the Ethics of War and Peace (EWAP) working group which was inaugurated at the first Oceanic Conference on International Studies in July 2004. EWAP provides a cross-disciplinary forum for scholars and non-academic professionals to exchange and debate ideas on topics including the ethics of armed intervention, the Just War, pacifist ethics, international humanitarian law, ethics in the military profession, and the relationship between law, ethics and politics.<br /><br />The chapters within this book examine themes including 'lesser evils' and 'dirty hands' in the fight against terrorism, the ethics of intelligence gathering, humanitarian intervention, terrorism and the North-South divide, cultural equality as a response to terrorism, human rights and counterterrorism legislation, and the ethics of defending against 'bioterrorism'.&nbsp;<br /><br />Contributors include Alex Bellamy and Richard Devetak (University of Queensland), Baogang He (Deakin University), Christopher Michaelsen (Office for Democratic Institutions and Human Rights, Organization for Security and Co-operation in Europe), Jeremy Moses (University of Canterbury), Christian Enemark and Hugh Smith (University of New South Wales, Australian Defence Force Academy).<br />

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the wake of the Bali bombing the Australian government has proposed a number of national security measures that pose a real danger to human security in Australia and the region. These measures include renewed and increased military and intelligence exchanges with Indonesia, and laws that allow the Australian Security Intelligence Organization (ASIO) to detain people without charge or even suspicion in order to gather intelligence. In less emotional times these initiatives would be rejected as contrary to human rights concerns and Australia&rsquo;s democratic traditions, which include the rule of law and due process protections. In the current climate, however, human rights and civil liberties are apt to be portrayed as unaffordable luxuries.<br /><br />

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches. <br />

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Researchers investigating the decline of potential applicants for principalships have demonstrated that teachers perceive there to be a significant problem in current selection procedures. This article reports an investigation in two Australian states into principal selection. Drawing on a corpus of interviews, two case studies and administrative guidelines, we highlight five key problems in the interview process: (1) the dependence of selection panels on a written application; (2) the dilemma of experience versus potential; (3) the covert rule about the appointment of preferred applicants; (4) the quandary of panel competency; and (5) the evidence of inconsistency of decisions. We argue that the selection process amounts to a reproductive technology which, in the quest for certainty and safety, results in particular kinds of people being successful. This amounts we suggest, whether the selection process is managed by progressive or conservative personnel, to a form of homosociability the tendency to select people just like oneself.<br />

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite recent advances in the area of humanitarian responses and the publication and dissemination of various guidelines with regard to nutritional interventions, there is, however a paucity of studies which have examined the human right to food in complex emergencies. 186 countries including those affected by both human made and natural disasters and countries who are donors of humanitarian relief aid adopted the Rome Declaration on Food Security and World Summit plan of Action reaffirming &ldquo; the right to adequate food and the fundamental right of everyone to be free from hunger&rdquo;. The human right to adequate and nutritious food in refugee settings implies that every refugee has physical and economic access to sufficient food to provide the necessary nutrients for effective physical and physiological functions and achieve well being. There are many grounds for believing that the current humanitarian responses to disasters more often violate than respect the human right to adequate and nutritious food. Using elements of household food security as our working framework this paper focuses on the complex ethical and moral questions raised by the conventional humanitarian assistance framework and in particular the issue of human right to food and household food security in refugee settings.<br />

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper addresses the role of security in the collaborative e-learning environment, and in particular, the social aspects of security and the importance of identity. It represents a case study, completed in Nov 2004, which was conducted to test the sense of security that students experienced whilst using the wiki platform as a means of online collaboration in the tertiary education environment. Wikis, fully editable Web sites, are easily accessible, require no software and allow its contributors (in this case students) to feel a sense of responsibility and ownership. A comparison between two wiki studies will be made whereby one group employed user login and the other maintained anonymity throughout the course of the study. The results consider the democratic participation and evolution of the work requirements over time, which in fact ascertains the nonvalidity of administrative identification. <br />

Relevância:

30.00% 30.00%

Publicador: