969 resultados para security model


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study investigated the development of emotional security among 6-10 year old children who have been adopted by exposing them to an experimental condition during which they could engage with either a live dog or a robotic dog. The live dog was a certified therapy dog; the robotic dog was a FurReal® toy marketed by Hasbro as "Biscuit." Utilizing a mixed-method embedded experimental design, the experimental condition was intentionally structured to promote engagement between the participant and the dog or robot. 43 children who had been adopted from the child welfare system were randomly assigned to one of two groups. One group was exposed to a therapy dog (n=22), while another was exposed to the social robotic dog (n=21). The development of emotional security was targeted for measurement in this study using the "Reading the Mind in the Eyes Test," a test of social understanding that has been linked in the literature to oxytocin- a hormone premised to be a marker of the development of emotional security. Physiological anxiety was also measured as an indicator of emotional security using the Revised Child Manifest Anxiety Scale-2 (RCMAS-2). Both measures were administered before and after exposure to the experimental condition. A linear mixed-effect regression analysis showed that for boys only, there was a significant effect of engagement with either companion on social understanding (p<.01). Social understanding decreased as engagement increased. A second model indicated that for boys only, their history of animal cruelty had a significant effect on physiological anxiety (p<.05). If boys had an animal cruelty history, their anxiety was reduced after the exposure to either the dog or robot. Interpretations of the findings suggest that there are differences among children who have been adopted and have a history of animal cruelty that differentially influences their development of emotional security. Social work interventions designed for practice with children who have been adopted will need to assess the presence of these variations and develop appropriate treatment protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The similarity of issues and geographical proximity have led the Visegrad 4 countries (V4) to undertake closer collaboration in natural gas policy, notably by agreeing on a common security of supply strategy, including regional emergency planning, and a common implementation of the Gas Target Model (GTM) that European regulators have proposed for the medium-long term design of the EU gas market, and which has been endorsed by the Madrid Regulatory Forum. As a contribution to this collaboration, the present paper will analyse how the GTM may be implemented in the V4 region, with a view to maximize the benefits that arise from joint implementation. A most relevant conclusion of the GTM is that markets should be large enough to attract market players and investments, so that sufficient diversity of sources may be reached and market power indicators are kept below dangerous levels. In most cases, this requires physical and/or virtual interconnection of present markets, which is also useful to achieve the required security of supply standards, as envisaged in the Regulation 994/2010/EC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Within recent years, increasing international competition has caused an increase in job transitions worldwide. Many countries find it difficult to manage these transitions in a way that ensures a match between labour and demand. One of the countries that seem to manage the transitions in a successful way is Denmark, where unemployment has been dropping dramatically over the last decade without a drop in job quality. This success is ascribed the so-called Danish flexicurity model, where an easy access to hiring and firing employees (flexibility) is combined with extensive active and passive labour market policies (security). The Danish results have gained interest not only among other European countries, where unemployment rates remain high, but also in the US, where job loss is often related to lower job quality. It has, however, been subject to much debate both in Europe and in the US, whether or not countries with distinctively different political-economic settings can learn from one another. Some have argued that cultural differences impose barriers to successful policy transfer, whereas others see it as a perfectly rational calculus to introduce 'best practices' from elsewhere. This paper presents a third strategy. Recent literature on policy transfer suggests that successful cross national policy transfer is possible, even across the Atlantic, but that one must be cautious in choosing the form, content and level of the learning process. By analysing and comparing the labour market policies and their settings in Denmark and the US in detail, this paper addresses the question, what and how the US can learn from the Danish model. Where the US and Denmark share a high degree of flexibility, they differ significantly on the level of security. This also means that the Danish budget for active and passive labour market policies is significantly higher than the American, and it seems unlikely that political support for the introduction of Danish levels of security in the US can be established. However, the paper concludes that there is a learning potential between the US and Demnark in the different local level efficiency of the money already spent. A major reason for the Danish success has been the introduction of tailor made initiatives to the single displaced worker and a stronger coordination between local level actors. Both of which are issues, where a lack of efficiency in the implementation of American active labour market policies has been reported.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the main EU-level initiatives that have been put forward in the weeks following the attacks in Paris in January 2015, which will be discussed in the informal European Council meeting of 12 February 2015. It argues that a majority of these proposals predated the Paris shootings and had until that point proved contentious as regards their efficacy, legitimacy and lawfulness. The paper finds that EU counterterrorism responses raise two fundamental challenges: A first challenge is posed to the freedom of movement, Schengen and EU citizenship. Priority is being given to the expanded use of large-scale surveillance and systematic monitoring of all travellers including EU citizens, which stands in contravention of Schengen and the free movement principle. A second challenge concerns EU democratic rule of law. Current pressures calling for the adoption of measures such as the EU Passenger Name Record challenge the scrutiny roles held by the European Parliament and the Court of Justice of the EU on counterterrorism measures in a post-Lisbon Treaty setting. The paper proposes that the EU adopts a new European Agenda on Security and Liberty based on an EU security (criminal justice-led) cooperation model that is firmly anchored in current EU legal principles and rule of law standards. This model would call for ‘less is more’ concerning the use, processing and retention of data by police and intelligence communities. Instead, it would pursue better and more accurate use of data meeting the quality standards of evidence in criminal judicial proceedings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Russia alleges that at the end of the Cold War it underwent a soft version of a Versailles Treaty, pushing it into the periphery of global politics and cutting it out of European decision-making. The crisis in Ukraine is about the survival of Putin’s regime and the dismantling of the post-Cold War settlement. We should not accept the fallacious narrative of victimhood propagated by the Kremlin’s Versailles syndrome. Even so, it is time to explore practical ways of coexisting with Russia. The Helsinki Process and the disarmament and arms control agreements of the Cold War could serve as a model for a mutually acceptable security architecture.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Communication is a key element of diplomatic activity. In the 21st century, the shift from the traditional model of state diplomacy to a post-Westphalian, multi-stakeholder diplomacy has also had an impact on communication within diplomatic systems. In this Policy Brief, Juliane Schmidt (EPC Programme Assistant) argues that the EU should work on developing a more networked communications model so that the European External Action Service (EEAS) can communicate more effectively with all stakeholders of EU external action. Only then can the EEAS shape comprehensive foreign policy strategies and unlock its true potential as a central coordinator for EU external action.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the EU’s counter-terrorism policies responding to the Paris attacks of 13 November 2015. It argues that these events call for a re-think of the current information-sharing and preventive-justice model guiding the EU’s counter-terrorism tools, along with security agencies such as Europol and Eurojust. Priority should be given to independently evaluating ‘what has worked’ and ‘what has not’ when it comes to police and criminal justice cooperation in the Union. Current EU counter-terrorism policies face two challenges: one is related to their efficiency and other concerns their legality. ‘More data’ without the necessary human resources, more effective cross-border operational cooperation and more trust between the law enforcement authorities of EU member states is not an efficient policy response. Large-scale surveillance and preventive justice techniques are also incompatible with the legal and judicial standards developed by the Court of Justice of the EU. The EU can bring further added value first, by boosting traditional policing and criminal justice cooperation to fight terrorism; second, by re-directing EU agencies’ competences towards more coordination and support in cross-border operational cooperation and joint investigations, subject to greater accountability checks (Europol and Eurojust +); and third, by improving the use of policy measures following a criminal justice-led cooperation model focused on improving cross-border joint investigations and the use of information that meets the quality standards of ‘evidence’ in criminal judicial proceedings. Any EU and national counter-terrorism policies must not undermine democratic rule of law, fundamental rights or the EU’s founding constitutional principles, such as the free movement of persons and the Schengen system. Otherwise, these policies will defeat their purpose by generating more insecurity, instability, mistrust and legal uncertainty for all.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The European Union (EU) is seen as the leading actor in successfully fighting piracy around the Horn of Africa. As a global trade power with strong economic interests, the EU is also challenged by similar maritime security threats in the Gulf of Guinea. To date, there has been no comprehensive analysis to assess the potential transfer of successful EU instruments from the Horn of Africa to the piracy situation in West African waters. This paper examines to what extent the EU can draw on its experience made in the Horn of Africa to deter piracy in West African waters. Based on qualitative research interviews, lessons learned from East Africa are identified and subsequently applied to the situation in the Gulf of Guinea. The results show that the EU is only partially drawing on its experience made in the Horn of Africa. One the one hand, it is rather reluctant to use crisis management instruments such as naval operations. On the other hand, the EU is drawing on its successful leadership in international political and military cooperation from around the Horn of Africa in order to make more effective use of available resources in the Gulf of Guinea.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

What is happening to the Schengen borders? Is Schengen in ‘crisis’? This paper examines the state of play in the Schengen system in light of the developments during 2015. It critically examines the assertion that Schengen is ‘in crisis’ and seeks to set the record straight on what has been happening to the intra-Schengen border-free and common external borders system. The paper argues that Schengen is here to stay and that reports about the reintroduction of internal border checks are exaggerated as they are in full compliance with the EU rule of law model laid down in the Schengen Borders Code and subject to scrutiny by the European Commission. It also examines the legal challenges inherent to police checks within the internal border areas as having an equivalent effect to border checks as well as the newly adopted proposal for a European Border and Coast Guard system. The analysis shows that the most far-reaching challenge to the current and future configurations of EU border policies relates to ensuring that they are in full compliance with fundamental human rights obligations to refugees, effective accountability and independent monitoring of the implementation of EU legal standards. This should be accompanied by a transparent and informed discussion on which ‘Schengen’ and which 'common European Border and Coast Guard Agency' we exactly want within current democratic rule of law and fundamental rights remits.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The main goal of this thesis is to report patterns of perceived safety in the context of airport infrastructure, taking the airport of Bologna as reference. Many personal and environmental attributes are investigated to paint the profile of the sensitive passenger and to understand why precise factors of the transit environment are so impactful on the individual. The main analyses are based on a 2014-2015 passengers’ survey, involving almost six thousand of incoming and outgoing passengers. Other reports are used to implement and support the resource. The analysis is carried out by using a combination of Chi-square tests and binary logistic regressions. Findings shows that passengers result to be particularly affected by the perception of airport’s environment (e.g., state and maintenance of facilities, clarity and efficacy of information system, functionality of elevators and escalators), but also by the way how the passenger reaches the airport and the quality of security checks. In relation to such results, several suggestions are provided for the improvement of passenger satisfaction with safety. The attention is then focused on security checkpoints and related operations, described on a theoretical and technical ground. We present an example of how to realize a proper model of the security checks area of Bologna’s airport, with the aim to assess present performances of the system and consequences of potential variations. After a brief introduction to Arena, a widespread simulation software, the existing model is described, pointing out flaws and limitations. Such model is finally updated and changed in order to make it more reliable and more representative of the reality. Different scenarios are tested and results are compared using graphs and tables.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.