867 resultados para Security, International
Resumo:
This book provides a critical investigation into the discursive processes through which the North Atlantic Treaty Organisation (NATO)reproduced a geopolitical order after the end of the Cold War and the demise of its constitutive enemy, the Soviet Union.
Resumo:
This book is highly topical considering the recent resurgence of violence by the PKK, the incursions into Northern Iraq by the Turkish army and security forces and Turkey’s EU accession negotiations. Turkey has become an increasingly important player in Middle Eastern geopolitics. More than two decades of serious conflict in Turkey are proving to be a barrier to improved relations between Turkey and the EU. This book is the first study to address fully the legal and political dimensions of the conflict, and their impact on mechanisms for conflict resolution in the region, offering a scholarly exploration of a debate that is often politically and emotionally highly charged. Kerim Yildiz and Susan Breau look at the practical application of the law of armed conflicts to the ongoing situation in Turkey and Northern Iraq. The application of the law in this region also means addressing larger questions in international law, global politics and conflict resolution. Examples include belligerency in international law, whether the ‘war on terror’ has resulted in changes to the law of armed conflict and terrorism and conflict resolution. The Kurdish Conflict explores the practical possibilities of conflict resolution in the region, examining the political dynamics of the region, and suggesting where lessons can be drawn from other peace processes, such as in Northern Ireland. This book will be of great value to policy-makers, regional experts, and others interested in international humanitarian law and conflict resolution.
Resumo:
Existing research on the legitimacy of the UN Security Council is conceptual or theoretical, for the most part, as scholars tend to make legitimacy assessments with reference to objective standards. Whether UN member states perceive the Security Council as legitimate or illegitimate has yet to be investigated systematically; nor do we know whether states care primarily about the Council's compliance with its legal mandate, its procedures, or its effectiveness. To address this gap, our article analyzes evaluative statements made by states in UN General Assembly debates on the Security Council, for the period 1991–2009. In making such statements, states confer legitimacy on the Council or withhold legitimacy from it. We conclude the following: First, the Security Council suffers from a legitimacy deficit because negative evaluations of the Council by UN member states far outweigh positive ones. Nevertheless, the Council does not find itself in an intractable legitimacy crisis because it still enjoys a rudimentary degree of legitimacy. Second, the Council's legitimacy deficit results primarily from states' concerns regarding the body's procedural shortcomings. Misgivings as regards shortcomings in performance rank second. Whether or not the Council complies with its legal mandate has failed to attract much attention at all.
Resumo:
Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.
Resumo:
In the early 1970s, Panama’s negotiations with the United States over the status of the Panama Canal ground to a standstill. General Omar Torrijos had rejected treaties left unratified by previous governments only to receive a less generous offer from the Nixon administration. Realizing that the talks were being ignored in Washington, the Panamanian government worked to internationalize the previously bilateral issue, creating and exploiting a high-profile forum: Extraordinary meetings of the UN Security Council in March 1973 held in Panama City. In those meetings, Panama isolated the United States in order to raise the issue’s profile and amplify the costs of leaving the matter unsettled. Using underutilized Panamanian sources, this article examines that meeting, the succeeding progress, and the effect of this early stage on the final negotiations several years later. The case also illustrates how, during the unsettled international environment of the 1970s, a small state utilized international organizations to obtain attention and support for its most important cause.
Resumo:
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general validation conditions for a multi-layered policy model, i.e. necessary and sufficient conditions that a policy hierarchy must satisfy so that the lower-level policy sets are valid refinements of the higher-level policies according to the criteria of consistency and completeness. Relying upon the validation conditions and upon axioms about the model representativeness, two theorems are proved to ensure compliance between the resulting system behaviour and the abstract policies that are modelled.
Resumo:
The thesis focuses on, and tries to evaluate, the role that the African Union (AU) plays in protecting the peace and security on the African continent. The thesis takes an interdisciplinary approach to the topic by both utilizing international relations and international law theories. The two disciplines are combined in an attempt to understand the evolution of the AU’s commitment to the pragmatist doctrine: responsibility to protect (R2P). The AU charter is considered to be the first international law document to cover R2P as it allows the AU to interfere in the internal affairs of its member states. The R2P doctrine was evolved around the notion of a need to arrive at a consensus in regard to the right to intervene in the face of humanitarian emergencies. A part of the post-Cold War shift in UN behaviour has been to support local solutions to local problems. Hereby the UN acts in collaboration with regional organizations, such as the AU, to achieve the shared aspirations to maintain international peace and security without getting directly involved on the ground. The R2P takes a more holistic and long-term approach to interventions by including an awareness of the need to address the root causes of the crisis in order to prevent future resurrections of conflicts. The doctrine also acknowledges the responsibility of the international community and the intervening parties to actively participate in the rebuilding of the post-conflict state. This requires sustained and well planned support to ensure the development of a stable society.While the AU is committed to implementing R2P, many of the AU’s members are struggling, both ideologically and practically, to uphold the foundations on which legitimate intervention rests, such as the protection of human rights and good governance. The fact that many members are also among the poorest countries in the world adds to the challenges facing the AU. A lack of human and material resources leads to a situation where few countries are willing, or able, to support a long-term commitment to humanitarian interventions. Bad planning and unclear mandates also limit the effectiveness of the interventions. This leaves the AU strongly dependent on regional powerbrokers such as Nigeria and South Africa, which in itself creates new problems in regard to the motivations behind interventions. The current AU charter does not provide sufficient checks and balances to ensure that national interests are not furthered through humanitarian interventions. The lack of resources within the AU also generates worries over what pressure foreign nations and other international actors apply through donor funding. It is impossible for the principle of “local solutions for local problems? to gain ground while this donor conditionality exists.The future of the AU peace and security regime is not established since it still is a work in progress. The direction that these developments will take depends on a wide verity of factors, many of which are beyond the immediate control of the AU.
Resumo:
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. In a broad sense, security requirements arise within any data archival and retrieval system, however provenance presents unique requirements of its own. These requirements are additionally dependent on the architectural and environmental context that a provenance system operates in. We seek to analyze the security considerations pertaining to a Service Oriented Architecture based provenance system. Towards this end, we describe the components of such a system and illustrate the security considerations that arise within it. Concurrently, we outline possible approaches to address them.
Resumo:
Since the international financial and food crisis that started in 2008, strong emphasis has been made on the importance of Genetically Modified Organisms (GMOs) (or “transgenics”) under the claim that they could contribute to increase food productivity at a global level, as the world population is predicted to reach 9.1 billion in the year 2050 and food demand is predicted to increase by as much as 50% by 2030. GMOs are now at the forefront of the debates and struggles of different actors. Within civil society actors, it is possible to observe multiple, and sometime, conflicting roles. The role of international social movements and international NGOs in the GMO field of struggle is increasingly relevant. However, while many of these international civil society actors oppose this type of technological developments (alleging, for instance, environmental, health and even social harms), others have been reportedly cooperating with multinational corporations, retailers, and the biotechnology industry to promote GMOs. In this thesis research, I focus on analysing the role of “international civil society” in the GMO field of struggle by asking: “what are the organizing strategies of international civil society actors, such as NGOs and social movements, in GMO governance as a field of struggle?” To do so, I adopt a neo-Gramscian discourse approach based on the studies of Laclau and Mouffe. This theoretical approach affirms that in a particular hegemonic regime there are contingent alliances and forces that overpass the spheres of the state and the economy, while civil society actors can be seen as a “glue” to the way hegemony functions. Civil society is then the site where hegemony is consented, reproduced, sustained, channelled, but also where counter-hegemonic and emancipatory forces can emerge. Considering the importance of civil society actors in the construction of hegemony, I also discuss some important theories around them. The research combines, on the one hand, 36 in-depth interviews with a range of key civil society actors and scientists representing the GMO field of struggle in Brazil (19) and the UK (17), and, on the other hand, direct observations of two events: Rio+20 in Rio de Janeiro in 2012, and the first March Against Monsanto in London in 2013. A brief overview of the GMO field of struggle, from its beginning and especially focusing in the 1990s when the process of hegemonic formation became clearer, serves as the basis to map who are the main actors in this field, how resource mobilization works, how political opportunities (“historical contingencies”) are discovered and exploited, which are the main discourses (“science” and “sustainability” - articulated by “biodiversity preservation”, “food security” and “ecological agriculture”) articulated among the actors to construct a collective identity in order to attract new potential allies around “GMOs” (“nodal point”), and which are the institutions and international regulations within these processes that enable hegemony to emerge in meaningful and durable hegemonic links. This mapping indicates that that the main strategies applied by the international civil society actors are influenced by two central historical contingencies in the GMO field of struggle: 1) First Multi-stakeholder Historical Contingency; and 2) “Supposed” Hegemony Stability. These two types of historical contingency in the GMO field of struggle encompass deeper hegemonic articulations and, because of that, they induce international civil society actors to rethink the way they articulate and position themselves within the field. Therefore, depending on one of those moments, they will apply one specific strategy of discourse articulation, such as: introducing a new discourse in hegemony articulation to capture the attention of the public and of institutions; endorsing new plural demands; increasing collective visibility; facilitating material articulations; sharing a common enemy identity; or spreading new ideological elements among the actors in the field of struggle.
Resumo:
Includes bibliography
Resumo:
Includes bibliography