785 resultados para Governance of security
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
Resumo:
This article explores policy approaches to educating populations for potential critical infrastructure collapse in five different countries: the UK, the US, Germany, Japan and New Zealand. ‘Critical infrastructure’ is not always easy to define, and indeed is defined slightly differently across countries – it includes entities vital to life, such as utilities (water, energy), transportation systems and communications, and may also include social and cultural infrastructure. The article is a mapping exercise of different approaches to critical infrastructure protection and preparedness education by the five countries. The exercise facilitates a comparison of the countries and enables us to identify distinctive characteristics of each country’s approach. We argue that contrary to what most scholars of security have argued, these national approaches diverge greatly, suggesting that they are shaped more by internal politics and culture than by global approaches.
Resumo:
Induced pluripotent stem cells (iPSc) have great potential for applications in regenerative medicine, disease modeling and basic research. Several methods have been developed for their derivation. The original method of Takahashi and Yamanaka involved the use of retroviral vectors which result in insertional mutagenesis, presence in the genome of potential oncogenes and effects of residual transgene expression on differentiation bias of each particular iPSc line. Other methods have been developed, using different viral vectors (adenovirus and Sendai virus), transient plasmid transfection, mRNA transduction, protein transduction and use of small molecules. However, these methods suffer from low efficiencies; can be extremely labor intensive, or both. An additional method makes use of the piggybac transposon, which has the advantage of inserting its payload into the host genome and being perfectly excised upon re-expression of the transposon transposase. Briefly, a policistronic cassette expressing Oct4, Sox2, Klf4 and C-Myc flanked by piggybac terminal repeats is delivered to the cells along with a plasmid transiently expressing piggybac transposase. Once reprogramming occurs, the cells are re-transfected with transposase and subclones free of tranposon integrations screened for. The procedure is therefore very labor intensive, requiring multiple manipulations and successive rounds of cloning and screening. The original method for reprogramming with the the PiggyBac transposon was created by Woltjen et al in 2009 (schematized here) and describes a process with which it is possible to obtain insert-free iPSc. Insert-free iPSc enables the establishment of better cellular models of iPS and adds a new level of security to the use of these cells in regenerative medicine. Due to the fact that it was based on several low efficiency steps, the overall efficiency of the method is very low (<1%). Moreover, the stochastic transfection, integration, excision and the inexistence of an active way of selection leaves this method in need of extensive characterization and screening of the final clones. In this work we aime to develop a non-integrative iPSc derivation system in which integration and excision of the transgenes can be controlled by simple media manipulations, avoiding labor intensive and potentially mutagenic procedures. To reach our goal we developed a two vector system which is simultaneously delivered to original population of fibroblasts. The first vector, Remo I, carries the reprogramming cassette and GFP under the regulation of a constitutive promoter (CAG). The second vector, Eneas, carries the piggybac transposase associated with an estrogen receptor fragment (ERT2), regulated in a TET-OFF fashion, and its equivalent reverse trans-activator associated with a positive-negative selection cassette under a constitutive promoter. We tested its functionality in HEK 293T cells. The protocol is divided in two the following steps: 1) Obtaining acceptable transfection efficiency into human fibroblasts. 2) Testing the functionality of the construct 3) Determining the ideal concentration of DOX for repressing mPB-ERT2 expression 4) Determining the ideal concentration of TM for transposition into the genome 5) Determining the ideal Windows of no DOX/TM pulse for transposition into the genome 6) 3, 4 and 5) for transposition out of the genome 7) Determination of the ideal concentration of GCV for negative selection We successfully demonstrated that ENEAS behaved as expected in terms of DOX regulation of the expression of mPB-ERT2. We also demonstrated that by delivering the plasmid into 293T HEK cells and manipulating the levels of DOX and TM in the medium, we could obtain puromycin resistant lines. The number of puromycin resistant colonies obtained was significantly higher when DOX as absent, suggesting that the colonies resulted from transposition events. Presence of TM added an extra layer of regulation, albeit weaker. Our PCR analysis, while not a clean as would be desired, suggested that transposition was indeed occurring, although a background level of random integration could not be ruled out. Finally, our attempt to determine whether we could use GVC to select clones that had successfully mobilized PB out of the genome was unsuccessful. Unexpectedly, 293T HEK cells that had been transfected with ENEAS and selected for puromycin resistance were insensitive to GCV.
Resumo:
The provision of reserves in power systems is of great importance in what concerns keeping an adequate and acceptable level of security and reliability. This need for reserves and the way they are defined and dispatched gain increasing importance in the present and future context of smart grids and electricity markets due to their inherent competitive environment. This paper concerns a methodology proposed by the authors, which aims to jointly and optimally dispatch both generation and demand response resources to provide the amounts of reserve required for the system operation. Virtual Power Players are especially important for the aggregation of small size demand response and generation resources. The proposed methodology has been implemented in MASCEM, a multi agent system also developed at the authors’ research center for the simulation of electricity markets.
Resumo:
Outrora dominado por ameaças provenientes de Estados-nação, o cenário global actual, dominado por uma rápida mudança de poderes que nos apresenta uma interacção complexa entre múltiplos actores, onde inimigos desconhecidos, anteriormente bem identificados, é actualmente controlado por grupos terroristas bem preparados e bem organizados. Hezbollah é reconhecido como um dos grupos terroristas mais capazes, com uma extensa rede fora do Líbano dedicada a tráfico de droga, armas e seres humanos, tal como o branqueamento de capitais para financiar o terrorismo, representando um grande foco de instabilidade à segurança. Como instrumento de Estado, os serviços de informações detêm a capacidade de estar na linha da frente na prevenção e combate ao terrorismo. Todavia, para compreender este fenómeno é necessário analisar os actores desta ameaça. À luz desta conjuntura, esta dissertação está dividida em três capítulos principais que visam responder às seguintes questões fundamentais: O que é o terrorismo? Como opera um grupo terrorista transnacional? Será que os serviços de informações têm as ferramentas necessárias para prevenir e combater estas ameaças?
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
During the 1980's and for much of the 1990's, many countries in the Asia Pacific were renowned for their economic development and prosperity. The Asian tigers were a source of great interest for many economists and international investors. The 1997 Asian financial crisis, however, dramatically altered the growth and the performance of these economies. The crisis sent several ofAsia's best performing economies on a downward spiral from which many have yet to fully recover. The crisis exposed the financial and the political weaknesses ofmany countries in the region. Moreover, the crisis severely affected the wellbeing and the security ofmany ofthe region's citizens. This text will examine the economic crisis in greater detail and explore current debates in the study of international relations theory. More specifically, this paper will examine recent challenges posed to traditional international relations theory and address alternative approaches to this field of study. This paper will examine Critical theory and its role in shifting the referent object of security from the state to the individual. In this context, this paper will also assess Critical theory's role in enabling such issues as gender and human security to find a place on the agendas of international relations scholars and foreign policy makers. The central focus ofthis study will be the financial crisis and its impact on human security in the Southeast Asia. Furthermore, this paper will assess the recovery efforts ofthe domestic governments, international organizations and various Canadian sponsored initiatives in the context ofhuman security.
Resumo:
The use of certain perfonnance enhancing substances and methods has been defined as a major ethical breach by parties involved in the governance of highperfonnance sport. As a result, elite athletes worldwide are subject to rules and regulations set out in international and national anti-doping policies. Existing literature on the development of policies such as the World Anti-Doping Code and The Canadian antiDoping Program suggests a sport system in which athletes are rarely meaningfully involved in policy development (Houlihan, 2004a). Additionally, it is suggested that this lack of involvement is reflective of a similar lack of involvement in other areas of governance concerning athletes' lives. The purpose ofthis thesis is to examine the history and current state of athletes' involvement in the anti-doping policy process in Canada's high-perfonnance sport system. It includes discussion and analysis of recently conducted interviews with those involved in the policy process as well as an analysis of relevant documents, including anti-doping policies. The findings demonstrate that Canadian athletes have not been significantly involved in the creation of recently developed antidoping policies and that a re-evaluation of current policies is necessary to more fully recognize the reality of athletes' lives in Canada's high-perfonnance sport system and their rights within that system.
Resumo:
This qualitative study explores Thomas Green's (1999) treatise, Voices: The Educational Formation of Conscience; for the purpose of reconstruing the transformative usefulness of conscience in moral education. Conscience is "reflexive judgment about things that matter" (Green, 1999, p. 21). Paul Lehmann (1963) suggested that we must "do the conscience over or do the conscience in" (p. 327). Thomas Green "does the conscience over", arguing that a philosophy of moral education, and not a moral philosophy, provides the only framework from which governance of moral behaviour can be understood. Narratives from four one-to-one interviews and a focus group are analysed and interpreted in search of: (a) awareness and understanding of conscience, (b) voices of conscience, (c) normation, (d) reflexive emotions, and (e) the idea of the sacred. Participants in this study (ages 16-21) demonstrated an active awareness of their conscience and a willingness to engage in a reflective process of their moral behaviour. They understood their conscience to be a process of self-judgment about what is right and wrong, and that its authority comes from within themselves. Narrative accounts from childhood indicated that conscience is there "from the beginning" with evidence of selfcorrecting behaviour. A maturing conscience is accompanied by an increased cognitive capacity, more complicated life experiences, and individualization. Moral motivation was grounded in " a desire to connect with things that are most important." A model for conscience formation is proposed, which visualizes a critical path of reflexive emotions. It is argued that schools, striving to shape good citizens, can promote conscience formation through a "curriculum of moral skills"; a curriculum that embraces complexity, diversity, social criticism, and selfhood.
Resumo:
Watersheds are complex systems involving social, economic, and ecological dimensions that are constantly interacting and influencing each other, and governance of these systems involve a large and diverse cast of actors that add to the complexity and difficulty in deciding what is best for the watershed and people. Resilience thinking offers a way to understand and navigate the uncertainty, dynamics and complexity of watershed governance. This primer describes key ideas associated with resilience: more inclusive participation; building a shared understanding; inclusion of ecosystem services and functions in long-term planning; strong leadership; institutional and decision making flexibility; and, a decentralized system. This primer is an initial effort to translate the scholarly understanding of these key ideas and initiate a dialogue about their application in the context of watershed governance.
Resumo:
À l’ère de la mondialisation institutionnelle des sociétés modernes, alors que la confluence d’une myriade d’influences à la fois micro et macro-contextuelles complexifient le panorama sociopolitique international, l’intégration de l’idéal participatif par les processus de démocratisation de la santé publique acquiert l’apparence d’une stratégie organisationnelle promouvant la cohésion des multiples initiatives qui se tissent simultanément aux échelles locale et globale. L’actualisation constante des savoirs contemporains par les divers secteurs sociétaux ainsi que la perception sociale de différents risques conduisent à la prise de conscience des limites de la compétence technique des systèmes experts associés au domaine de la santé et des services sociaux. La santé publique, une des responsables légitimes de la gestion des risques modernes à l’échelle internationale, fait la promotion de la création d’espaces participatifs permettant l’interaction mutuelle d’acteurs intersectoriels et de savoirs multiples constamment modifiables. Il s’agit là d’une stratégie de relocalisation institutionnelle de l’action collective afin de rétablir la confiance envers la fiabilité des représentants de la santé publique internationale, qui ne répondent que partiellement aux besoins actuels de la sécurité populationnelle. Dans ce contexte, les conseils locaux de santé (CLS), mis en place à l’échelle internationale dans le cadre des politiques régionales de décentralisation des soins de santé primaires (SSP), représentent ainsi des espaces participatifs intéressants qui renferment dans leur fonctionnement tout un univers de forces de tension paradoxales. Ils nous permettent d’examiner la relation de caractère réciproque existant entre, d’une part, une approche plus empirique par l’analyse en profondeur des pratiques participatives (PP) plus spécifiques et, d’autre part, une compréhension conceptuelle de la mondialisation institutionnelle qui définit les tendances expansionnistes très générales des sociétés contemporaines. À l’aide du modèle de la transition organisationnelle (MTO), nous considérons que les PP intégrées à la gouverne des CLS sont potentiellement porteuses de changement organisationnel, dans le sens où elles sont la condition et la conséquence de nombreuses traductions stratégiques et systémiques essentiellement transformatrices. Or, pour qu’une telle transformation puisse s’accomplir, il est nécessaire de développer les compétences participatives pertinentes, ce qui confère au phénomène participatif la connotation d’apprentissage organisationnel de nouvelles formes d’action et d’intervention collectives. Notre modèle conceptuel semble fournir un ensemble de considérations épistémosociales fort intéressantes et très prometteuses permettant d’examiner en profondeur les dimensions nécessaires d’un renouvellement organisationnel de la participation dans le champ complexe de la santé publique internationale. Il permet de concevoir les interventions complexes comme des réseaux épistémiques de pratiques participatives (RÉPP) rassemblant des acteurs très diversifiés qui s’organisent autour d’un processus de conceptualisation transculturelle de connaissances ainsi que d’opérationnalisation intersectorielle des actions, et ce, par un ensemble de mécanismes d’instrumentalisation organisationnelle de l’apprentissage. De cette façon, le MTO ainsi que la notion de RÉPP permettent de mieux comprendre la création de passages incessants entre l’intégration locale des PP dans la gouverne des interventions complexes de la santé et des services sociaux – tels que les CLS –, et les processus plus larges de réorganisation démocratique de la santé publique dans le contexte global de la mondialisation institutionnelle. Cela pourrait certainement nous aider à construire collectivement l’expression réflexive et manifeste des valeurs démocratiques proposées dans la Déclaration d’Alma-Ata, publiée en 1978, lors de la première Conférence internationale sur les SSP.
Resumo:
Certains symptômes sont les indicateurs incontestés des très graves problèmes que connaît l’Église. S’ils existent aussi dans des confessions et des religions diverses, seuls seront examinés ici ceux qui concernent l’Église catholique. Parmi les plus significatifs figurent un fort déclin dans la participation à des activités religieuses comme les célébrations eucharistiques dominicales, surtout chez les jeunes, une pénurie presque catastrophique de prêtres ordonnés, une perte de prestige et d’influence de l’enseignement dispensé par l’Église. Ces symptômes varient en intensité selon les pays, mais les statistiques indiquent qu’ils se multiplient. Nombre de ces problèmes sont attribuables à l’extrême vélocité de changements qui surviennent partout et à l’apparente inaptitude de l’Église à s’adapter, en raison notamment de son attachement à la pensée néo-scolastique et à la tradition tridentine. Cette fidélité absolue à une tradition vieille de quatre cents ans l’empêche de se faire à un environnement en évolution rapide et radicale. Des changements appropriés s’imposent pratiquement partout dans l’Église. Or, pour que ceux-ci soient efficaces et respectueux de la nature propre de l’Église, la tradition est un guide qui ne suffit pas. S’appuyant sur les termes de l’encyclique Ecclesia de Eucharistia, « le moment décisif où elle (l’Église) a pris forme est certainement celui où a eu lieu l’institution de l’Eucharistie, dans la chambre à l’étage », la thèse présentée suit le plus près possible l’interprétation donnée aux paroles de Jésus, ceci est mon corps, telles qu’elles ont été prononcées la première fois. Selon cette évidence, il est permis d’affirmer que les caractéristiques définitoires de l’Église provenant de ces mots sont agape, unité, service. Tel doit être le principe directeur des changements. C’est sur une telle base que sont décrits les secteurs où les changements s’imposent ainsi que les aspects visés. Ces changements comprennent les points suivants : liturgie, sacrements, catéchèse, mystagogie, théologie, structure, gouvernance de l’Église et ses enseignements, évangélisation. Ces secteurs exigent des efforts sérieux dans la préparation des personnes touchées par ces changements et dans l’attention portée à l’exigence primordiale voulant qu’agape, unité et service soient les principes actifs et évidents régissant l’Église.
Resumo:
Many studies have focused on the concept of humanization of birth in normal pregnancy cases or at low obstetric risk, but no studies, at our knowledge, have so far specifically focused on the humanization of birth in both high-risk, and low risk pregnancies, in a highly specialized hospital setting. The present study thus aims to: 1) define the specific components of the humanized birth care model which bring satisfaction to women who seek obstetrical care in highly specialized hospitals; and 2) explore the organizational and cultural dimensions which act as barriers or facilitators for the implementation of humanized birth care practices in a highly specialized, university affiliated hospital in Quebec. A single case study design was chosen for this thesis. The data were collected through semi-structured interviews, field notes, participant observations, selfadministered questionnaire, relevant documents, and archives. The samples comprised: 11 professionals from different disciplines, 6 administrators from different hierarchical levels within the hospital, and 157 women who had given birth at the hospital during the study. The performed analysis covered both quantitative descriptive and qualitative deductive and inductive content analyses. The thesis comprises three articles. In the first article, we proposed a conceptual framework, based on Allaire and Firsirotu’s (1984) organizational culture theory. It attempts to examine childbirth patterns as an organizational cultural phenomenon. In our second article, we answered the following specific question: according to the managers and multidisciplinary professionals practicing in a highly specialized hospital as well as the women seeking perinatal care in this hospital setting, what is the definition of humanized care? Analysis of the data collected uncovered the following themes which explained the perceptions of what humanized birth was: personalized care, recognition of women’s rights, humanly care for women, family-centered care,women’s advocacy and companionship, compromise of security, comfort and humanity, and non-stereotyped pregnancies. Both high and low risk women felt more satisfied with the care they received if they were provided with informed choices, were given the right to participate in the decision-making process and were surrounded by competent care providers. These care providers who humanly cared for them were also able to provide relevant medical intervention. The professionals and administrators’ perceptions of humanized birth, on the other hand, mostly focused on personalized and family-centered care. In the third article of the thesis, we covered the dimensions of the internal and external components of an institution which can act as factors that facilitate or barriers that prevent, a specialized and university affiliated hospital in Quebec from adopting a humanized child birthing care. The findings revealed that both the external dimensions of a highly specialized hospital -including its history, society, and contingency-; and its internal dimensions -including culture, structure, and the individuals present in the hospital-, can all affect the humanization of birth care in such an institution, whether separately, simultaneously or in interaction. We thus hereby conclude that the humanization of birth care in a highly specialized hospital setting, should aim to meet all the physiological, as well as psychological aspects of birth care, including respect of the fears, beliefs, values, and needs of women and their families. Integration of competent and caring professionals and the use of obstetric technology to enhance the level of certainty and assurance in both high-risk and low risk women are both positive factors for the implementation of humanized care in a highly specialized hospital. Finally, the humanization of birth care approach in a highly specialized and university affiliated hospital setting demands a new healthcare policy. Such policy must offer a guarantee for women to have the place of birth, and the health care professional of their choice as well as those, which will enable women to make informed choices from the beginning of their pregnancy.
Resumo:
Affirmer que les citoyens des démocraties occidentales sont l’objet d’une surveillance systématique efficace et à grande échelle a de quoi provoquer une réaction incrédule. Démagogie, diront certains. Pourtant, les progrès réalisés dans les technologies de collecte, de traitement et de stockage d’information forcent une réflexion sur cette hypothèse. Il a été souligné justement que les coûts élevés liés aux moyens rudimentaires employés par les polices secrètes d’antan endiguaient en quelque sorte la menace. Les filatures, les infiltrations, les rapts nocturnes de dissidents pêchaient par manque de subtilité. Au contraire, le génie des techniques modernes vient de ce qu’elles n’entravent pas le quotidien des gens. Mais au-delà du raffinement technique, le contrôle panoptique de la masse atteint un sommet d’efficience dès lors que celle-ci est amenée à y consentir. Comme le faisait remarquer le professeur Raab : « [TRADUCTION] La surveillance prospère naturellement dans les régimes autoritaires qui ne s’exposent pas au débat public ni à la critique. Lorsqu’elle est utilisée dans des régimes dits démocratiques, elle est légitimée et circonscrite par des arguments de nécessité ou de justifications spéciales, tout comme la censure »[1]. Or, le droit, en tant que discours de rationalité, accomplit savamment ce travail de légitimation. C’est dans cet esprit qu’une analyse radicale des règles de droit encadrant le droit à la vie privée apporte une lucidité nouvelle sur notre faux sentiment de sécurité.