863 resultados para Information security policy
Resumo:
Based on interviews with diplomats from a representative cross-section of nine member states and members of the EEAS itself, the research findings of this EPIN Working Paper confirm long-standing traditions and member state perceptions of cooperation with European institutions. The paper also reveals new aspects of the intergovernmental method of foreign policy shaping and making in the European Union; in particular how different national positions can positively or negatively affect the consolidation of the EEAS and the role of the EU as an international actor. As such, the Working Paper makes an original contribution to the existing literature on one of most discussed actors in the European Union’s post-Lisbon architecture in the domain of EU external action.
Resumo:
This CEPS Special Report gives an overview of China’s perceptions of the EU and the protection of Chinese investments in Europe since the outbreak of the European sovereign debt crisis, especially since the more concrete talks in late 2011 on possible financial support from China. Although the top leadership of the communist party of China (CPC) changed in its recent handover, the perceptions described in this paper are likely to remain the same, just as the main tenets of China’s foreign policy are unlikely to change in the near future. The report argues that while the EU’s image has suffered greatly from the sovereign debt crisis and the way it has been handled, there is room to improve China’s view of Europe and for the EU to maintain a relatively strong negotiation position towards China.
Resumo:
The original Council Decision establishing the European External Action Service (EEAS) in 2010, called for a review of the organisation and functioning of the EEAS by mid-2013. This CEPS Commentary argues that the review process will offer a formal opportunity to address some of the Service's weaknesses and to give a new impetus to its further development. In particular, it urges stakeholders to go beyond a review of organisational matters and also look into the Service’s overall contribution to attaining the objectives of the EU’s foreign policy, into its cooperation with the member states’ diplomatic services, the services of the European Commission, the Council General Secretariat and the European Parliament. Four sets of recommendations are put forward.
Resumo:
A collection of pieces on British intelligence including sources (Christopher R. Moran), methodology (Richard Aldrich), media (Philip H.J. Davies), historiography (Calder Walton and Christopher Andrew), South Africa and the Wilson government (Philip Murphy), Pakistan and ISI (Rob Johnson), and UK security policy in the face of radical Islam (Anthony Glees).
Resumo:
Cross-bred cow adoption is an important and potent policy variable precipitating subsistence household entry into emerging milk markets. This paper focuses on the problem of designing policies that encourage and sustain milkmarket expansion among a sample of subsistence households in the Ethiopian highlands. In this context it is desirable to measure households’ ‘proximity’ to market in terms of the level of deficiency of essential inputs. This problem is compounded by four factors. One is the existence of cross-bred cow numbers (count data) as an important, endogenous decision by the household; second is the lack of a multivariate generalization of the Poisson regression model; third is the censored nature of the milk sales data (sales from non-participating households are, essentially, censored at zero); and fourth is an important simultaneity that exists between the decision to adopt a cross-bred cow, the decision about how much milk to produce, the decision about how much milk to consume and the decision to market that milk which is produced but not consumed internally by the household. Routine application of Gibbs sampling and data augmentation overcome these problems in a relatively straightforward manner. We model the count data from two sites close to Addis Ababa in a latent, categorical-variable setting with known bin boundaries. The single-equation model is then extended to a multivariate system that accommodates the covariance between crossbred-cow adoption, milk-output, and milk-sales equations. The latent-variable procedure proves tractable in extension to the multivariate setting and provides important information for policy formation in emerging-market settings
Resumo:
Policy makers have identified the relationship between entrepreneurship and economic development. Yet, little is known about how this relationship varies over time in cities with different market sizes. This study examines the link between entrepreneurship and economic development using a panel of 127 European cities between 1994 and 2009. We found that the immediate economic development impact of new firm start-ups is positive for both small-/medium-size cities and large cities. The relationship is U-shaped for large cities, with the indirect effect taking 7 years, but the indirect effect does not occur in small-/medium-size cities. We offer useful information for policy makers, practitioners, and scholars.
Resumo:
Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.
Resumo:
We hypothesise that differences in people's attitudes and personality traits lead them to attribute varying importance to environmental considerations, safety, comfort, convenience and flexibility. Differences in personality traits call be revealed not only in the individuals' choice of transport, but also in other actions of their everyday lives-such as how much they recycle, whether they take precautions or avoid dangerous pursuits. Conditioning on a set of exogenous individual characteristics, we use indicators of attitudes and personality traits to form latent variables for inclusion in an, otherwise standard, discrete mode choice model. With a sample of Swedish commuters, we find that both attitudes towards flexibility and comfort, as well as being pro-environmentally inclined, influence the individual's choice of mode. Although modal time and cost still are important, it follows that there are other ways, apart from economic incentives, to attract individuals to the, from society's perspective, desirable public modes of transport. Our results should provide useful information to policy-makers and transportation planners developing sustainable transportation systems.
Resumo:
An adaptive device is made up of an underlying mechanism, for instance, an automaton, a grammar, a decision tree, etc., to which is added an adaptive mechanism, responsible for allowing a dynamic modification in the structure of the underlying mechanism. This article aims to investigate if a programming language can be used as an underlying mechanism of an adaptive device, resulting in an adaptive language.
Resumo:
Dentre as profundas modificações experimentadas na Sociedade e, em especial, as que se produzem no mundo do trabalho, observamos movimentos em direção a formas de trabalho flexível, entre as quais se insere o Teletrabalho. Sem ser propriamente novo no cenário mundial, no Brasil ele surge com maior expressão recentemente, passando a ocupar espaços na mídia em geral e nos ambientes universitários. Todavia, são poucas as referências acadêmicas brasileiras ao assunto e estudos se fazem necessários. Com a pretensão de contribuir com conhecimentos a respeito do assunto, sob o prisma da realidade brasileira e de uma situação particular, o estudo utilizou referências teóricas e empíricas para examinar a viabilidade do Teletrabalho na Companhia de Processamento de Dados do Município de Porto Alegre. Abrangeu a análise de condições organizacionais, técnicas, humanas, legais e sindicais compreendidas na proposta e incluiu, igualmente, uma sugestão para um projeto de demonstração. O estudo, notadamente qualitativo, valoriza as perspectivas de segmentos potencialmente envolvidos num processo de adoção de Teletrabalho pela Empresa, como elemento para a sua compreensão. Foi desenvolvido mediante a realização de entrevistas com representantes dos sindicatos da categoria, dos funcionários e chefias, Diretoria da Empresa e especialistas em assuntos jurídicos e segurança de informações. O estudo concluiu ser a introdução do Teletrabalho viável em parte, num sistema de voluntariado, em regime de tempo parcial e, pelo menos inicialmente, em ambientes de telecentros. Mesmo existindo uma série de condições favoráveis, o atendimento de certos prérequisitos e o equacionamento de dúvidas e dificuldades são essenciais para promover uma implementação adequada, considerando as condições internas da Empresa, seu papel institucional e o contexto social onde está inserida. A pesquisa, na verdade, pode ser considerada um passo inicial dentro de um processo mais amplo, que integra o domínio da tecnologia do Teletrabalho para uso interno na Empresa, se assim for desejado, ou como uma alternativa para proposição de novos serviços a clientes e à comunidade.
Resumo:
Este Guia de Preservação & Segurança da Biblioteca Nacional para salvaguarda do seu acervo e do seu edifício tem por objetivo apresentar orientações, caminhos e rotas para procedimentos e atitudes relativas as questões desta natureza, importantes e vitais nesta era de tantas incertezas. Como base toma-se o saber adquirido no campo da preservação de bens culturais e no campo da política de segurança adotada para acervos bibliográficos e documentais, para usuários e para os edifícios que os abriga. O caráter interdisciplinar que concerne a estes campos do conhecimento sinaliza para o aprimoramento educacional da população como um todo e para nossa memória cultural. Visa a mudança do papel do homem como crítico da natureza, como agente transformador da realidade e de si próprio.
Resumo:
More over, the information has become the main asset of the institutions. Being thus, the Information Security (IS) is getting attention as one of the activities of extreme importance in the corporations. Guarantee the confidentiality, integrity, availability, no deny and legality becomes something very important for the day-by-day of the businesses. An analysis of the risk, passing through the assessment of the threats and vulnerabilities, is mandatory to let grow the activities of the institutions. Digital Certification came into IS to guarantee the Not Deny (ND) because it makes the unquestioned identification of the person that makes the action. Therefore, Information Security can be defined as a knowledge field focused in the protection of the information assets against: unauthorized access, improper modifications, not availability, deny of authorship and illegality.