747 resultados para international security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Going beyond the association between youth exposure to political violence and psychopathology, the current article examines within-person change in youth strength of identity with their ethno-political group and youth reports of the insecurity in their communities. Conceptually related but growing out of different paradigms, both group identity and emotional insecurity have been examined as key variables impacting youth responses to threats from other group members. The goal of the current study is to review previous studies examining these two key variables and to contribute new analyses, modeling within-person change in both variables and examining covariation in their growth. The current article uses data from 823 Belfast adolescents over 4 years. The results suggest youth are changing linearly over age in both constructs and that there are ethno-political group differences in how youth are changing. The results also indicate that change in insecurity is related to strength of identity at age 18, and strength of identity and emotional insecurity are related at age 18. Implications and directions for future work in the area of youth and political violence are discussed. © 2014 American Psychological Association.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security is a critical concern around the world. Since resources for security are always limited, lots of interest have arisen in using game theory to handle security resource allocation problems. However, most of the existing work does not address adequately how a defender chooses his optimal strategy in a game with absent, inaccurate, uncertain, and even ambiguous strategy profiles' payoffs. To address this issue, we propose a general framework of security games under ambiguities based on Dempster-Shafer theory and the ambiguity aversion principle of minimax regret. Then, we reveal some properties of this framework. Also, we present two methods to reduce the influence of complete ignorance. Our investigation shows that this new framework is better in handling security resource allocation problems under ambiguities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Even before the Russian air force launched its first strikes over Syria, there was already a Russian presence on the battleground. These were not the spetsnaz, Kremlin’s special forces, but war correspondents from the leading Russian media outlets. This was as clear a sign as any that the Russia’s priority has shifted from Ukraine, where these reporters spent most of the past 18 months, to Syria.

There is, however, no unanimity on Russia’s latest escalation in Syria. As Russian state TV stations report successes of Russia’s high-precision weapons projecting an image of a high-tech Russian military equal to the US, doubts persist about the latest adventure in the Middle East.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyber-security research in the field of smart grids is often performed with a focus on either the power and control domain or the Information and Communications Technology (ICT) domain. The characteristics of the power equipment or ICT domain are commonly not collectively considered. This work provides an analysis of the physical effects of cyber-attacks on microgrids – a smart grid construct that allows continued power supply when disconnected from a main grid. Different types of microgrid operations are explained (connected, islanded and synchronous-islanding) and potential cyber-attacks and their physical effects are analyzed. A testbed that is based on physical power and ICT equipment is presented to validate the results in both the physical and ICT domain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages can help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts and modelling activities is given along with a discussion on how these concepts and modelling activities are integrated to the current stages of Tropos. A real life case study from the health and social care sector is used to illustrate the approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper explores the prospects and challenges of achieving human security through United Nations (UN) human rights law. The paper does not aim to pronounce definitively on the achievement of human security by way of UN human rights law that is, to assess the achievement of human security per se 'as a future end state'. Rather the focus of the paper is firmly placed on the capacity of UN human rights law to achieve human security. The paper departs from the premise that if human rights define human security, international human rights law and UN human rights law in particular should have something to say about the achievement of human security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article discusses the use of digital evidence as a means of proof before the International Court of Justice (ICJ). The absence of specific Court rules and procedures for digital evidence (with the exception of Practice Direction IX bis) is not necessarily an obstacle to its production and evaluation before the ICJ, as the general evidentiary rules can also be applied to digital evidence. The article first looks at the rules on the production of documentary evidence and then examines the specific issues related to audiovisual evidence. Finally, it examines the admissibility of digital evidence unlawfully obtained by a litigant through unilateral transborder access to data. The article concludes that, even if specific regulation may be needed as to the specific way in which authenticity and accuracy of digital evidence are to be established, the particular facts of the case and the grounds of challenge can vary widely, and it is doubtful that any regulation could be sufficiently flexible to deal with this in advance.