834 resultados para security outsourcing
Resumo:
The article suggests that while the report of the Independent Commission on Policing (ICP) provides a police reform blueprint for Northern Ireland and elsewhere, it can also be seen as an attempt to engage more elliptically with contemporary debates in security governance vis-a-vis the increasingly fragmented nature of late-modern policing and the role of the state. A decade into the reform process in Northern Ireland and in spite of the networked approach postulated by the ICP, the public police continue to enjoy a pre-eminent place and little evidence exists of any significant weakening of state steering and rowing of security. The discussion proposes a tentative typology explaining the continued colonization of security spaces by the State using constituent attendant processes of compartmentalizing, crowding out and corralling.
Resumo:
This study integrates the concepts of value creation and value claiming into a theoretical framework that emphasizes the dependence of resource value maximization on value-claiming motivations in outsourcing decisions. To test this theoretical framework, it develops refutable implications to explain the firm's outsourcing decision, and it uses data from 178 firms in the publishing and printing industry on outsourcing of application services. The results show that in outsourcing decisions, resource value and transaction costs are simultaneously considered and that outsourcing decisions are dependent on alignment between resource and transaction attributes. The findings support a resource contingency view that highlights value-claiming mechanisms as resource contingency in interorganizational strategic decisions.
Resumo:
This broad-ranging new text introduces a wide range of theoretical perspectives with a central focus on their application to understanding key issues in global, state and human security in the contemporary world.
Resumo:
Recent and emerging security policies and practices claim a mutual vulnerability that closely links human insecurity in failed states with the threat to powerful states from illicit flows. This article first examines this ‘emerging orthodoxy’ of transnational security issues that reinforces the securitisation of poverty and the poor. It then subjects this orthodoxy to theoretical and empirical critique. Theoretically it shows that this orthodoxy is formed as a ‘geopolitical imagination’ that associates and stabilises particular views of weak states and illicit flows in a ‘netwar imagination’ by reasserting and reconfiguring traditional assumptions of the spatiality and nature of threats. A final empirical section, focusing on drug production and nuclear smuggling, argues that those assumptions and their assemblage are a partial, incomplete and often self-referential reading of illicit flows.
Resumo:
Links between political violence and children's adjustment problems are well-documented. However, the mechanisms by which political tension and sectarian violence relate to children's well-being and development are little understood. This study longitudinally examined children's emotional security about community violence as a possible regulatory process in relations between community discord and children's adjustment problems. Families were selected from 18 working class neighborhoods in Belfast, Northern Ireland. Participants (695 mothers and children, M=12.17, SD=1.82) were interviewed in their homes over three consecutive years. Findings supported the notion that politically-motivated community violence has distinctive effects on children's externalizing and internalizing problems through the mechanism of increasing children's emotional insecurity about community. Implications are considered for understanding relations between political violence and child adjustment from a social ecological perspective.
Resumo:
This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.
Resumo:
A dynamic global security-aware synthesis flow using the SystemC language is presented. SystemC security models are first specified at the system or behavioural level using a library of SystemC behavioural descriptions which provide for the reuse and extension of security modules. At the core of the system is incorporated a global security-aware scheduling algorithm which allows for scheduling to a mixture of components of varying security level. The output from the scheduler is translated into annotated nets which are subsequently passed to allocation, optimisation and mapping tools for mapping into circuits. The synthesised circuits incorporate asynchronous secure power-balanced and fault-protected components. Results show that the approach offers robust implementations and efficient security/area trade-offs leading to significant improvements in turnover.