867 resultados para Security, International


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article outlines the possibilities of autobiographical stories to criticize status quo iterations of International Relations (IR). The article draws on the personal experiences of the author’s deportation order issued by the United Kingdom’s Home Office and its associated Border Agency (UKBA) to challenge the accepted assumptions of a cosmopolitan worldview as it relates to orderly international institutional design. It highlights the possibilities of trauma when border management and personal mobility collide. It suggests that mobility trauma ensues when the expectations of human mobility, outlined in Article 13 of the Universal Declaration of Human Rights, infringe the state’s role as security provider. It begins in part one with a challenge to the traditional role and understanding of international borders that sustain order within the international. It examines the unacknowledged role that human vulnerability plays within IR and institutional design while frankly engaging with human vulnerability and trauma in the second section. This section details the experiences of the author when her mobility rights were curtailed and the ensuing identity crisis prompted by such events. The final section investigates the ideas of critical cosmopolitan scholarship demanding that such discourses acknowledge and work through the possibility of failed agency when the demands of state security supersede individual mobility rights. It turns to the possibility of traumatic iterations of IR in order to probe such possibilities. The article suggests, in its conclusion, the possibility of storytelling and psychoanalysis to endorse unorthodox agency, and the possibility of a dynamic international institutional design, that challenges the status quo iterations of IR.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article considers North Korea and the notion of crisis, by linking historical development over the Korean peninsula to the conflict resolution literature, and investigates why despite a large number of destabilising events, a war involving Pyongyang has yet to erupt. The paper considers historical data and uses a framework developed by Aggarwal et al. in order to highlight patterns of interaction between states such as the United States, North Korea and South Korea, organisations such as the United Nations, as well as processes such as the Six-Party Talk and the Agreed Framework. The paper then develops a crisis framework based on conflict resolution and negotiation literature, and applies it to three North Korean administrations. Findings suggests that an elastic understanding of time (for all parties involved on the peninsula) leads to an impossibility to reach a threshold where full-scale war would be triggered, thus leaving parties in a stable state of crisis for which escalating moves and de-escalating techniques might become irrelevant.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the past two decades, the Democratic People's Republic of Korea has allegedly developed nuclear energy while suffering near collapse caused by catastrophic economic policies. This article presents an evaluation of North Korea's contemporary energy policies and suggests that despite retaining communist ideals and "Chu'che" policies, North Korea has slowly started to modernise its energy sector and recognises the necessity to start engaging with the international community. While it is argued that Pyongyang's newfound concerns for sustainable development, equity and the environment are a welcomed departure from its usual belligerent rhetoric and present a number of exciting engagement opportunities, the regime has not abandoned its nuclear energy programme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article evaluates the way in which copyright infringement has been gradually shifting from an area of civil liability to one of criminal penalty. Traditionally, consideration of copyright issues has been undertaken from a predominantly legal and/or economic perspectives. Whereas traditional legal analysis can explain what legal changes are occurring, and what impact these changes may have, they may not effectively explain ‘how’ these changes have come to occur. The authors propose an alternative inter-disciplinary approach, combining legal analysis with critical security studies, which may help to explain in greater detail how policies in this field have developed. In particular, through applied securitisation theory, this article intends to demonstrate the appropriation of this field by a security discourse, and its consequences for societal and legal developments. In order to explore how the securitisation framework may be a valid approach to a subject such as copyright law and to determine the extent to which copyright law may be said to have been securitised, this article will begin by explaining the origins and main features of securitisation theory, and its applicability to legal study. The authors will then attempt to apply this framework to the development of a criminal law approach to copyright infringement, by focusing on the security escalation it has undergone, developing from an economic issue into one of international security. The analysis of this evolution will be mainly characterised by the securitisation moves taking place at national, European and international levels. Finally, a general reflection will be carried out on whether the securitisation of copyright has indeed been successful and on what the consequences of such a success could be.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This edited volume analyzes recent key developments in EU border management. In light of the refugee crises in the Mediterranean and the responses on the part of EU member states, this volume presents an in-depth reflection on European border practices and their political, social and economic consequences. Approaching borders as concepts in flux, the authors identify three main trends: the rise of security technologies such as the EUROSUR system, the continued externalization of EU security governance such as border mission training in third states, and the unfolding dynamics of accountability. The contributions show that internal security cooperation in Europe is far from consolidated, since both political oversight mechanisms and the definition of borders remain in flux. This edited volume makes a timely and interdisciplinary contribution to the ongoing academic and political debate on the future of open borders and legitimate security governance in Europe. It offers a valuable resource for scholars in the fields of international security and migration studies, as well as for practitioners dealing with border management mechanisms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Small Arms and Light Weapons (SALW) proliferation was undertaken by the Non-Governmental Organizations (NGOs) as the next important issue in international relations after the success of the International Campaign to Ban Landmines (ICBL). This dissertation focuses on the reasons why the issue of SALW resulted in an Action Program rather than an international convention. Thus, this result was considered as unsuccessful by the advocates of regulating the illicit trade in SALW. The study provides a social movement theoretical approach, using framing, political opportunity and network analysis to explain why the advocates of regulating the illicit trade in SALW did no succeed in their goals. The UN is taken as the arena in which NGOs, States and International Governmental Organizations (IGOs) discussed the illicit trade in SALW. ^ The findings of the study indicate that the political opportunity for the issue of SALW was not ideal. The network of NGOs, States and IGOs was not strong. The NGOs advocating regulation of SALW were divided over the approach of the issue and were part of different coalitions with differing objectives. Despite initial widespread interest among States, only a couple of States were fully committed to the issue till the end. The regional IGOs approached the issue based on their regional priorities and were less interested in an international covenant. The advocates of regulating illicit trade in SALW attempted to frame SALW as a humanitarian issue rather than as a security issue. Thus they were not able to use frame alignment to convince states to treat SALW as a humanitarian issue. In conclusion it can be said that all three items, framing, political opportunity and the network, play a role in the lack of success of advocates for regulating the illicit trade in SALW. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this thesis I sought to explain the origins of national security concerns over foreign investments in the United States from 1919 to 2008. I identified and examined 29 cases of national security concerns over foreign investments in the United States during that period, and argued that in order to understand the circumstances under which foreign investments in the United States are perceived to be threats to the U.S. security we must rely on a combination of democratic peace theory and the version of political realism known as power transition theory. Thus, I tested the argument that national security concerns over foreign investments in the United States from 1919 to 2008 resulted from: (1) perceptions of international power transition, (2) perceptions of ideological and institutional differences between the United States and the home country of the investor, (3) perceptions of the strategic importance of the sector where the investment is made, and (4) perceptions of participation or control of the foreign investor by the government of the country of origin. I found that all these hypotheses have some explanatory power.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation investigated the relationship between the September 11, 2001 terrorist attacks and the internationalization agenda of U.S. colleges and universities. The construct, post-9/11 syndrome, is used metaphorically to delineate the apparent state of panic and disequilibrium that followed the incident. Three research questions were investigated, with two universities in the Miami-area of South Florida, one private and the other public, as qualitative case studies. The questions are: (a) How are international student advisors and administrators across two types of institutions dealing with the post-9/11 syndrome? (b) What, if any, are the differences in international education after 9/11? (c) What have been the institutional priorities in relation to international education before and after 9/11? Data-gathering methods included interviews with international student/study abroad advisors and administrators with at least 8 years of experience in the function(s) at their institutions, document and institutional data analysis. The interviews were based on the three-part scheme developed by Schuman (1982): context of experience, details of experience and reflection on the meaning of experiences. Taped interviews, researcher insights, and member checks of transcripts constituted an audit trail for this study. Key findings included a progressive decline in Fall to Fall enrollment of international students at UM by 13.05% in the 5 years after 9/11, and by 6.15% at FIU in the seven post-9/11 years. In both institutions, there was an upsurge in interest in study abroad during the same period but less than 5% of enrolled students ventured abroad annually. I summarized the themes associated with the post-9/11 environment of international education as perceived by my participants at both institutions as 3Ms, 3Ts, and 1D: Menace of Anxiety and Fear, Menace of Insularity and Insecurity, Menace of Over-Regulation and Bigotry, Trajectory of Opportunity, Trajectory of Contradictions, Trajectory of Illusion, Fatalism and Futility, and Dominance of Technology. Based on these findings, I recommended an integrated Internationalization At Home Plus Collaborative Outreach (IAHPCO) approach to internationalization that is based on a post-9/11 recalibration of national security and international education as complementary rather than diametrically opposed concepts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Brazilians greeted the long-awaited decision of making Rio de Janeiro the host of the 2016 Olympic Games with tremendous exhilaration. Although Rio’s fantastic natural beauty certainly added to its attraction in hosting the games, its alarming rates of urban crime and violence largely associated with drug trafficking immediately triggered worldwide criticism, and put at issue its ability to guarantee the security for the games. Brazilians have been vying for a position as an emerging global economy and understand the importance of the Games for international prestige. This makes the stakes very high when hosting the Olympic Games in the wake of the 2014 Soccer World Cup, which will also be held in Brazil. This paper explores these criticisms and assesses Rio’s ability to prepare for this important event. The paper further explores the consensus that Brazilians will be more equipped to address actions taken by organized crime capable of affecting the Olympic Games than to face a terrorist attack. Brazil – and Rio – does not figure in the “terrorism map” as a region particularly linked to terrorism. Aside from uncorroborated suspicions of activities by terrorist organizations on the Tri-Border region (Argentina, Brazil, and Paraguay), Brazil does not elicit many concerns regarding terrorism.1 Yet, there is no way to guarantee that terrorist organizations will not try to make use of the 2016 Rio Olympic Games to advance their agenda. This being in mind, Rio and Brazil in general face a long road ahead to prepare, prevent, protect and respond to a possible terrorist attack during the 2016 Olympics. It is clear that prevention and preparation towards potential threats to the Games must necessarily include cooperation and exchange of best practices with other countries. 1 U.S. Department of State has confirmed that this area may have been used to transport weapons and conduct financial affairs in the past. This type of activity has been made more difficult with the fortification of border controls in more recent times.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent studies on the economic status of women in Miami-Dade County (MDC) reveal an alarming rate of economic insecurity and significant obstacles for women to achieve economic security. Consistent barriers to women's economic security affect not only the health and wellbeing of women and their families, but also economic prospects for the community. A key study reveals in Miami-Dade County, "Thirty-nine percent of single female-headed families with at least one child are living at or below the federal poverty level" and "over half of working women do not earn adequate income to cover their basic necessities" (Brion 2009, 1). Moreover, conventional measures of poverty do not adequately capture women's struggles to support themselves and their families, nor do they document the numbers of women seeking basic self-sufficiency. Even though there is lack of accurate data on women in the county, which is a critical problem, there is also a dearth of social science research on existing efforts to enhance women's economic security in Miami-Dade County. My research contributes to closing the information gap by examining the characteristics and strategies of women-led community development organizations (CDOs) in MDC, working to address women's economic insecurity. The research is informed by a framework developed by Marilyn Gittell, who pioneered an approach to study women-led CDOs in the United States. On the basis of research in nine U.S. cities, she concluded that women-led groups increased community participation and "by creating community networks and civic action, they represent a model for community development efforts" (Gittell, et al. 2000, 123). My study documents the strategies and networks of women-led CDOs in MDC that prioritize women's economic security. Their strategies are especially important during these times of economic recession and government reductions in funding towards social services. The focus of the research is women-led CDOs that work to improve social services access, economic opportunity, civic participation and capacity, and women's rights. Although many women-led CDOs prioritize building social infrastructures that promote change, inequalities in economic and political status for women without economic security remain a challenge (Young 2004). My research supports previous studies by Gittell, et al., finding that women-led CDOs in Miami-Dade County have key characteristics of a model of community development efforts that use networking and collaboration to strengthen their broad, integrated approach. The resulting community partnerships, coupled with participation by constituents in the development process, build a foundation to influence policy decisions for social change. In addition, my findings show that women-led CDOs in Miami-Dade County have a major focus on alleviating poverty and economic insecurity, particularly that of women. Finally, it was found that a majority of the five organizations network transnationally, using lessons learned to inform their work of expanding the agency of their constituents and placing the economic empowerment of women as central in the process of family and community development.