747 resultados para International Security
Resumo:
“Large-scale acquisition of land by foreign investors” is the correct term for a process where the verdict of guilt is often quicker than the examination. But is there something really new about land grab except in its extent? In comparison with colonial and post-colonial plantation operations, should foreign investors today behave differently? We generally accept coffee and banana exports as pro-growth and pro-development, just as for cars, beef and insurance. What then is wrong with an investment contract allowing the holder to buy a farm and to export wheat to Saudi Arabia, or soybeans and maize as cattle feed to Korea, or to plant and process sugar cane and palm oil into ethanol for Europe and China? Assuming their land acquisition was legal, should foreigners respect more than investment contracts and national legislation? And why would they not take advantage of the legal protection offered by international investment law and treaties, not to speak of concessional finance, infrastructure and technical cooperation by a development bank, or the tax holidays offered by the host state? Remember Milton Friedman’s often-quoted quip: “The business of business is business!” And why would the governments signing those contracts not know whether and which foreign investment projects are best for their country, and how to attract them? This chapter tries to show that land grab, where it occurs, is not only yet another symptom of regulatory failures at the national level and a lack of corporate social responsibility by certain private actors. National governance is clearly the most important factor. Nonetheless, I submit that there is an international dimension involving investor home states in various capacities. The implication is that land grab is not solely a question whether a particular investment contract is legal or not. This chapter deals with legal issues which seem to have largely escaped the attention of both human rights lawyers and, especially, of investment lawyers. I address this fragmentation between different legal disciplines, rules, and policies, by asking two basic questions: (i) Do governments and parliaments in investor home countries have any responsibility in respect of the behaviour of their investors abroad? (ii) What should they and international regulators do, if anything?
Resumo:
In October 1930, violent action of the Polish security forces against the Ukrainian population in Eastern Galicia resulted in an international campaign for the Ukrainians in Poland. Its central claim was the condemnation of these incidents as a violation of the Minorities Treaty of the League of Nations. The article focuses on the involved British extra-parliamentary groups and their international federations as well as leftist intellectuals, socialist parties and the Labour and Socialist International. In most cases, the commitment of the activists was motivated by the desire to expose a humanitarian scandal while the implementation of minority rights played a minor role. When it turned out that the first reports had presented an exaggerated version of the events, they shifted their focus to the Polish opposition whose persecution started in November 1930.
Resumo:
Endogenous development is defined as development that values primarily locally available resources and the way people organized themselves for that purpose. It is a dynamic and evolving concept that also embraces innovations and complementation from other than endogenous sources of knowledge; however, only as far as they are based on mutual respect and the recognition of cultural and socioeconomic self-determination of each of the parties involved. Experiences that have been systematized in the context of the BioAndes Program are demonstrating that enhancing food security and food sovereignty on the basis of endogenous development can be best achieved by applying a ‘biocultural’ perspective: This means to promote and support actions that are simultaneously valuing biological (fauna, flora, soils, or agrobiodiversity) and sociocultural resources (forms of social organization, local knowledge and skills, norms, and the related worldviews). In Bolivia, that is one of the Latin-American countries with the highest levels of poverty (79% of the rural population) and undernourishment (22% of the total population), the Program BioAndes promotes food sovereignty and food security by revitalizing the knowledge of Andean indigenous people and strengthening their livelihood strategies. This starts by recognizing that Andean people have developed complex strategies to constantly adapt to highly diverse and changing socioenvironmental conditions. These strategies are characterized by organizing the communities, land use and livelihoods along a vertical gradient of the available eco-climatic zones; the resulting agricultural systems are evolving around the own sociocultural values of reciprocity and mutual cooperation, giving thus access to an extensive variety of food, fiber and energy sources. As the influences of markets, competition or individualization are increasingly affecting the life in the communities, people became aware of the need to find a new balance between endogenous and exogenous forms of knowledge. In this context, BioAndes starts by recognizing the wealth and potentials of local practices and aims to integrate its actions into the ongoing endogenous processes of innovation and adaptation. In order to avoid external impositions and biases, the program intervenes on the basis of a dialogue between exogenous, mainly scientific, and indigenous forms of knowledge. The paper presents an analysis of the strengths and weaknesses of enhancing endogenous development through a dialogue between scientific and indigenous knowledge by specifically focusing on its effects on food sovereignty and food security in three ‘biocultural’ rural areas of the Bolivian highlands. The paper shows how the dialogue between different forms of knowledge evolved alongside the following project activities: 1) recuperation and renovation of local seeds and crop varieties (potato – Solanum spp., quinoa – Chenopodium quinoa, cañahua – Chenopodium pallidicaule); 2) support for the elaboration of community-based norms and regulations for governing access and distribution of non-timber forest products, such as medicinal, fodder, and construction plants; 3) revitalization of ethnoveterinary knowledge for sheep and llama breeding; 4) improvement of local knowledge about the transformation of food products (sheep-cheese, lacayote – Cucurbita sp. - jam, dried llama meat, fours of cañahua and other Andean crops). The implementation of these activities fostered the community-based livelihoods of indigenous people by complementing them with carefully and jointly designed innovations based on internal and external sources of knowledge and resources. Through this process, the epistemological and ontological basis that underlies local practices was made visible. On this basis, local and external actors started to jointly define a renewed concept of food security and food sovereignty that, while oriented in the notions of well being according to a collectively re-crafted world view, was incorporating external contributions as well. Enabling and hindering factors, actors and conditions of these processes are discussed in the paper.
Resumo:
Food security is the main concern in Africa as the production and productivity of crops are under continuous threat. Indigenous crops also known as orphan- or as underutilized- crops provide key contributions to food security under the present scenario of increasing world population and changing climate. Hence, these crops which belong to the major categories of cereals, legumes, fruits and root crops play a key role in the livelihood of the resource-poor farmers and consumers since they perform better than the major world crops under extreme soil and climate conditions prevalent in the continent. These indigenous crops have the major advantage that they fit well into the general socio-economic and ecological context of the region. However, despite their huge importance, African crops have generally received little attention by the global scientific community. With the current production systems, only a fraction of yield potential was achieved for most of these crops. In order to devise strategies towards boosting crop productivity in Africa, the current production constraints should be investigated and properly addressed. Key traits known to increase productivity and/or improve nutrition and diverse conventional and modern crop improvement techniques need to be implemented. Commitments in the value-chain from the research, production, marketing to distribution of improved seeds are required by relevant national and international institutions as well as African governments to promote food security in a sustainable manner. The review also presents major achievements and suggestions for stakeholders interested in African agriculture.
Resumo:
There is a general consensus that healthy soils are pivotal for food security. Food production is one of the main ecosystem services provided by and thus dependent on well-functioning soils. There are also intrinsic connections between the four pillars of food security: food availability, access, utilization, and stability; with how soils are managed, accessed and secured, in particular by food insecure and vulnerable populations. On the other hand, socio-political and economic processes that precipitate inequalities and heighten vulnerabilities among poor populations often increase pressure on soils due to unsustainable forms of land use and poor agricultural practises. This has often led to scenarios that can be described as: ‘poor soils, empty stomachs (hungry people) and poor livelihoods.' In 2015, in particular, as we head towards approval of the ‘Sustainable Development Goals' (SDGs), the role of Financing for Development is debated and agreed upon and a new climate pact is signed – these three political dimensions define how a new post-2015 agenda needs to be people-smart as well as resource-smart. For proposed SDG 2 (Food Security and Hunger), there can be so resolution without addressing people, policies and institutions.
Resumo:
We present a real-world problem that arises in security threat detection applications. The problem consists of deploying mobile detectors on moving units that follow predefined routes. Examples of such units are buses, coaches, and trolleys. Due to a limited budget not all available units can be equipped with a detector. The goal is to equip a subset of units such that the utility of the resulting coverage is maximized. Existing methods for detector deployment are designed to place detectors in fixed locations and are therefore not applicable to the problem considered here. We formulate the planning problem as a binary linear program and present a coverage heuristic for generating effective deployments in short CPU time. The heuristic has theoretical performance guarantees for important special cases of the problem. The effectiveness of the coverage heuristic is demonstrated in a computational analysis based on 28 instances that we derived from real-world data.
Resumo:
International politics affects oil trade. But does it affect the oil-exporting developing countries more? We construct a firm-level dataset for all U.S. oil-importing companies over 1986-2008 to examine how these firms respond to changes in "political distance" between the U.S. and her trading partners, measured by divergence in their UN General Assembly voting patterns. Consistent with previous macro evidence, we first show that individual firms diversify their oil imports politically, even after controlling for unobserved firm heterogeneity. We conjecture that the political pattern of oil imports from these individual firms is driven by hold-up risks, because oil trade is often associated with backward vertical FDI. To the extent that developing countries have higher hold-up risks because of their weaker institutions, the political effect on oil trade should be more significant in the developing world. We find that oil import decisions are indeed more elastic when firms import from developing countries, although the reverse is true in the short run. Our results suggest that international politics can affect oil revenue and hence long-term development in the developing world.
Resumo:
As a common reference for many in-development standards and execution frameworks, special attention is being paid to Service-Oriented Architectures. SOAs modeling, however, is an area in which a consensus has not being achieved. Currently, standardization organizations are defining proposals to offer a solution to this problem. Nevertheless, until very recently, non-functional aspects of services have not been considered for standardization processes. In particular, there exists a lack of a design solution that permits an independent development of the functional and non-functional concerns of SOAs, allowing that each concern be addressed in a convenient manner in early stages of the development, in a way that could guarantee the quality of this type of systems. This paper, leveraging on previous work, presents an approach to integrate security-related non-functional aspects (such as confidentiality, integrity, and access control) in the development of services.
Resumo:
Service-Oriented Architectures (SOA), and Web Services (WS), the technology generally used to implement them, achieve the integration of heterogeneous technologies, providing interoperability, and yielding the reutilization of pre-existent systems. Model-driven development methodologies provide inherent benefits such as increased productivity, greater reuse, and better maintainability, to name a few. Efforts on achieving model-driven development of SOAs already exist, but there is currently no standard solution that addresses non-functional aspects of these services as well. This paper presents an approach to integrate these non-functional aspects in the development of web services, with an emphasis on security.
Resumo:
This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. Both are affected because the number of packets transmitted by the network and the active period of the nodes increase. Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such as Cognitive Wireless Sensor Networks. In this work, the scenario is formally modeled and the optimization according to the simulation results and the impact analysis over the frequency spectrum are presented.
Resumo:
La cuestión principal abordada en esta tesis doctoral es la mejora de los sistemas biométricos de reconocimiento de personas a partir de la voz, proponiendo el uso de una nueva parametrización, que hemos denominado parametrización biométrica extendida dependiente de género (GDEBP en sus siglas en inglés). No se propone una ruptura completa respecto a los parámetros clásicos sino una nueva forma de utilizarlos y complementarlos. En concreto, proponemos el uso de parámetros diferentes dependiendo del género del locutor, ya que como es bien sabido, la voz masculina y femenina presentan características diferentes que deberán modelarse, por tanto, de diferente manera. Además complementamos los parámetros clásicos utilizados (MFFC extraídos de la señal de voz), con un nuevo conjunto de parámetros extraídos a partir de la deconstrucción de la señal de voz en sus componentes de fuente glótica (más relacionada con el proceso y órganos de fonación y por tanto con características físicas del locutor) y de tracto vocal (más relacionada con la articulación acústica y por tanto con el mensaje emitido). Para verificar la validez de esta propuesta se plantean diversos escenarios, utilizando diferentes bases de datos, para validar que la GDEBP permite generar una descripción más precisa de los locutores que los parámetros MFCC clásicos independientes del género. En concreto se plantean diferentes escenarios de identificación sobre texto restringido y texto independiente utilizando las bases de datos de HESPERIA y ALBAYZIN. El trabajo también se completa con la participación en dos competiciones internacionales de reconocimiento de locutor, NIST SRE (2010 y 2012) y MOBIO 2013. En el primer caso debido a la naturaleza de las bases de datos utilizadas se obtuvieron resultados cercanos al estado del arte, mientras que en el segundo de los casos el sistema presentado obtuvo la mejor tasa de reconocimiento para locutores femeninos. A pesar de que el objetivo principal de esta tesis no es el estudio de sistemas de clasificación, sí ha sido necesario analizar el rendimiento de diferentes sistemas de clasificación, para ver el rendimiento de la parametrización propuesta. En concreto, se ha abordado el uso de sistemas de reconocimiento basados en el paradigma GMM-UBM, supervectores e i-vectors. Los resultados que se presentan confirman que la utilización de características que permitan describir los locutores de manera más precisa es en cierto modo más importante que la elección del sistema de clasificación utilizado por el sistema. En este sentido la parametrización propuesta supone un paso adelante en la mejora de los sistemas de reconocimiento biométrico de personas por la voz, ya que incluso con sistemas de clasificación relativamente simples se consiguen tasas de reconocimiento realmente competitivas. ABSTRACT The main question addressed in this thesis is the improvement of automatic speaker recognition systems, by the introduction of a new front-end module that we have called Gender Dependent Extended Biometric Parameterisation (GDEBP). This front-end do not constitute a complete break with respect to classical parameterisation techniques used in speaker recognition but a new way to obtain these parameters while introducing some complementary ones. Specifically, we propose a gender-dependent parameterisation, since as it is well known male and female voices have different characteristic, and therefore the use of different parameters to model these distinguishing characteristics should provide a better characterisation of speakers. Additionally, we propose the introduction of a new set of biometric parameters extracted from the components which result from the deconstruction of the voice into its glottal source estimate (close related to the phonation process and the involved organs, and therefore the physical characteristics of the speaker) and vocal tract estimate (close related to acoustic articulation and therefore to the spoken message). These biometric parameters constitute a complement to the classical MFCC extracted from the power spectral density of speech as a whole. In order to check the validity of this proposal we establish different practical scenarios, using different databases, so we can conclude that a GDEBP generates a more accurate description of speakers than classical approaches based on gender-independent MFCC. Specifically, we propose scenarios based on text-constrain and text-independent test using HESPERIA and ALBAYZIN databases. This work is also completed with the participation in two international speaker recognition evaluations: NIST SRE (2010 and 2012) and MOBIO 2013, with diverse results. In the first case, due to the nature of the NIST databases, we obtain results closed to state-of-the-art although confirming our hypothesis, whereas in the MOBIO SRE we obtain the best simple system performance for female speakers. Although the study of classification systems is beyond the scope of this thesis, we found it necessary to analise the performance of different classification systems, in order to verify the effect of them on the propose parameterisation. In particular, we have addressed the use of speaker recognition systems based on the GMM-UBM paradigm, supervectors and i-vectors. The presented results confirm that the selection of a set of parameters that allows for a more accurate description of the speakers is as important as the selection of the classification method used by the biometric system. In this sense, the proposed parameterisation constitutes a step forward in improving speaker recognition systems, since even when using relatively simple classification systems, really competitive recognition rates are achieved.
Resumo:
The international community has expressed a renewed interest in small scale agriculture and the role it plays in long-term food security in the face of climate change and population growth. This interest has led to a new development paradigm in which small scale producers are being brought into the global market. Undoubtedly, small scale agriculture should be pursued as a sustainable form of development which can contribute to poverty alleviation, environmental stewardship, and the preservation of genetic diversity. These unique contributions are inherently threatened by a system captured in the idea of the neoliberal food regime. The ability of small scale agriculture to uphold the goals of food security are dependent on recognition and preservation of these contributions.
Resumo:
In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.
Resumo:
From climate change over peak oil to the geopolitical scramble for the Arctic, there are ample signs that a global energy crisis is unfolding. The sheer scale and urgency of this looming crisis calls for international coordination. Yet, even a cursory look at the existing international energy institutions leads to a sobering conclusion: the global energy governance architecture is weak, fragmented and incomplete. This policy brief discusses both the flaws in the multilateral energy architecture and some emerging ideas to strengthen it, such as the proposal for a Sustainable Energy Trade Agreement and the new American disclosure rules for the extractive sector.