785 resultados para Governance of security
Resumo:
This dissertation investigates the question: has financial speculation contributed to global food price volatility since the mid 2000s? I problematize the mainstream academic literature on the 2008-2011 food price spikes as being dominated by neoclassical economic perspectives and offer new conceptual and empirical insights into the relationship between financial speculation and food. Presented in three journal style manuscripts, manuscript one uses circuits of capital to conceptualize the link between financial speculators in the global north and populations in the global south. Manuscript two argues that what makes commodity index speculation (aka ‘index funds’ or index swaps) novel is that it provides institutional investors with what Clapp (2014) calls “financial distance” from the biopolitical implications of food speculation. Finally, manuscript three combines Gramsci’s concepts of hegemony and ‘the intellectual’ with the concept of performativity to investigate the ideological role that public intellectuals and the rhetorical actor the market play in the proliferation and governance of commodity index speculation. The first two manuscripts take an empirically mixed method approach by combining regression analysis with discourse analysis, while the third relies on interview data and discourse analysis. The findings show that financial speculation by index swap dealers and hedge funds did indeed significantly contribute to the price volatility of food commodities between June 2006 and December 2014. The results from the interview data affirm these findings. The discourse analysis of the interview data shows that public intellectuals and rhetorical characters such as ‘the market’ play powerful roles in shaping how food speculation is promoted, regulated and normalized. The significance of the findings is three-fold. First, the empirical findings show that a link does exist between financial speculation and food price volatility. Second, the findings indicate that the post-2008 CFTC and the Dodd-Frank reforms are unlikely to reduce financial speculation or the price volatility that it causes. Third, the findings suggest that institutional investors (such as pension funds) should think critically about how they use commodity index speculation as a way of generating financial earnings.
Resumo:
This article considers the opportunities of civilians to peacefully resist violent conflicts or civil wars. The argument developed here is based on a field-based research on the peace community San José de Apartadó in Colombia. The analytical and theoretical framework, which delimits the use of the term ‘resistance’ in this article, builds on the conceptual considerations of Hollander and Einwohner (2004) and on the theoretical concept of ‘rightful resistance’ developed by O’Brien (1996). Beginning with a conflict-analytical classification of the case study, we will describe the long-term socio-historical processes and the organizational experiences of the civilian population, which favoured the emergence of this resistance initiative. The analytical approach to the dimensions and aims of the resistance of this peace community leads to the differentiation of O`Brian’s concept of ‘rightful resistance’.
Resumo:
In Marxist frameworks “distributive justice” depends on extracting value through a centralized state. Many new social movements—peer to peer economy, maker activism, community agriculture, queer ecology, etc.—take the opposite approach, keeping value in its unalienated form and allowing it to freely circulate from the bottom up. Unlike Marxism, there is no general theory for bottom-up, unalienated value circulation. This paper examines the concept of “generative justice” through an historical contrast between Marx’s writings and the indigenous cultures that he drew upon. Marx erroneously concluded that while indigenous cultures had unalienated forms of production, only centralized value extraction could allow the productivity needed for a high quality of life. To the contrary, indigenous cultures now provide a robust model for the “gift economy” that underpins open source technological production, agroecology, and restorative approaches to civil rights. Expanding Marx’s concept of unalienated labor value to include unalienated ecological (nonhuman) value, as well as the domain of freedom in speech, sexual orientation, spirituality and other forms of “expressive” value, we arrive at an historically informed perspective for generative justice.
Resumo:
Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.
Resumo:
The general consensus on the security-development nexus is that both are key to achieving sustainable peace in war-torn societies. However, this debate has largely taken place among international actors, with little empirical evidence about how security and development relate to each other or are even considered by local actors. The current paper applies the security-development nexus to the case of land restitution in Colombia. Following decades of internal armed conflict, in 2012 the national government passed sweeping land restitution legislation amid on-going violence. Through in-depth interviews and focus groups with multiple actors involved in this process, ranging from international organizations to national government units, from regional institutions to local communities, the paper analyses the objectives, impact, challenges and opportunities for land restitution related to security and development. Undermining peacebuilding, a lack of coherence in the integration of security and development priorities limits the extent to which either supports, or is promoted by, land restitution efforts in Colombia. The paper concludes with reflections on how the security-development nexus may promote peacebuilding amid on-going conflict.
Resumo:
Understanding the dynamics of urban ecosystem services is a necessary requirement for adequate planning, management, and governance of urban green infrastructure. Through the three-year Urban Biodiversity and Ecosystem Services (URBES) research project, we conducted case study and comparative research on urban biodiversity and ecosystem services across seven cities in Europe and the United States. Reviewing > 50 peer-reviewed publications from the project, we present and discuss seven key insights that reflect cumulative findings from the project as well as the state-of-the-art knowledge in urban ecosystem services research. The insights from our review indicate that cross-sectoral, multiscale, interdisciplinary research is beginning to provide a solid scientific foundation for applying the ecosystem services framework in urban areas and land management. Our review offers a foundation for seeking novel, nature-based solutions to emerging urban challenges such as wicked environmental change issues.
Resumo:
The literature on the governance of social-ecological systems increasingly recognizes a key role of bridging organisations (BOs) in transition processes towards sustainability. BOs can be defined as facilitators who allow for interorganisational collaboration. Our paper provides a more nuanced understanding of specific BO activities and their contributions towards urban sustainability. Our analysis is based on applying three complementary methodological angles (drawing on geolocalised data, interviews and action research) to 20 years of urban renovation investments in the city-region of Brussels. We distinguish between multi-scale, multi-actor and multi-dimensional tensions in urban renovation programmes and link these tensions to bridging challenges for BOs. Results suggest that the corresponding three types of bridging roles form a trilemma rather than a trilogy: the BOs in study have mediated one tension by de facto exacerbating another. Lessons from action research suggest that a wider use of temporality and shared language to communicate about urban renovation projects could attenuate the bridging trilemma.
Resumo:
We explore bioregional management in the Murray-Darling Basin (MDB) in Australia through the institutional design characteristics of the MDB River Basin Organization (RBO), the actors and organizations who supported and resisted the establishment of the RBO, and the effectiveness of the RBO. During the last 25 years, there has been a major structural reform in the MDB RBO, which has changed from an interstate coordinating body to an Australian government agency. Responsibility for basin management has been centralized under the leadership of the Australian government, and a comprehensive integrated Basin plan has been adopted. The driving forces for this centralization include national policy to restore river basins to sustainable levels of extraction, state government difficulties in reversing overallocation of water entitlements, the millennium drought and its effects, political expediency on the part of the Australian government and state governments, and a major injection of Australian government funding. The increasing hierarchy and centralization of the MDB RBO does not follow a general trend toward multilevel participative governance of RBOs, but decentralization should not be overstated because of the special circumstances at the time of the centralization and the continuing existence of some decentralized elements, such as catchment water plans, land use planning, and water quality. Further swings in the centralization–decentralization pendulum could occur. The MDB reform has succeeded in rebalancing Basin water allocations, including an allocation for the environment and reduced diversion limits. There are some longer term risks to the implementation of reform, including lack of cooperation by state governments, vertical coordination difficulties, and perceived reductions in the accountability and legitimacy of reform at the local level. If implementation of the Basin plan is diverted or delayed, a new institution, the Commonwealth Environmental Water Holder, can play a major role in securing and coordinating environmental water supplies.
Resumo:
One of the most important theories in the study of environmental governance and policy is the pathology of command and control, which describes the negative consequences of top-down, technocratic governance of social and ecological systems. However, to date, this theory has been expressed somewhat inconsistently and informally in the literature, even by the seminal works that have established its importance and popularized it. This presents a problem for the sustainability science community if it cannot be sure of the precise details of one of its most important theories. Without such precision, applications and tests of various elements of the theory cannot be conducted reliably to advance the knowledge of environmental governance. I address this problem by synthesizing several seminal works to formalize this theory. The formalization involves the identification of the individual elements of the theory and a diagrammatic description of their relationships with each other that unfold in a series of semi-independent causal paths. Ideally, with such a formalization, scholars can use this theory more reliably and more meaningfully in their future work. I conclude by discussing the implications this theory has for the governance of natural resources.
Resumo:
The discipline of counselling psychology continues to grow and change in response to social, economic and political pressures. It has been argued that its quest for a coherent and distinct identity, which emphasises the possibility of the coexistence of multiple approaches, creates an inherently uncertain and dilemmatic training environment that may hinder the development of trainees’ professional identities. In order to gain a deeper understanding of the issue at hand, the aim was to explore how final year trainees and newly qualified counselling psychologists constructed and made sense of their emerging professional identities and what experiences, past and present, they drew upon in the context of their training to shape those identities. Applying narrative inquiry to analyse eight open-ended interviews, eight preliminary themes were originally identified in participants’ narratives, which with further refinements lead to stories of struggle and marginalisation, growth and discovery, and power and resilience. Participants’ stories of struggle and marginalisation emerged in reference to early family dynamics and stressful life experiences, which seemed to also foster a strong identification with the counselling psychology profession, while stories of growth and discovery focused on the importance of having supportive figures, who helped to instill a sense of security and create an atmosphere of openness. It was in this learning environment that participants felt it was possible to develop a more resilient, empowered professional self, which allowed them to shed an earlier sense of struggle and vulnerability. However, where more of an emphasis was placed on power and resilience, there seemed to be less room for participants to express other feelings that came into conflict with their preferred sense of professional self. While there seems to be a need for a ‘safer’ climate, in which trainees could voice and acknowledge anxieties, vulnerabilities and limitations, addressing concerns around power and vulnerability that may be contributing to the silencing of particular voices and identities may be equally important if trainees are to develop coherent and distinct counselling psychologist identities.
Resumo:
Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed and maintained externally to the organisation. Therefore, it is essential for cloud providers to demonstrate and implement adequate security practices to protect the data and processes put under their stewardship. Security transparency in the cloud is likely to become the core theme that underpins the systematic disclosure of security designs and practices that enhance customer confidence in using cloud service and deployment models. In this paper, we present a framework that enables a detailed analysis of security transparency for cloud based systems. In particular, we consider security transparency from three different levels of abstraction, i.e., conceptual, organisation and technical levels, and identify the relevant concepts within these levels. This allows us to provide an elaboration of the essential concepts at the core of transparency and analyse the means for implementing them from a technical perspective. Finally, an example from a real world migration context is given to provide a solid discussion on the applicability of the proposed framework.
Resumo:
Cette thèse se penche sur la rationalité sécuritaire qui organise les villes de Douala et Yaoundé. En effet, l’insécurité urbaine devient une question très préoccupante, encore plus dans les villes des pays du Sud notamment les villes camerounaises où la recrudescence de la criminalité et de la violence ont donné lieu à des initiatives de sécurisation de la part de l’État et de la population. Sur le plan de la théorie, plusieurs approches nous permettent de nous projeter dans l’environnement sécuritaire des villes à l’étude. Nous considérons les villes de Douala et Yaoundé comme des lieux de production culturelle où se construisent à la faveur des migrations, à partir de diverses cultures et de comportements issus des villages d’origine, des formes d’identités hybrides et des territoires urbains diversifiés. Cela donne donc à réfléchir sur les modes de gouvernance locale, à l’échelle des quartiers, dans le but de comprendre les modalités d’encadrement de cette dynamique culturelle urbaine. Dans le même ordre d’idées, la gouvernance locale fait appel aux acteurs, dans leurs rôles et leurs logiques. Ces logiques s’observent dans leurs dimensions cognitives et leurs rapports avec l’espace. Les dimensions cognitives évoquent les perceptions, le vécu et les représentations subjectives qui sont associées à l’insécurité. Ainsi, le sentiment d’insécurité, la peur, la marginalisation, la violence et la criminalisation sont des phénomènes qui laissent entrevoir des populations défavorisées, victimes d’insécurité. C’est à côté de ces dernières que se manifestent les logiques d’acteurs associées à l’espace, qui ouvrent l’observation sur l’informalité et la ségrégation non seulement comme instruments de contrôle de l’espace urbain, mais également comme cadres de production d’espaces sécurisés. L’informalité et la ségrégation sont aussi favorables au développement des identités, à la construction d’utopies, ces visions mélioratives qui motivent et transforment les acteurs. Ce sont ces logiques d’acteurs dans leurs rapports avec l’espace qui justifient les initiatives de sécurisation. Finalement, c’est dans cette dynamique de transformation que les acteurs entrent en processus de subjectivation pour se produire comme sujets. Sur le plan méthodologique, cette thèse repose sur une ethnographie critique et comparative de la sécurité et sur l’approche de l’action sociale, qui invite à s’attarder aux interactions sociales, pour rendre compte de la rationalité sécuritaire. Étudier la sécurité requiert de s’attarder à l’échelle des quartiers, objets principaux de la sécurisation et espaces d’expression de l’informalité. Les quartiers sont encadrés par les chefferies urbaines, dont les systèmes de gestion constituent la gouvernance locale. Face à la question de la sécurité, cette gouvernance se prononce entre autres en fonction de son identité, de sa culture et de ses représentations. Elle côtoie les logiques étatiques dont les techniques et les stratégies d’organisation matérialisent les politiques de sécurité. Douala et Yaoundé présentent des approches populaires de sécurisation qui diffèrent sur le plan de l’organisation locale des quartiers et du tempérament populaire. Elles se rapprochent par les logiques d’acteurs et la motivation que ces derniers ont à se produire en sujets. La recherche a permis de constater qu’une forme de rationalité régit l’ensemble des dynamiques et des stratégies de production de la sécurité qui ont cours à Douala et Yaoundé. Cette rationalité passe par une pluralité de logiques de sécurité, elles-mêmes tributaires de nombreux phénomènes qui contribuent à la production de l’insécurité, mais aussi à celle de la sécurité. En effet, les migrations de la campagne vers la ville, l’informalité, la ségrégation et la présence de gangs locaux sont des réalités urbaines qui donnent une forme particulière à l’insécurité, mais invitent également à une réadaptation des techniques et des groupes d’acteurs impliqués dans la production de la sécurité. Il ressort que la rationalité sécuritaire, cette intelligence de gouvernement qui s’organise dans les dispositifs de l’offre publique de sécurité, suscite aussi dans les procédés des acteurs populaires, des techniques d’identification aux forces de l’ordre. Dans son processus, elle aboutit à la production de sujets sécurisés et de sécurité. En saisissant les productions humaines comme des activités innovantes, nous comprenons que la sécurisation procède par rapprochement entre les forces de l’ordre et les populations, par la mise en oeuvre de mécanismes mis en place pour répondre à la menace mais aussi par la « confiscation de la sécurité » pour les besoins d’une élite. Ensuite, elle représente une instance de subjectivation où l’innovation se matérialise et où les acteurs se réalisent, créent la sécurité et recréent la ville. Finalement, cette thèse révèle une pluralité de logiques de sécurité construites autour d’une même rationalité sécuritaire.
Resumo:
A multi-sectorial regime of protection including international treaties, conservation and security measures, demand reduction campaigns and quasi-military interventions has been established to protect rhinos. Despite these efforts, the poaching of rhinos and trafficking of rhino horn continue unabated. This dissertation asks why the illegal market in rhinoceros horn is so resilient in spite of the myriad measures employed to disrupt it. A theoretical approach grounded in the sociology of markets is applied to explain the structure and functioning of the illegal market. The project follows flows of rhino horn from the source in southern Africa to illegal markets in Southeast Asia. The multi-sited ethnography included participant observations, interviews and focus groups with 416 informants during fourteen months of fieldwork. The sample comprised of, amongst others, convicted and active rhino poachers, smugglers and kingpins, private rhino breeders and hunting outfitters, African and Asian law enforcement officials, as well as affected local communities and Asian consumers. Court files, CITES trade data, archival materials, newspaper reports and social media posts were also analysed to supplement findings and to verify and triangulate data from interviews, focus groups and observations. Central to the analysis is the concept of “contested illegality”, a legitimization mechanism employed by market participants along the different segments of the horn supply chain. These actors' implicit or explicit contestation of the state-sponsored label of illegality serves as a legitimising and enabling mechanism, facilitating participation in gray or illegal markets for rhino horn. The research identified fluid interfaces between legal, illegal and gray markets, with recurring actors who have access to transnational trade structures, and who also possess market and product knowledge, as well as information about the regulatory regime and its loopholes. It is against the background of colonial, apartheid and neoliberal exploitation and marginalization of local communities that a second argument is introduced: the path dependency of conservation paradigms. Underpinning rhino conservation and regulation are archaic and elitist conservation regimes that discount the potential for harmonious relationships between local communities and wildlife. The increasing militarization of anti-poaching measures and green land grabs are exacerbating the rhino problem by alienating communities further from conservation areas and wild animals. The third argument looks at how actors deal with coordination problems in transnational illegal markets. Resolving the coordination problems of cooperation, value and competition are considered essential to the operation of formal markets. It is argued that the problem of security provides an additional and crucial obstacle to actors transacting in markets. The systematic analysis of flows between the researched sites of production, distribution and consumption of rhino horn shows that the social embeddedness of actors facilitates the flourishing of illegal markets in ways that escape an effective enforcement of CITES regulations.
Resumo:
The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicine chart. This process can be very strenuous and error-prone, given the number of sub-tasks involved in the entire workflow and the dynamic nature of the work environment. Therefore, efforts are being made to digitalise the medication dispensation process by introducing a mobile application called Smart Dosing application. The introduction of the Smart Dosing application into hospital workflow raises security concerns and calls for security requirement analysis. This thesis is written as a part of the smart medication management project at Embedded Systems Laboratory, A° bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive stateof- the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.