960 resultados para Collective Security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The narrative of the United States is of a "nation of immigrants" in which the language shift patterns of earlier ethnolinguistic groups have tended towards linguistic assimilation through English. In recent years, however, changes in the demographic landscape and language maintenance by non-English speaking immigrants, particularly Hispanics, have been perceived as threats and have led to calls for an official English language policy.This thesis aims to contribute to the study of language policy making from a societal security perspective as expressed in attitudes regarding language and identity originating in the daily interaction between language groups. The focus is on the role of language and American identity in relation to immigration. The study takes an interdisciplinary approach combining language policy studies, security theory, and critical discourse analysis. The material consists of articles collected from four newspapers, namely USA Today, The New York Times, Los Angeles Times, and San Francisco Chronicle between April 2006 and December 2007.Two discourse types are evident from the analysis namely Loyalty and Efficiency. The former is mainly marked by concerns of national identity and contains speech acts of security related to language shift, choice and English for unity. Immigrants are represented as dehumanised, and harmful. Immigration is given as sovereignty-related, racial, and as war. The discourse type of Efficiency is mainly instrumental and contains speech acts of security related to cost, provision of services, health and safety, and social mobility. Immigrants are further represented as a labour resource. These discourse types reflect how the construction of the linguistic 'we' is expected to be maintained. Loyalty is triggered by arguments that the collective identity is threatened and is itself used in reproducing the collective 'we' through hegemonic expressions of monolingualism in the public space and semi-public space. The denigration of immigrants is used as a tool for enhancing societal security through solidarity and as a possible justification for the denial of minority rights. Also, although language acquisition patterns still follow the historical trend of language shift, factors indicating cultural separateness such as the appearance of speech communities or the use of minority languages in the public space and semi-public space have led to manifestations of intolerance. Examples of discrimination and prejudice towards minority groups indicate that the perception of worth of a shared language differs from the actual worth of dominant language acquisition for integration purposes. The study further indicates that the efficient working of the free market by using minority languages to sell services or buy labour is perceived as conflicting with nation-building notions since it may create separately functioning sub-communities with a new cultural capital recognised as legitimate competence. The discourse types mainly represent securitising moves constructing existential threats. The perception of threat and ideas of national belonging are primarily based on a zero-sum notion favouring monolingualism. Further, the identity of the immigrant individual is seen as dynamic and adaptable to assimilationist measures whereas the identity of the state and its members are perceived as static. Also, the study shows that debates concerning language status are linked to extra-linguistic matters. To conclude, policy makers in the US need to consider the relationship between four factors, namely societal security based on collective identity, individual/human security, human rights, and a changing linguistic demography, for proposed language intervention measures to be successful.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Have Europeans lost the art of making grand strategy? In a reflection process initiated by Sweden, Poland, Italy and Spain, they are invited to rediscover it and draft a “European Global Strategy”. This policy brief argues that what the EU needs most is a short set of priorities for collective action, to be reassessed for each term of the High Representative.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Organization for Security and Cooperation in Europe (OSCE) is the first and currently the only international body to have a monitoring mission deployed in Ukraine. This is as it should be, argues Erwan Fouéré. Today, with EU members making up half the membership of the OSCE, the EU needs to show greater responsibility and far-sightedness in its dealings with the OSCE. In the run-up to the 40th anniversary of the Helsinki Final Act, and faced with its most serious security crisis since the fall of the Berlin Wall, the EU should take the lead once again in fostering collective responsibility on the part of all Participating States to ensure a meaningful and effective role for the OSCE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Organization for Security and Cooperation in Europe (OSCE) is the first and currently the only international body to have a monitoring mission deployed in Ukraine. This is as it should be, argues Erwan Fouéré. Today, with EU members making up half the membership of the OSCE, the EU needs to show greater responsibility and far-sightedness in its dealings with the OSCE. In the run-up to the 40th anniversary of the Helsinki Final Act, and faced with its most serious security crisis since the fall of the Berlin Wall, the EU should take the lead once again in fostering collective responsibility on the part of all Participating States to ensure a meaningful and effective role for the OSCE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

FOREWORD. When one looks at the present state of the CSDP, one cannot help but look on with disenchantment at the energy that appears to have abandoned both institutions and Member States. Commentators increasingly take for granted that nothing much should be expected from this field of EU policy. The reasons for this state of mind are well known: the recent economic and financial strains, which have impacted all EU action since 2008, means that most of the Member States will struggle to keep their defence budgets at their present level in the future, and we may even see reductions. Furthermore, and to put it mildly, most of the recent CSDP operations have also experienced a lack of enthusiasm. Adding to this overall trend, the EU is far from presenting a common vision of what security and defence should really mean. Many of the Member States do not want to be involved in all of today’s international turmoils, and they rarely share the strategic culture which inspires those Member States who see themselves as having special responsibilities in dealing with these crises. In the end it may be that Member States diverge fundamentally on the simple question of whether it is relevant for the EU to engage in most of the ‘hot’ crises Europe faces; many prefer to see Europe as a soft power, mostly dedicated to intervening on less dramatic fronts and more inclined to mend than to fight. For whatever reason given, it remains that if there is a lack of common understanding on what CSDP should really be about, it should not come as a surprise if this policy is presently in stalemate. As an additional blow, the Ukrainian crisis, which dragged on for the whole of last year, could only add to the downward spiral the EU has been experiencing, with a new Russia aggressively confronting Europe in a manner not too distant from the Cold War days. This attitude has triggered the natural reaction among EU Member States to seek reassurances from NATO about their own national security. Coupled with the return of France a few years ago into the integrated military command, NATO’s renewed relevance has sent a strong message to Europe about the military organisation’s credibility with regard to collective defence. Surprisingly, this overall trend was gathering momentum at the same time as other more positive developments. The European Council of December 2013 dedicated its main session to CSDP: it underlined Europe’s role as a ‘security provider’ while adopting a very ambitious road map for Europe in all possible dimensions of the security sector. Hence the impression of a genuine boost to all EU institutions, which have been invited to join efforts and give CSDP a reinvigorated efficiency. In the same way, the increasing instability in Europe’s neighbourhood has also called for more EU operations: most recently in Iraq, Libya, Northern Nigeria or South Sudan. Pressure for further EU engagement has been one of the most constant features of the discussions taking place around these crises. Moreover, a growing number of EU partners in Asia, Latin America or Eastern Europe have shown a renewed eagerness to join CSDP missions in what sounds like a vote of confidence for EU capacities. What kind of conclusion should be drawn from this contradictory situation? Probably that the EU has much more potential than it can sometimes figure out itself, if only it would be ready to adapt to the new global realities. But, more than anything else, an enhanced CSDP needs from all Member States strong political will and a clear vision of what they want this policy to be. Without this indispensable ingredient CSDP may continue to run its course, as it does today. It may even grow in efficiency but it will keep lacking the one resource that would definitely help it overcome all the present shortcomings that have prevented Europe from finding its true role and mission through the CSDP. Member States remain central to EU security and defence policy. This is why this collection of essays is so valuable for assessing in no uncertain way the long road that lies ahead for any progress to be made. Pierre VIMONT Senior Associate at Carnegie Europe Former Executive Secretary-General of the European External Action Service

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This collective EU Diplomacy Paper on relations between the North Atlantic Treaty Organisation (NATO) and the European Union (EU) consists of essays written by students of the EU International Relations and Diplomacy Studies programme at the College of Europe in the class on EU-NATO relations taught by Fulbright Professor Mark Sheetz in the academic year 2014-15. It seeks to provide a blueprint of what the near future of the transatlantic alliance and of the European security framework might look like. Special attention will be given to the possible effects of Finland joining NATO, Swedish-NATO relations, the question whether NATO should continue to exist at all, and finally the use of the Common Foreign and Security Policy (CFSP) and the Common Security and Defence Policy (CSDP) in relation with the transatlantic military alliance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bibliography: p. 111-116.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Due to their informality, the favelas of Rio de Janeiro are in a precarious position. Though the informal neighborhoods have long served as sites of affordable housing for Rio’s poorest residents, changes within in the city related to public security, mega-events, real estate speculation, and urban revitalization jeopardize their permanence. As one possible solution, this study, conducted for the client Catalytic Communities, investigated collective titling in favelas modeled after quilombos, territories recognized and titled by Brazilian federal law as patrimonies of black cultural traditions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.