774 resultados para military modernization, military operation, Emerging Threats, National Security, National Defense, Asymmetric War, Armed Conflict.
Resumo:
Recent decades have witnessed a global acceleration of legislative and private sector initiatives to deal with Cross-Border insolvency. Legislative institutions include the various national implementations of the Model Law on Cross-Border Insolvency (Model Law) published by the United Nations Commission on International Trade (UNCITRAL).3 Private mechanisms include Cross-Border protocols developed and utilised by insolvency professionals and their advisers (often with the imprimatur of the judiciary), on both general and ad hoc bases. The Asia Pacific region has not escaped the effect of those developments, and the economic turmoil of the past few years has provided an early test for some of the emerging initiatives in that region. This two-part article explores the operation of those institutions through the medium of three recent cases.
Resumo:
The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.
Resumo:
The emerging ‘responsibility to protect’ (R2P) principle presents a significant challenge to the BRICS (Brazil, Russia, India, China and South Africa) states’ traditional emphasis on a strict Westphalian understanding of state sovereignty and non-interference in domestic affairs. Despite formally endorsing R2P at the 2005 World Summit, each of the BRICS has, to varying degrees, retained misgivings about coercive measures under the doctrine’s third pillar. This paper examines how these rising powers engaged with R2P during the 2011–2012 Libyan and Syrian civilian protection crises. The central finding is that although all five states expressed similar concerns over NATO’s military campaign in Libya, they have been unable to maintain a common BRICS position on R2P in Syria. Instead, the BRICS have splintered into two sub-groups. The first, consisting of Russia and China, remains steadfastly opposed to any coercive measures against Syria. The second, comprising the democratic IBSA states (India, Brazil and South Africa) has displayed softer, more flexible stances towards proposed civilian protection measures in Syria, although these three states also remain cautious about the implementation of R2P’s coercive dimension. This paper identifies a number of factors which help to explain this split, arguing that the failure to maintain a cohesive BRICS position on R2P is unsurprising given the many internal differences and diverging national interests between the BRICS members. Overall, the BRICS’ ongoing resistance to intervention is unlikely to disappear quickly, indicating that further attempts to operationalize R2P’s third pillar may prove difficult.
Resumo:
Crowds of noncombatants play a large and increasingly recognized role in modern military operations and often create substantial difficulties for the combatant forces involved. However, realistic models of crowds are essentially absent from current military simulations. To address this problem, the authors are developing a crowd simulation capable of generating crowds of noncombatant civilians that exhibit a variety of realistic individual and group behaviors at differing levels of fidelity. The crowd simulation is interoperable with existing military simulations using a standard, distributed simulation architecture. Commercial game technology is used in the crowd simulation to model both urban terrain and the physical behaviors of the human characters that make up the crowd. The objective of this article is to present the design and development process of a simulation that integrates commercially available game technology with current military simulations to generate realistic and believable crowd behavior.
Resumo:
Crowds of non-combatants play a large and increasingly recognized role in modern military operations, and often create substantial difficulties for the combatant forces involved. However, realistic models of crowds are essentially absent from current military simulations. To address this problem we are developing a crowd simulation capable of generating crowds of non-combatant civilians that exhibit a variety of realistic individual and group behaviours at differing levels of fidelity. The crowd simulation is interoperable with existing military simulations using a standard distributed simulation architecture. Commercial game technology is utilized in the crowd simulation to model both urban terrain and the physical behaviours of the human characters that make up the crowd. The objective of this paper is to present the process involved with the design and development of a simulation that integrates commercially available game technology with current military simulations in order to generate realistic and believable crowd behaviour.
Resumo:
Poor health and injury represent major obstacles to the future economic security of Australia. The national economic cost of work-related injury is estimated at $57.5 billion p/a. Since exposure to high physical demands is a major risk factor for musculoskeletal injury, monitoring and managing such physical activity levels in workers is a potentially important injury prevention strategy. Current injury monitoring practices are inadequate for the provision of clinically valuable information about the tissue specific responses to physical exertion. Injury of various soft tissue structures can manifest over time through accumulation of micro-trauma. Such micro-trauma has a propensity to increase the risk of acute injuries to soft-tissue structures such as muscle or tendon. As such, the capacity to monitor biomarkers that result from the disruption of these tissues offers a means of assisting the pre-emptive management of subclinical injury prior to acute failure or for evaluation of recovery processes. Here we have adopted an in-vivo exercise induced muscle damage model allowing the application of laboratory controlled conditions to assist in uncovering biochemical indicators associated with soft-tissue trauma and recovery. Importantly, urine was utilised as the diagnostic medium since it is non-invasive to collect, more acceptable to workers and less costly to employers. Moreover, it is our hypothesis that exercise induced tissue degradation products enter the circulation and are subsequently filtered by the kidney and pass through to the urine. To test this hypothesis a range of metabolomic and proteomic discovery-phase techniques were used, along with targeted approaches. Several small molecules relating to tissue damage were identified along with a series of skeletal muscle-specific protein fragments resulting from exercise induced soft-tissue damage. Each of the potential biomolecular markers appeared to be temporally present within urine. Moreover, the regulation of abundance seemed to be associated with functional recovery following the injury. This discovery may have important clinical applications for monitoring of a variety of inflammatory myopathies as well as novel applications in monitoring of the musculoskeletal health status of workers, professional athletes and/or military personnel to reduce the onset of potentially debilitating musculoskeletal injuries within these professions.
Resumo:
Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.
Resumo:
Maritime terrorism is one of the main maritime security issues in the contemporary world. The threat of maritime terrorism is more apparent than ever in the post-September 11 era. Although maritime terrorism is an old issue, the disastrous events of 11 September 2001 brought this issue again onto the global agenda. This incident brought to the forefront the longstanding concerns that terrorists could severely disrupt the global maritime supply chain by using shipping containers or vessels to attack major business centres, port facilities and offshore installations. A number of international criminal law studies have been conducted to identify international legal challenges in maritime security. Some of these works have critically examined the international legal framework for maritime security and identified the lacunas in the existing system. Some of these writings have also identified that emerging maritime terrorism issues are prompting States to introduce some stringent measures. Although the international legal regime related to maritime terrorism is a well-researched area, very little research work has explored the legal issues related to State responsibility for maritime terrorism. This article argues that, although the United Nations Convention on the Law of the Sea (UNCLOS) provisions related to maritime piracy may not be applicable for some dimensions of maritime violence, different provisions of UNCLOS may relevant in identifying State responsibility for maritime terrorism.
Resumo:
The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.
Resumo:
This thesis examines the role of conservative newspaper proprietors and editors to generate support for war against the Boers in South Africa. The thesis utilises Rune Ottosen's theoretical model concerning newspapers creating a pro-war mentality, and S.E. Finer's theory on the influences of the military on civilian Government. The pivotal supportive roles of Governor Lamington and Premiers Dickson and Philp and the oppositional role of Premier Dawson are also examined.
Resumo:
The final report for the ARC project "Airports of the Future". It contains the findings and recommendations provided by the various teams to the industry partners.
Resumo:
For the past decade, at least, varieties of small, hand held networked instruments have appeared on the global scene, selling in record numbers, and being utilized by all manner of persons from the old to the young; children, women, men, the wealthy and the poor and in all countries. Their presences bespeak a radical shift in telecommunications infrastructure and the future of communications. They are particularly visible in urban areas where mobile transmission network infrastructure (3G, 4G, cellular and Wi-Fi) is more established and substantial, options more plentiful, and density of populations more dramatic. These end user products—I phones, cell phones, Blackberries, DSi, DS, IPads, Zooms, and others – of the mobile communications industry are the latest, hottest globalized commodities. At the same time, wirelessness, or the state of being wireless, and therefore capable of taking along one's networks, communicating from unlikely spaces, and navigating with GPS, is a complex social, political and economic communications phenomenon of early 21st century life. This thesis examines the specter of being wireless in cities. It lends the entire idea an experimentally envisioned, historical and planned context wherein personalization of media tools is seen both as a design development of corporate, artistic, and military imagination, as well as a profound social phenomenon enabling new forms of sharing, belonging, and urban community. In doing that it asserts the parameters of a new mobile space which, aside from clear benefits to humankind by way of mobility, has reinscribed numerous categories including gender. Moreover, it posits the recognition of other, more nuanced theoretical spaces for complex readings of gender and gendered use, including some instantiation of the notion of 'network' itself as a cyborgian and gendered social form. Additionally, cities are studied as places where technology is not only quickly popularized, but is connected to larger political interests, such as the reading of data, tracking of information, and the new security culture. In so doing the work has been undertaken as an urban spatial analysis and experimental ethnography, utilizing architectural, feminist, techno-utopian, industrial and theoretical literatures as discursive underpinnings from whence understandings and interpretations of mobile space, the mobile office, networked mobility, and personal media have come, linking the space of cities to specific, pioneering urban public art projects in which voice, texting and MMS have been utilized in expressions of ubiquitous networks and urban history. Through numerous examples of techno art, the thesis discusses the 'wireless city' as an emerging cultural, socially constructed economic and spatial entity, both conceived and formed through historic processes of urbanization.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
Resumo:
Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.
Resumo:
This article assesses the extent to which the recently formulated Chinese concept of “Responsible Protection” (RP) offers a valuable contribution to the normative debate over R2P’s third pillar following the controversy over military intervention in Libya. While RP draws heavily on previous proposals such as the original 2001 ICISS report and Brazil’s “Responsibility while Protecting” (RwP), by amalgamating and re-packaging these earlier ideas in a more restrictive form the initiative represents a new and distinctive interpretation of R2P. However, some aspects of RP are framed too narrowly to provide workable guidelines for determining the permissibility of military intervention for civilian protection purposes, and should therefore be clarified and refined. Nevertheless, the Chinese proposal remains significant because it offers important insights into Beijing’s current stance on R2P. More broadly, China’s RP and Brazil’s RwP initiatives illustrate the growing willingness of rising, non-Western powers to assert their own normative preferences on sovereignty, intervention and global governance.