978 resultados para financial security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Booth, Ken, and N. J. Wheeler, The Security Dilemma: Fear, Cooperation, and Trust in World Politics (Palgrave Macmillan, 2007), pp.xv+364 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

McInnes, C., Lee, K. (2006). Health, security and foreign policy. Review of International Studies, 32 (1), 5-23. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

McInnes, C., 'HIV/AIDS and national security', in: AIDS and Governance, N. Poku, A. Whiteside and B. Sandkjaer (eds.),(Aldershot: Ashgate, 2007), pp.93-111 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Williams, Mike, Culture and Security: Symbolic Power and the Politics of International Security (Oxon: Routledge, 2007), pp.xii+172 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

W przypadku niejednolitego stanowiska państw członkowskich Unii Europejskiej wobec Kosowa, osłabieniu ulega prestiż i siła oddziaływania Unii na arenie międzynarodowej. W odniesieniu do problemu Abchazji i Osetii Południowej natomiast, działania UE obrazują, że samo wyrażenie zainteresowania określonym problemem oraz udzielanie ‘apolitycznej’ pomocy finansowej, którym nie towarzyszą wyraźnie i precyzyjnie zdefiniowane cele polityczne, działalność instytucji wyposażonych w silny mandat oraz proces aktywnych negocjacji, nie przyczynia się do rozwiązania palącego problemu międzynarodowego, narażając na szwank pozycję międzynarodową Unii Europejskiej. Po raz kolejny państwa członkowskie pokazują, iż koncepcja Wspólnej Polityki Zagranicznej i Bezpieczeństwa, wspierana między innymi przez Europejską Politykę Sąsiedztwa, jest pozbawiona stabilnych podstaw.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Among the many issues that were raised in the White Book on National Security of the Republic of Poland (WBNSRP), there were also those related to the functioning of a Common Security and Defence Policy (CSDP). Its importance for the security of Poland was indicated, as well as the need on the part of EU Member States to broaden collaboration in the sphere of security and defence. The key problems occurring in the context of CSDP were also emphasised and their causes indicated. The aim of the article is to present the factors responsible for the weakening of CSDP effectiveness, ones taken into account in the White Book, and subsequently to present a Framework for their analysis in the light of further scholarship.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The text addresses the issue of information security as exemplified by clandestine collaboration and the influence exerted by the Internal Security Agency officers upon journalists. The texts analyzes the de lege lata regulations as well as the de lege ferenda ones. As for the former, the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable, whereas as for the latter, the applicable regulations are the 2013 Bill Articles numbered 197-199 (Chapter 10). In both the 2002 Act on the Internal Security Agency and Foreign Intelligence Agency as well as in the 2013 draft Bill of the Internal Security Agency, the legislator penalizes the employment by the officers of the information acquired while fulfilling or in connection with official duties for the purpose of affecting the operation of public authority bodies, entrepreneurs or broadcasters, editors-in-chief, journalists and persons conducting publishing activity. Also, the text analyzes regulations concerned with the penalization of clandestine collaboration engaged in by ABW officers with a broadcaster, editor-in-chief, a journalist and a person conducting publishing activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper reviews the provisions of the White Book on National Security of the Republic of Poland. It states that the issue of health security is not given adequate significance there. The accessibility of health services is considered, in general, solely in terms of their availability. The assumptions concerning the concept of providing the number of beds required in a state of threat to national security and in time of war do not take into account the current socio-economic conditions and need to be reviewed. The conclusions emphasize the dilemmas that emerge as a result of the unilateral promotion of a single category of national security, that is military security, in the context of ensuring health security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Autor w pracy stawia tezę, że „francusko-niemiecki motor” odegrał pozytywną rolę w procesie integracji europejskiej w XX w. Dzięki bliskiej współpracy francusko-niemieckiej możliwa była realizacja unii walutowo-gospodarczej, Wspólna Polityka Zagraniczna i Bezpieczeństwa oraz stworzenie w UE „obszaru wolności, bezpieczeństwa i sprawiedliwości”. W XXI w. trudna sytuacja gospodarcza Francji i napięcia społeczne spowodowały spadek jej znaczenia w Unii Europejskiej. Kryzys finansowy strefy euro oraz problem uchodźców wykreowały Niemcy na samotnego lidera w Unii Europejskiej. Jednakże współpraca francusko-niemiecka nie załamała się, gdyż oba państwa wzajemnie się potrzebują i zapewniają równowagę w Europie. Zdaniem wielu ekspertów, ze względu na ogólne nastroje w Europie, w Berlinie i Paryżu brakuje nowych idei ukazujących perspektywy rozwojowe Unii Europejskiej na najbliższe lata.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of a real-world malicious applet is given to demonstrate the efficacy of the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Financial time series convey the decisions and actions of a population of human actors over time. Econometric and regressive models have been developed in the past decades for analyzing these time series. More recently, biologically inspired artificial neural network models have been shown to overcome some of the main challenges of traditional techniques by better exploiting the non-linear, non-stationary, and oscillatory nature of noisy, chaotic human interactions. This review paper explores the options, benefits, and weaknesses of the various forms of artificial neural networks as compared with regression techniques in the field of financial time series analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The class of all Exponential-Polynomial-Trigonometric (EPT) functions is classical and equal to the Euler-d’Alembert class of solutions of linear differential equations with constant coefficients. The class of non-negative EPT functions defined on [0;1) was discussed in Hanzon and Holland (2010) of which EPT probability density functions are an important subclass. EPT functions can be represented as ceAxb, where A is a square matrix, b a column vector and c a row vector where the triple (A; b; c) is the minimal realization of the EPT function. The minimal triple is only unique up to a basis transformation. Here the class of 2-EPT probability density functions on R is defined and shown to be closed under a variety of operations. The class is also generalised to include mixtures with the pointmass at zero. This class coincides with the class of probability density functions with rational characteristic functions. It is illustrated that the Variance Gamma density is a 2-EPT density under a parameter restriction. A discrete 2-EPT process is a process which has stochastically independent 2-EPT random variables as increments. It is shown that the distribution of the minimum and maximum of such a process is an EPT density mixed with a pointmass at zero. The Laplace Transform of these distributions correspond to the discrete time Wiener-Hopf factors of the discrete time 2-EPT process. A distribution of daily log-returns, observed over the period 1931-2011 from a prominent US index, is approximated with a 2-EPT density function. Without the non-negativity condition, it is illustrated how this problem is transformed into a discrete time rational approximation problem. The rational approximation software RARL2 is used to carry out this approximation. The non-negativity constraint is then imposed via a convex optimisation procedure after the unconstrained approximation. Sufficient and necessary conditions are derived to characterise infinitely divisible EPT and 2-EPT functions. Infinitely divisible 2-EPT density functions generate 2-EPT Lévy processes. An assets log returns can be modelled as a 2-EPT Lévy process. Closed form pricing formulae are then derived for European Options with specific times to maturity. Formulae for discretely monitored Lookback Options and 2-Period Bermudan Options are also provided. Certain Greeks, including Delta and Gamma, of these options are also computed analytically. MATLAB scripts are provided for calculations involving 2-EPT functions. Numerical option pricing examples illustrate the effectiveness of the 2-EPT approach to financial modelling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many among the emerging generation of political elites in Africa see the role the European Union (EU) plays in the maintenance of an unprecedented period of peace in Western Europe as an inspirational example of the manner in which the African Union (AU) can contribute to peace and stability in Africa. This doctoral thesis examines security cooperation between the EU and the AU, with a particular focus on the nature and substance of that cooperation. It suggests that despite the establishment of various EU–AU institutions and ties with a role in security policy and cooperation, such security cooperation is limited in substance. This study argues that EU–AU security cooperation is especially constrained by the emergence of alternative partners, most notably China, and by failures of implementation and follow-through. Two case studies, the first dealing with EU–AU cooperation in peacekeeping, and the second addressing the silent water crisis along with the link between water and security, have been analysed in detail to determine the effectiveness and sustainability of the EU–AU partnership. A number of important lessons for regionalism, interregionalism and multilateralism are drawn from the bond between the EU and the AU. This doctoral thesis will prove that, despite an emphasis on the problematic term ‘strategic’ by both EU and AU policymakers, EU–AU cooperation is limited and somewhat lacking in strategic direction. The cooperation between the EU and the AU focuses mainly on EU financial support for AU peacekeeping and specific projects in Africa (e.g. in the water sector), as well as on a limited political dialogue. Nonetheless, the EU–AU link represents the most comprehensive partnership the AU has with any non-African actor. This study will furthermore demonstrate that the United Nations (UN) is an indispensable third-party to their relationship and it is therefore more appropriate to speak of the AU–EU–UN nexus. This doctoral thesis concludes that the AU–EU–UN nexus is an important example of interregionalism in a global context and that such interregionalism is an important emerging part of global governance.