747 resultados para International Security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Why do states facing high levels of international threat sometimes have militaries that are heavily involved in politics and at other times relatively apolitical, professional militaries? I argue that the answer to this puzzle lies in a state's history of 'acute' international crises rather than its 'chronic' threat environment. Major international crises lead to professionalization and de-politicization of militaries in both the short- and long-term. International crises underscore the need for the military to defend the state and highlight military deficiencies in this regard. Accordingly, major international crises lead to military professionalization and withdrawal from politics in order to increase military effectiveness. This effect persists years, and decades, later due to generational shifts in the officer corps. As the "Crisis Generation" of officers become generals, they bring with them a preference for professionalization and de-politicization. They guide the military towards abstention from politics. I test this theory using a new global dataset on military officers in national governing bodies from 1964-2008 and find strong support for the theory. Major international crises lead to two waves of military withdrawal from government, years apart. Further statistical analysis finds that this effect is most strongly felt in the non-security areas of governing, while in some cases, international crises may lead to militaries increasing their involvement in security policy-making. Further, international crises that end poorly for a state — i.e., defeats or stalemates — are found to drive more rapid waves of military withdrawal from government. The statistical analysis is supported by a case illustration of civil-military relations in the People's Republic of China, which demonstrates that the crisis of the Korean War (1950-53) led to two waves of military professionalization and de-politicization, decades apart. The first occurred immediately after the war. The second wave, occurring in the 1980s, involved wholesale military withdrawal from governing bodies, which was made possible by the ascent of the "Crisis Generation" of officers in the military, who had served as junior officers in the Korean War, decades prior.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Turkey is a non-nuclear member of a nuclear alliance in a region where nuclear proliferation is of particular concern. As the only North Atlantic Treaty Organization (NATO) member that has a border with the Middle East, Turkish officials argue that Turkey cannot solely rely on NATO guarantees in addressing the regional security challenges. However, Turkey has not been able to formulate a security policy that reconciles its quest for independence, its NATO membership, the bilateral relationship with the United States, and regional engagement in the Middle East. This dissertation assesses the strategic implications of Turkey’s perceptions of the U.S./NATO nuclear and conventional deterrence on nuclear issues. It explores three case studies by the process tracing of Turkish policymakers’ nuclear-related decisions on U.S. tactical nuclear weapons deployed in Europe, national air and missile defense, and Iran’s nuclear program. The study finds that the principles of Turkish security policymaking do not incorporate a fundamentally different reasoning on nuclear issues than conventional deterrence. Nuclear weapons and their delivery systems do not have a defining role in Turkish security and defense strategy. The decisions are mainly guided by non-nuclear considerations such as Alliance politics, modernization of the domestic defense industry, and regional influence. The dissertation argues that Turkey could formulate more effective and less risky security policies on nuclear issues by emphasizing the cooperative security approaches within the NATO Alliance over confrontational measures. The findings of this dissertation reveal that a major transformation of Turkish security policymaking is required to end the crisis of confidence with NATO, redefinition of the strategic partnership with the US, and a more cautious approach toward the Middle East. The dissertation argues that Turkey should promote proactive measures to reduce, contain, and counter risks before they develop into real threats, as well as contribute to developing consensual confidence-building measures to reduce uncertainty.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One of the aspects related to biolaw is that related to security and health. In other words, using the expression of relevant authorities on this subject, “the securitization of health” and, those situations connected with the Security Council labour in the last decades, may constitute an interesting subject. Beginning with the role of the UN blue helmets in many countries where the expansion of HIV/AIDS is usual, followed by the expansion of some diseases in Haiti, together with the Ebola “crisis” in 2014 and connected with the efforts of the World Health Organization to fight against the zika...what is the role played by the United Nations Security Council on this field, trying to establish a relationship between security and health?

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Hungarian Revolution is often analysed in a national context or from the angle of Hungarian-Soviet relations. From this perspective, the Eastern European satellites seem mere puppets and the Soviet bloc a monolith. Archival evidence nevertheless shows that the Kremlin actually attempted to build a new kind of international relations after Stalin’s death in 1953, in which the Eastern European leaders would gain more scope for manoeuvre. This attempt at liberalisation even facilitated the uprisings in Hungary in 1956. Avoiding a teleological approach to the Hungarian Revolution, this article argues that the Soviet invasion was neither inevitable, nor wholly unilateral. Khrushchev even sought to legitimise the invasion in bilateral and multilateral consultations. There was a mutual interest in sacrificing Hungary’s sovereignty to safeguard the communist monopoly on power. This multilateralisation of Soviet bloc security is an important explanatory factor in an analysis of the Revolution and its repercussions in Eastern Europe.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Japan is an important ally of the United States–the world’s third biggest economy, and one of the regional great powers in Asia. Making sense of Japan’s foreign and security policies is crucial for the future of peace and stability in Northeast Asia, where the possible sources of conflict such as territorial disputes or the disputes over Japan’s war legacy issues are observed.^ This dissertation explored Japan’s foreign and security policies based on Japan’s identities and unconscious ideologies. It employed an analysis of selected Japanese films from the late 1940s to the late 1950s, as well as from the late 1990s to the mid-2000s. The analysis demonstrated that Japan’s foreign and security policies could be understood in terms of a broader social narrative that was visible in Japanese popular cultural products, including films and literatures. Narratives of Japanese families from the patriarch’s point of view, for example, had constantly shaped Japan’s foreign and security policies. As a result, the world was ordered hierarchically in the eyes of the Japan Self. In the 1950s, Japan tenaciously constructed close but asymmetrical security relations with the U.S. in which Japan willingly subjugated itself to the U.S. In the 2000s, Japan again constructed close relations with the U.S. by doing its best to support American responses to the 9/11 terrorist attacks by mobilizing Japan’s SDFs in the way Japan had never done in the past.^ The concepts of identity and unconscious ideology are helpful in understanding how Japan’s own understanding of self, of others, and of the world have shaped its own behaviors. These concepts also enable Japan to reevaluate its own behaviors reflexively, which departs from existing alternative approaches. This study provided a critical analytical explanation of the dynamics at work in Japan’s sense of identity, particularly with regard to its foreign and security policies.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent studies on the economic status of women in Miami-Dade County (MDC) reveal an alarming rate of economic insecurity and significant obstacles for women to achieve economic security. Consistent barriers to women’s economic security affect not only the health and wellbeing of women and their families, but also economic prospects for the community. A key study reveals in Miami-Dade County, “Thirty-nine percent of single female-headed families with at least one child are living at or below the federal poverty level” and “over half of working women do not earn adequate income to cover their basic necessities” (Brion 2009, 1). Moreover, conventional measures of poverty do not adequately capture women’s struggles to support themselves and their families, nor do they document the numbers of women seeking basic self-sufficiency. Even though there is lack of accurate data on women in the county, which is a critical problem, there is also a dearth of social science research on existing efforts to enhance women’s economic security in Miami-Dade County. My research contributes to closing the information gap by examining the characteristics and strategies of women-led community development organizations (CDOs) in MDC, working to address women’s economic insecurity. The research is informed by a framework developed by Marilyn Gittell, who pioneered an approach to study women-led CDOs in the United States. On the basis of research in nine U.S. cities, she concluded that women-led groups increased community participation and “by creating community networks and civic action, they represent a model for community development efforts” (Gittell, et al. 2000, 123). My study documents the strategies and networks of women-led CDOs in MDC that prioritize women’s economic security. Their strategies are especially important during these times of economic recession and government reductions in funding towards social services. The focus of the research is women-led CDOs that work to improve social services access, economic opportunity, civic participation and capacity, and women’s rights. Although many women-led CDOs prioritize building social infrastructures that promote change, inequalities in economic and political status for women without economic security remain a challenge (Young 2004). My research supports previous studies by Gittell, et al., finding that women-led CDOs in Miami-Dade County have key characteristics of a model of community development efforts that use networking and collaboration to strengthen their broad, integrated approach. The resulting community partnerships, coupled with participation by constituents in the development process, build a foundation to influence policy decisions for social change. In addition, my findings show that women-led CDOs in Miami-Dade County have a major focus on alleviating poverty and economic insecurity, particularly that of women. Finally, it was found that a majority of the five organizations network transnationally, using lessons learned to inform their work of expanding the agency of their constituents and placing the economic empowerment of women as central in the process of family and community development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to software systems, there are still a large number of vulnerabilities that can remain, despite these measures. Some vulnerabilities stay in a system from one release to the next one because they cannot be easily reproduced through testing. These vulnerabilities endanger the security of the systems. We propose vulnerability classification and prediction frameworks based on vulnerability reproducibility. The frameworks are effective to identify the types and locations of vulnerabilities in the earlier stage, and improve the security of software in the next versions (referred to as releases). We expand an existing concept of software bug classification to vulnerability classification (easily reproducible and hard to reproduce) to develop a classification framework for differentiating between these vulnerabilities based on code fixes and textual reports. We then investigate the potential correlations between the vulnerability categories and the classical software metrics and some other runtime environmental factors of reproducibility to develop a vulnerability prediction framework. The classification and prediction frameworks help developers adopt corresponding mitigation or elimination actions and develop appropriate test cases. Also, the vulnerability prediction framework is of great help for security experts focus their effort on the top-ranked vulnerability-prone files. As a result, the frameworks decrease the number of attacks that exploit security vulnerabilities in the next versions of the software. To build the classification and prediction frameworks, different machine learning techniques (C4.5 Decision Tree, Random Forest, Logistic Regression, and Naive Bayes) are employed. The effectiveness of the proposed frameworks is assessed based on collected software security defects of Mozilla Firefox.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply to the legal frameworks covering developments within the third pillar of the EU. Even Council Framework Decision 2008/977/JHA, which is supposed to cover data protection provisions within PJCCM expressly states that its provisions do not apply to “Europol, Eurojust, the Schengen Information System (SIS)” or to the Customs Information System (CIS). In addition, the post Treaty of Prüm provisions covering the sharing of DNA profiles, dactyloscopic data and vehicle registration data pursuant to Council Decision 2008/615/JHA, are not to be covered by the provisions of the 2008 Framework Decision. As stated by Hijmans and Scirocco, the regime is “best defined as a patchwork of data protection regimes”, with “no legal framework which is stable and unequivocal, like Directive 95/46/EC in the First pillar”. Data security issues are also key to the sharing of data in organised crime or counterterrorism situations. This article will critically analyse the current legal framework for data protection and security within the third pillar of the EU.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Este estudio de caso busca identificar los elementos del portafolio de política exterior de Trinidad y Tobago que le permitieron promover exitosamente sus intereses en el Protocolo de Kioto. Al hacer esto, este texto analizará las limitaciones de Trinidad y Tobago en términos de vulnerabilidades de localización, burocracia y recursos. Posteriormente, una revisión del portafolio de política exterior de este Estado ilustrará el uso de estrategias de creación de capacidades y de organización como lo son el contacto con actores institucionales y no gubernamentales, la formación de coaliciones y estrategias argumentativas, entre otras. Finalmente, este artículo concluirá que dichas acciones permitieron la promoción de la agenda de política exterior de Trinidad y Tobago a través de la creación de hojas de ruta y la coordinación de la incertidumbre con el Protocolo de Kioto. Para hacer esto, este trabajo se concentrará en examinar conceptos como vulnerabilidad y priorización, asimismo contrastando diferentes artículos académicos en la materia junto con documentos oficiales de Trinidad y Tobago.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The AgroMed International Conference 2016 aims to discuss the current land use changes, with a particular interest on farm and land system dynamics, also considering the possible competition with other uses (urban and/or natural land uses). It is focused on “Farm and land system dynamics in the Mediterranean basin: integrating spatial scales, from the local to the global one”. Teresa Pinto Correia presented H2020 project SALSA “Small farms, small food businesses and sustainable food security

Relevância:

20.00% 20.00%

Publicador: