866 resultados para (In)security feelings


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The importance to solve the problem of spatial-temporal dynamics analysis in the system of economic security of different subjects of economic management is substantiated. Various methods and approaches for carrying out analysis of spatial-temporal dynamics in the system of economic security are considered. The basis of the generalized analysis of spatial-temporal dynamics in economic systems is offered.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The main requirements to DRM platforms implementing effective user experience and strong security measures to prevent unauthorized use of content are discussed. Comparison of hardware-based and software- based platforms is made showing the general inherent advantages of hardware DRM solutions. Analysis and evaluation of the main flaws of hardware platforms are conducted, pointing out the possibilities to overcome them. The overview of the existing concepts for practical realization of hardware DRM protection reveals their advantages and disadvantages and the increasing demand for creation of multi-core architecture, which could assure an effective DRM protection without decreasing the user’s freedom and importing risks for end system security.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The problems of formalization of the process of matching different management subjects’ functioning characteristics obtained on the financial flows analysis basis is considered. Formal generalizations for gaining economical security system knowledge bases elements are presented. One of feedback directions establishment between knowledge base of the system of economical security and financial flows database analysis is substantiated.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Some basic types of archiving programs are described in the paper in addition to their advantages and disadvantages with respect to the analysis of security in archiving. Analysis and appraisal are performed on the results obtained during the described experiments.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article builds on the securitisation and post-development literature and it scrutinises the Czech and Hungarian legitimising discourses of the two countries’ respective Provincial Reconstruction Teams (PRTs) in the Logar and Baghlan provinces of Afghanistan from 2007 to 2013. In spite of the hybrid civil–military character of the PRTs, their security–development nexus was absent and they were respectively securitised and “developmentalised” only indirectly and to a varying extent. The PRTs were mostly justified by the Czech Republic's NATO membership as an identity issue and they were justified as a Hungarian national interest and as both an obligation and an opportunity. Rather than merely importing NATO's arguments as suggested by the previous literature, the depoliticisation and positive connotation of the intervention in Afghanistan was constructed by the domestic NATO-related identities and interests in the Czech Republic and Hungary.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2014

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Analysis of newspaper reporting on the topic of energy security in eight countries – four from the global North (France, Germany, the UK, and the United States) and four from the global South (China, India, Brazil, and South Africa) – produces no support for the thesis that news is disseminated from core countries to the periphery and semi-periphery. There is an important difference between China and the other three fast-developing countries and a highly asymmetric flow of news not aligned to old core-periphery boundaries. In general, energy security is mainly covered in trade and business outlets and less in newspapers with mass circulation, indicating that the topic is still an elite concern. In some instances, attention has surged at the same time in different countries. But very few of these instances show a homogenous coverage across countries. Despite increasingly globalised media, news is created and consumed at a national level.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article examines how the governance of justice and internal security in Scotland could be affected by the outcome of the Scottish independence referendum in September 2014. The article argues that it is currently impossible to equate a specific result in the referendum with a given outcome for the governance of justice and internal security in Scotland. This is because of the complexities of the current arrangements in that policy area and the existence of several changes that presently affect them and are outside the control of the government and of the people of Scotland. This article also identifies an important paradox. In the policy domain of justice and internal security, a ‘no’ vote could, in a specific set of circumstances, actually lead to more changes than a victory of the ‘yes’ camp.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this thesis I sought to explain the origins of national security concerns over foreign investments in the United States from 1919 to 2008. I identified and examined 29 cases of national security concerns over foreign investments in the United States during that period, and argued that in order to understand the circumstances under which foreign investments in the United States are perceived to be threats to the U.S. security we must rely on a combination of democratic peace theory and the version of political realism known as power transition theory. Thus, I tested the argument that national security concerns over foreign investments in the United States from 1919 to 2008 resulted from: (1) perceptions of international power transition, (2) perceptions of ideological and institutional differences between the United States and the home country of the investor, (3) perceptions of the strategic importance of the sector where the investment is made, and (4) perceptions of participation or control of the foreign investor by the government of the country of origin. I found that all these hypotheses have some explanatory power.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The purpose of the research is to study the relationship between international drug interdiction policies and domestic politics in fragile democracies, and to demonstrate how international drug control policies and the use of force fit the rhetoric of war, are legitimized by the principles of a just war, but may also cause collateral damage and negative unintended consequences. The method used is a case study of the Dominican Republic. The research has found that international drug control regimes, primarily led by the U.S. and narrowly focused on interdiction, have influenced an increasingly militarized approach to domestic law enforcement in the Dominican Republic. The collateral damage caused by militarized enforcement comes in the form of negative perceptions of citizen security, loss of respect for the rule of law and due process, and low levels of civil society development. The drug war has exposed the need for significant reform of the institutions charged with carrying out enforcement, the police force and the judicial system in particular. The dissertation concludes that the extent of drug trafficking in the Dominican Republic is beyond the scope of domestic reform efforts alone, but that the programs implemented do show some potential for future success. The dissertation also concludes that the framework of warfare is not the most appropriate for the international problems of drug traffic and abuse. A broader, multipronged approach should be considered by world policy makers in order to address all conditions that allow drugs to flourish without infringing upon democratic and civil rights in the process.