960 resultados para PUBLIC SECURITY
Resumo:
Acknowledgements The research described here is supported by the award made by the RCUK Digital Economy programme to the dot.rural Digital Economy Research Hub; award reference: EP/G066051/1. Further, we would like to acknowledge the RCUK research grant EP/J000604/2.
Resumo:
We analyze democratic equity in council voting games (CVGs). In a CVG, a voting body containing all members delegates decision-making to a (time-varying) subset of its members, as describes, e.g., the relationship between the United Nations General Assembly and the United Nations Security Council (UNSC). We develop a theoretical framework for analyzing democratic equitability in CVGs at both the country and region levels, and for different assumptions regarding preference correlation. We apply the framework to evaluate the equitability of the UNSC, and the claims of those who seek to reform it. We find that the individual permanent members are overrepresented by between 21.3 times (United Kingdom) and 3.8 times (China) from a country-level perspective, while from a region perspective Eastern Europe is the most heavily overrepresented region with more than twice its equitable representation, and Africa the most heavily underrepresented. Our equity measures do not preclude some UNSC members from exercising veto rights, however.
Resumo:
The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.
Resumo:
The postwar development of the Intelligence Services in Japan has been based on two contrasting models: the centralized model of the USA and the collegiality of UK, neither of which has been fully developed. This has led to clashes of institutional competencies and poor anticipation of threats towards national security. This problem of opposing models has been partially overcome through two dimensions: externally through the cooperation with the US Intelligence Service under the Treaty of Mutual Cooperation and Security; and internally though the pre-eminence in the national sphere of the Department of Public Safety. However, the emergence of a new global communicative dimension requires that a communicative-viewing remodeling of this dual model is necessary due to the increasing capacity of the individual actors to determine the dynamics of international events. This article examines these challenges for the Intelligence Services of Japan and proposes a reform based on this new global communicative dimension.
Resumo:
This article discusses the challenges of irregular migration for the security of the EU. They are analyzed starting with the European Security Strategy 2003, and the Report on its Implementation, 2008, and notes many failures: The EU Members did not follow the directives adopted in Brussels, the mismanagement of migration and asylum policies, and numerous actions that can be characterized or described as improvised, scattered or irresponsible. The 2016 Global Strategy recognizes these failures and call attention to the European leaders to reconsider how the EU functions and operates, suggesting the need for greater unity and cooperation to achieve a more effective migration policy. However, the article points out that practically all of the sections of the new Strategy dealing with migration were already embodied in previous Strategies, and stress that in parallel with the publication of the 2016 Global Strategy, actions are already undertaken, such as the EU readmission agreements signed with several important third countries of origin.
Resumo:
The proliferation of weapons of mass destruction (WMD), nuclear, biological and chemical (NBC) is one of the main security challenges facing the international community today. However the new Global Security Strategy of 2016 raises the question of non-proliferation of WMD only as an incidental matter, not addressing directly the threat, a fundamental threat in the regional and global security. This is a clear step backwards for the European common security.
Resumo:
The present article reviews the relations between the EU and Russia in the past decade and shows the deterioration of the bilateral relations. The Putin´s Russia has become a very active geostrategic player, with a worrying behaviour, breaking balances in the international scene established since the end of the Cold War. Russia is a priority in the Foreign and Security Policy of the European Global Security Strategy, but has become also a clear competitor. This last aspect is not sufficiently underlined in the Strategy and thus the strategic framework is not clear. In parallel, it is not clear in the Strategy which are the tools the EU has to defend its neighbourhood when their independence, sovereignty or territorial defence may be put in question. This question goes beyond the support to the resilience of those neighbours.
Resumo:
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.
Resumo:
This paper aims to conceptualise trafficking in human beings (THB) as an organised crime by drawing on the rational choice theory. Utilising crime scripting principles, it proposes trafficking schematics to capture and visualise THB in its entirety. Stemming from its transnational nature and varying conceptualisations, combatting THB faces challenges, such as the lack of harmonisation of policy instruments and differing stakeholder agendas. To mitigate these challenges, this paper proposes trafficking schematics. Their core lies in the modelling of THB constituent elements, including stages and their sequence, key actors and relationships, and financial modus operandi. Trafficking schematics may therefore contribute to addressing THB in a holistic, dynamic and integrated way, by enriching stakeholders’ understanding of the phenomenon and facilitating collaboration to address it. The paper contributes to theory and practice by drawing up a model of the procedural, human, logistical and environmental elements of THB that may be viewed as an instrument of public value creation.
Resumo:
Public Lightning is an important part of municipality’s nighttime landscape. Lighting can be used to enhance public safety and security while improving the aesthetic appeal of the surrounding properties but with the current global financial crisis, such lighting systems must also be sustainable. Most climate policy efforts focus on the state and international level, however national governments won’t be able to meet their international commitments without local action. In Portugal, the Public Lighting is responsible for 3% of energy consumption. The problem is that the trend is to increase (about 4-5% per year) which represents very high costs for the municipal authorities. In terms of numbers are analyzed in this thesis 45 of 278 existent in Continental Portugal what represents only 16,2 % of the counties. This where the local authorities in Portugal that had a Sustainable Energy Action Plan (SEAP) that had been accepted and made available in the Covenant of Mayors website until the end of year 2013. It is important that the Covenant of Mayors will increase the local authorities awareness for energy efficiency and especially to public lighting because there is still a long way to go in terms of energy consumption reduction. In future works it would be interesting to see the payback of the EolGreen post in a real scenario due to lack of energy consumption from the grid it would allow to have a pretty high initial investment even with the maintenance that those technologies need.
Resumo:
Leptospirosis is an important but neglected zoonotic disease that is often overlooked in Africa. Although comprehensive data on the incidence of human disease are lacking, robust evidence of infection has been demonstrated in people and animals from all regions of the continent. However, to date, there are few examples of direct epidemiological linkages between human disease and animal infection. In East Africa, awareness of the importance of human leptospirosis as a cause of non-malarial febrile illness is growing. In northern Tanzania, acute leptospirosis has been diagnosed in 9% of patients with severe febrile illness compared to only 2% with malaria. However, little is known about the relative importance of different potential animal hosts as sources of human infection in this area. This project was established to investigate the roles of rodents and ruminant livestock, important hosts of Leptospira in other settings, in the epidemiology of leptospirosis in northern Tanzania. A cross-sectional survey of rodents living in and around human settlements was performed alongside an abattoir survey of ruminant livestock. Unusual patterns of animal infection were detected by real-time PCR detection. Renal Leptospira infection was absent from rodents but was detected in cattle from several geographic areas. Infection was demonstrated for the first time in small ruminants sub-Saharan Africa. Two major Leptospira species and a novel Leptospira genotype were detected in livestock. L. borgpetersenii was seen only in cattle but L. kirschneri infection was detected in multiple livestock species (cattle, sheep and goats), suggesting that at least two distinct patterns of Leptospira infection occur in livestock in northern Tanzania. Analysis of samples from acute leptospirosis in febrile human patients could not detect Leptospira DNA by real-time PCR but identified social and behavioural factors that may limit the utility of acute-phase diagnostic tests in this community. Analysis of serological data revealed considerable overlap between serogroups detected in cattle and human leptospirosis cases. Human disease was most commonly attributed to the serogroups Mini and Australis, which were also predominant reactive serogroups in cattle. Collectively, the results of this study led to the hypothesis that livestock are an important reservoir of Leptospira infection for people in northern Tanzania. These results also challenge our understanding of the relationship between Leptospira and common invasive rodent species, which do not appear to maintain infection in this setting. Livestock Leptospira infection has substantial potential to affect the well-being of people in East Africa, through direct transmission of infection or through indirect effects on food production and economic security. Further research is needed to quantify the impact of livestock leptospirosis in Africa and to develop effective interventions for the control of human and animal disease.
Resumo:
At head of title: 97th Congress, 1st session. Committee print. WMCP: 97-15.
Resumo:
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
Resumo:
Turkey is a non-nuclear member of a nuclear alliance in a region where nuclear proliferation is of particular concern. As the only North Atlantic Treaty Organization (NATO) member that has a border with the Middle East, Turkish officials argue that Turkey cannot solely rely on NATO guarantees in addressing the regional security challenges. However, Turkey has not been able to formulate a security policy that reconciles its quest for independence, its NATO membership, the bilateral relationship with the United States, and regional engagement in the Middle East. This dissertation assesses the strategic implications of Turkey’s perceptions of the U.S./NATO nuclear and conventional deterrence on nuclear issues. It explores three case studies by the process tracing of Turkish policymakers’ nuclear-related decisions on U.S. tactical nuclear weapons deployed in Europe, national air and missile defense, and Iran’s nuclear program. The study finds that the principles of Turkish security policymaking do not incorporate a fundamentally different reasoning on nuclear issues than conventional deterrence. Nuclear weapons and their delivery systems do not have a defining role in Turkish security and defense strategy. The decisions are mainly guided by non-nuclear considerations such as Alliance politics, modernization of the domestic defense industry, and regional influence. The dissertation argues that Turkey could formulate more effective and less risky security policies on nuclear issues by emphasizing the cooperative security approaches within the NATO Alliance over confrontational measures. The findings of this dissertation reveal that a major transformation of Turkish security policymaking is required to end the crisis of confidence with NATO, redefinition of the strategic partnership with the US, and a more cautious approach toward the Middle East. The dissertation argues that Turkey should promote proactive measures to reduce, contain, and counter risks before they develop into real threats, as well as contribute to developing consensual confidence-building measures to reduce uncertainty.