804 resultados para International Security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, the EU and its member states have experienced a number of changes, as well as challenges, in the areas of politics, economics, security and law. As these areas are interconnected, changes and challenges to any of them have implications for the others, as well as implications for the populations and institutions of the EU or those coming into contact with its international power and influence. This edited collection focuses primarily on security and law, particularly the EU’s internal security strategy. The EU’s Internal Security Strategy, adopted by the Spanish presidency early in 2010, followed the Lisbon Treaty in 2009, building on previous developments within the EU in the Area of Freedom Security and Justice (AFSJ) policy. The focus of the EU Internal Security Strategy is to prevent and combat “serious and organised crime, terrorism and cybercrime, in strengthening the management of our external borders and in building resilience to natural and man-made disasters”. The Internal Security strategy intersects and overlaps with the European Union’s Counter-terrorism strategy, the Strategy for the External Dimension of JHA, and the EU’s Security Strategy. The role of and interaction between these strategies, their supplementing documents, and their implications for crime, victims, the law, political relations, democracy and human rights, form the backdrop against which the chapters in this collection are written. Building on original research by its contributors, this collection comprises work by authors from a wide variety of academic and professional areas and perspectives, as well as different countries, on a variety of areas and issues related to or raised by the EU’s Internal Security Strategy, from intelligence-led policing to human trafficking and port security. This book examines, from a wide variety of disciplinary perspectives including law, geography, politics and practice, both this further refinement of existing internal provisions on cross-border crime, and the increasing external relations of the EU in the AFSJ.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation explores why some states consistently secure food imports at prices higher than the world market price, thereby exacerbating food insecurity domestically. I challenge the idea that free market economics alone can explain these trade behaviors, and instead argue that states take into account political considerations when engaging in food trade that results in inefficient trade. In particular, states that are dependent on imports of staple food products, like cereals, are wary of the potential strategic value of these goods to exporters. I argue that this consideration, combined with the importing state’s ability to mitigate that risk through its own forms of political or economic leverage, will shape the behavior of the importing state and contribute to its potential for food security. In addition to cross-national analyses, I use case studies of the Gulf Cooperation Council states and Jordan to demonstrate how the political tools available to these importers affect their food security. The results of my analyses suggest that when import dependent states have access to forms of political leverage, they are more likely to trade efficiently, thereby increasing their potential for food security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The report of the proceedings of the New Delhi workshop on the SSF Guidelines (Voluntary Guidelines for Securing Sustainable Small-scale Fisheries in the Context of Food Security and Poverty Eradication). The workshop brought together 95 participants from 13 states representing civil society organizations. governments, FAO, and fishworker organizations from both the marine and inland fisheries sectors. This report will be found useful for fishworker organizations, researchers, policy makers, members of civil society and anyone interested in small-scale fisheries, tenure rights, social development, livelihoods, post harvest and trade and disasters and climate change.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Les transactions sur les valeurs mobilières ainsi que leur mise en garantie se font bien au-delà des frontières nationales. Elles impliquent une multitude d’intervenants, tels que l’émetteur, un grand nombre d’intermédiaires disposés en structure pyramidale, un ou des investisseurs et, bien évidemment, les bénéficiaires desdites valeurs mobilières ou garanties. On peut aussi signaler l’existence de nombreux portefeuilles diversifiés contenant des titres émis par plusieurs émetteurs situés dans plusieurs états. Toute la difficulté d’une telle diversité d’acteurs, de composantes financières et juridiques, réside dans l’application de règles divergentes et souvent conflictuelles provenant de systèmes juridiques d’origines diverses (Common Law et civiliste). De nombreux juristes, de toutes nationalités confondues, ont pu constater ces dernières années que les règles de création, d’opposabilité et de réalisation des sûretés, ainsi que les règles de conflit de lois qui aident à déterminer la loi applicable à ces différentes questions, ne répondaient plus adéquatement aux exigences juridiques nationales dans un marché financier global, exponentiel et sans réelles frontières administratives. Afin de résoudre cette situation et accommoder le marché financier, de nombreux textes de loi ont été révisés et adaptés. Notre analyse du droit québécois est effectuée en fonction du droit américain et canadien, principales sources du législateur québécois, mais aussi du droit suisse qui est le plus proche de la tradition civiliste québécoise, le tout à la lueur de la 36e Convention de La Haye du 5 juillet 2006 sur la loi applicable à certains droits sur des titres détenus auprès d'un intermédiaire. Par exemple, les articles 8 et 9 du Uniform Commercial Code (UCC) américain ont proposé des solutions modernes et révolutionnaires qui s’éloignent considérablement des règles traditionnelles connues en matière de bien, de propriété, de sûreté et de conflits de lois. Plusieurs autres projets et instruments juridiques dédiés à ces sujets ont été adoptés, tels que : la Loi uniforme sur le transfert des valeurs mobilières (LUTVM) canadienne, qui a été intégrée au Québec par le biais de la Loi sur le transfert de valeurs mobilières et l’obtention de titres intermédiés, RLRQ, c.T-11.002 (LTVMQ) ; la 36e Convention de La Haye du 5 juillet 2006 sur la loi applicable à certains droits sur des titres détenus auprès d'un intermédiaire; la Loi fédérale sur le droit international privé (LDIP) suisse, ainsi que la Loi fédérale sur les titres intermédiés (LTI) suisse. L’analyse de ces textes de loi nous a permis de proposer une nouvelle version des règles de conflit de lois en matière de sûretés et de transfert des titres intermédiés en droit québécois. Cette étude devrait susciter une réflexion profonde du point de vue d’un juriste civiliste, sur l’efficacité des nouvelles règles québécoises de sûretés et de conflit de lois en matière de titres intermédiés, totalement inspirées des règles américaines de Common Law. Un choix qui semble totalement ignorer un pan du système juridique civiliste et sociétal.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cette thèse examine l’interprétation et l’application, par l’Haute Cour d'Israël (HCJ), de principes du droit international de l’occupation et du droit international des droits de la personne dans le traitement de requêtes judiciaires formulées par des justiciables palestiniens. Elle s’intéresse plus particulièrement aux jugements rendus depuis le déclenchement de la deuxième Intifada (2000) suite à des requêtes mettant en cause la légalité des mesures adoptées par les autorités israéliennes au nom d’un besoin prétendu d’accroitre la sécurité des colonies et des colons israéliens dans le territoire occupé de la Cisjordanie. La première question sous étude concerne la mesure dans laquelle la Cour offre un recours effectif aux demandeurs palestiniens face aux violations alléguées de leurs droits internationaux par l’occupant. La recherche fait sienne la position de la HJC selon laquelle le droit de l’occupation est guidé par une logique interne tenant compte de la balance des intérêts en cause, en l’occurrence le besoin de sécurité de l’occupant, d’une part, et les droits fondamentaux de l’occupé, d’autre part. Elle considère, en outre, que cette logique se voit reflétée dans les principes normatifs constituant la base de ce corpus juridique, soit que l’occupation est par sa nature temporaire, que de l’occupation découle un rapport de fiduciaire et, finalement, que l’occupant n’acquiert point de souveraineté sur le territoire. Ainsi, la deuxième question qui est posée est de savoir si l’interprétation du droit par la Cour (HCJ) a eu pour effet de promouvoir ces principes normatifs ou, au contraire, de leur porter préjudice. La réunion de plusieurs facteurs, à savoir la durée prolongée de l’occupation de la Cisjordanie par Israël, la menace accrue à la sécurité depuis 2000 ainsi qu’une politique de colonisation israélienne active, soutenue par l’État, présentent un cas de figure unique pour vérifier l’hypothèse selon laquelle les tribunaux nationaux des États démocratiques, généralement, et ceux jouant le rôle de la plus haute instance judiciaire d’une puissance occupante, spécifiquement, parviennent à assurer la protection des droits et libertés fondamentaux et de la primauté du droit au niveau international. Le premier chapitre présente une étude, à la lumière du premier principe normatif énoncé ci-haut, des jugements rendus par la HCJ dans les dossiers contestant la légalité de la construction du mur à l’intérieur de la Cisjordanie et de la zone dite fermée (Seam Zone), ainsi que des zones de sécurité spéciales entourant les colonies. Le deuxième chapitre analyse, cette fois à la lumière du deuxième principe normatif, des jugements dans les dossiers mettant en cause des restrictions sur les déplacements imposées aux Palestiniens dans le but allégué de protéger la sécurité des colonies et/ou des colons. Le troisième chapitre jette un regard sur les jugements rendus dans les dossiers mettant en cause la légalité du tracé du mur à l’intérieur et sur le pourtour du territoire annexé de Jérusalem-Est. Les conclusions découlant de cette recherche se fondent sur des données tirées d’entrevues menées auprès d’avocats israéliens qui s’adressent régulièrement à la HCJ pour le compte de justiciables palestiniens.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Why do states facing high levels of international threat sometimes have militaries that are heavily involved in politics and at other times relatively apolitical, professional militaries? I argue that the answer to this puzzle lies in a state's history of 'acute' international crises rather than its 'chronic' threat environment. Major international crises lead to professionalization and de-politicization of militaries in both the short- and long-term. International crises underscore the need for the military to defend the state and highlight military deficiencies in this regard. Accordingly, major international crises lead to military professionalization and withdrawal from politics in order to increase military effectiveness. This effect persists years, and decades, later due to generational shifts in the officer corps. As the "Crisis Generation" of officers become generals, they bring with them a preference for professionalization and de-politicization. They guide the military towards abstention from politics. I test this theory using a new global dataset on military officers in national governing bodies from 1964-2008 and find strong support for the theory. Major international crises lead to two waves of military withdrawal from government, years apart. Further statistical analysis finds that this effect is most strongly felt in the non-security areas of governing, while in some cases, international crises may lead to militaries increasing their involvement in security policy-making. Further, international crises that end poorly for a state — i.e., defeats or stalemates — are found to drive more rapid waves of military withdrawal from government. The statistical analysis is supported by a case illustration of civil-military relations in the People's Republic of China, which demonstrates that the crisis of the Korean War (1950-53) led to two waves of military professionalization and de-politicization, decades apart. The first occurred immediately after the war. The second wave, occurring in the 1980s, involved wholesale military withdrawal from governing bodies, which was made possible by the ascent of the "Crisis Generation" of officers in the military, who had served as junior officers in the Korean War, decades prior.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Turkey is a non-nuclear member of a nuclear alliance in a region where nuclear proliferation is of particular concern. As the only North Atlantic Treaty Organization (NATO) member that has a border with the Middle East, Turkish officials argue that Turkey cannot solely rely on NATO guarantees in addressing the regional security challenges. However, Turkey has not been able to formulate a security policy that reconciles its quest for independence, its NATO membership, the bilateral relationship with the United States, and regional engagement in the Middle East. This dissertation assesses the strategic implications of Turkey’s perceptions of the U.S./NATO nuclear and conventional deterrence on nuclear issues. It explores three case studies by the process tracing of Turkish policymakers’ nuclear-related decisions on U.S. tactical nuclear weapons deployed in Europe, national air and missile defense, and Iran’s nuclear program. The study finds that the principles of Turkish security policymaking do not incorporate a fundamentally different reasoning on nuclear issues than conventional deterrence. Nuclear weapons and their delivery systems do not have a defining role in Turkish security and defense strategy. The decisions are mainly guided by non-nuclear considerations such as Alliance politics, modernization of the domestic defense industry, and regional influence. The dissertation argues that Turkey could formulate more effective and less risky security policies on nuclear issues by emphasizing the cooperative security approaches within the NATO Alliance over confrontational measures. The findings of this dissertation reveal that a major transformation of Turkish security policymaking is required to end the crisis of confidence with NATO, redefinition of the strategic partnership with the US, and a more cautious approach toward the Middle East. The dissertation argues that Turkey should promote proactive measures to reduce, contain, and counter risks before they develop into real threats, as well as contribute to developing consensual confidence-building measures to reduce uncertainty.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One of the aspects related to biolaw is that related to security and health. In other words, using the expression of relevant authorities on this subject, “the securitization of health” and, those situations connected with the Security Council labour in the last decades, may constitute an interesting subject. Beginning with the role of the UN blue helmets in many countries where the expansion of HIV/AIDS is usual, followed by the expansion of some diseases in Haiti, together with the Ebola “crisis” in 2014 and connected with the efforts of the World Health Organization to fight against the zika...what is the role played by the United Nations Security Council on this field, trying to establish a relationship between security and health?

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 2004, the discourse of ‘legacy’ was woven into the constitutional fabric of the International Olympic Committee (IOC). Bidding for Olympic events is now premised on procuring post-event legacies that will resonate through local communities and host countries long after the flame is extinguished. Given vast expenditures in security, policing, and emergency management operations at major sporting events, it is notable that the IOC and its official partners have disproportionately under-represented security and policing legacies. This paper addresses research into security and policing legacies of major events by turning much needed empirical attention towards institutional level geographies of security and policing – particularly on legacies of policing and militarisation in Olympic host cities. Accordingly, the paper traces the institutional trajectory of the Military Liaison Unit (MLU) in the Vancouver Police Department who were heavily involved in coordinating the joint civilian–military effort throughout the lifecycle of the Vancouver 2010 inter Games. Theoretically, the paper furthers Stephen Graham’s (2010) New Military Urbanism that considers the circulation of military expertise between neo-colonial frontiers of military intervention with Western urban spaces. In doing so, this paper unpacks an empirically guided temporal approach that discerns key drivers of militarisation as localised, empirical-based ‘trajectories’ of development of security and policing institutions, which are linked to, and circumscribed by, critical juncture episodes in the context of mega event security. The paper traces processes of the MLU to explain how conditions underpinning the civil–military divide in urban policing, as a series of jurisdictional, institutional, and by extension, geographical configurations have continued, changed or been abandoned in the context of the Vancouver 2010 Olympics. As such, this paper contributes to much needed debate on the controversies and opportunities inherent in security legacies and major events, which implicate the wider securitisation and militarisation of Western cities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Huawei is a giant Chinese telecommunications company which has become the focus of contract exclusion and finger pointing by certain western governments. The argument used by the US and Australia has been that of “national security”. This paper explores the causes and reasons for these actions and to ascertain what key strategic approaches and positioning lie behind the high level political tension. The controversy which this exclusion has provided and the causes behind it are the focal point of this paper. Whether it be due to Cold War legacies or business competition, the exclusions do not sit well in this globalised economy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The demand for data storage and processing is increasing at a rapid speed in the big data era. The management of such tremendous volume of data is a critical challenge to the data storage systems. Firstly, since 60% of the stored data is claimed to be redundant, data deduplication technology becomes an attractive solution to save storage space and traffic in a big data environment. Secondly, the security issues, such as confidentiality, integrity and privacy of the big data should also be considered for big data storage. To address these problems, convergent encryption is widely used to secure data deduplication for big data storage. Nonetheless, there still exist some other security issues, such as proof of ownership, key management and so on. In this chapter, we first introduce some major cyber attacks for big data storage. Then, we describe the existing fundamental security techniques, whose integration is essential for preventing data from existing and future security attacks. By discussing some interesting open problems, we finally expect to trigger more research efforts in this new research field.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Hungarian Revolution is often analysed in a national context or from the angle of Hungarian-Soviet relations. From this perspective, the Eastern European satellites seem mere puppets and the Soviet bloc a monolith. Archival evidence nevertheless shows that the Kremlin actually attempted to build a new kind of international relations after Stalin’s death in 1953, in which the Eastern European leaders would gain more scope for manoeuvre. This attempt at liberalisation even facilitated the uprisings in Hungary in 1956. Avoiding a teleological approach to the Hungarian Revolution, this article argues that the Soviet invasion was neither inevitable, nor wholly unilateral. Khrushchev even sought to legitimise the invasion in bilateral and multilateral consultations. There was a mutual interest in sacrificing Hungary’s sovereignty to safeguard the communist monopoly on power. This multilateralisation of Soviet bloc security is an important explanatory factor in an analysis of the Revolution and its repercussions in Eastern Europe.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Japan is an important ally of the United States–the world’s third biggest economy, and one of the regional great powers in Asia. Making sense of Japan’s foreign and security policies is crucial for the future of peace and stability in Northeast Asia, where the possible sources of conflict such as territorial disputes or the disputes over Japan’s war legacy issues are observed.^ This dissertation explored Japan’s foreign and security policies based on Japan’s identities and unconscious ideologies. It employed an analysis of selected Japanese films from the late 1940s to the late 1950s, as well as from the late 1990s to the mid-2000s. The analysis demonstrated that Japan’s foreign and security policies could be understood in terms of a broader social narrative that was visible in Japanese popular cultural products, including films and literatures. Narratives of Japanese families from the patriarch’s point of view, for example, had constantly shaped Japan’s foreign and security policies. As a result, the world was ordered hierarchically in the eyes of the Japan Self. In the 1950s, Japan tenaciously constructed close but asymmetrical security relations with the U.S. in which Japan willingly subjugated itself to the U.S. In the 2000s, Japan again constructed close relations with the U.S. by doing its best to support American responses to the 9/11 terrorist attacks by mobilizing Japan’s SDFs in the way Japan had never done in the past.^ The concepts of identity and unconscious ideology are helpful in understanding how Japan’s own understanding of self, of others, and of the world have shaped its own behaviors. These concepts also enable Japan to reevaluate its own behaviors reflexively, which departs from existing alternative approaches. This study provided a critical analytical explanation of the dynamics at work in Japan’s sense of identity, particularly with regard to its foreign and security policies.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent studies on the economic status of women in Miami-Dade County (MDC) reveal an alarming rate of economic insecurity and significant obstacles for women to achieve economic security. Consistent barriers to women’s economic security affect not only the health and wellbeing of women and their families, but also economic prospects for the community. A key study reveals in Miami-Dade County, “Thirty-nine percent of single female-headed families with at least one child are living at or below the federal poverty level” and “over half of working women do not earn adequate income to cover their basic necessities” (Brion 2009, 1). Moreover, conventional measures of poverty do not adequately capture women’s struggles to support themselves and their families, nor do they document the numbers of women seeking basic self-sufficiency. Even though there is lack of accurate data on women in the county, which is a critical problem, there is also a dearth of social science research on existing efforts to enhance women’s economic security in Miami-Dade County. My research contributes to closing the information gap by examining the characteristics and strategies of women-led community development organizations (CDOs) in MDC, working to address women’s economic insecurity. The research is informed by a framework developed by Marilyn Gittell, who pioneered an approach to study women-led CDOs in the United States. On the basis of research in nine U.S. cities, she concluded that women-led groups increased community participation and “by creating community networks and civic action, they represent a model for community development efforts” (Gittell, et al. 2000, 123). My study documents the strategies and networks of women-led CDOs in MDC that prioritize women’s economic security. Their strategies are especially important during these times of economic recession and government reductions in funding towards social services. The focus of the research is women-led CDOs that work to improve social services access, economic opportunity, civic participation and capacity, and women’s rights. Although many women-led CDOs prioritize building social infrastructures that promote change, inequalities in economic and political status for women without economic security remain a challenge (Young 2004). My research supports previous studies by Gittell, et al., finding that women-led CDOs in Miami-Dade County have key characteristics of a model of community development efforts that use networking and collaboration to strengthen their broad, integrated approach. The resulting community partnerships, coupled with participation by constituents in the development process, build a foundation to influence policy decisions for social change. In addition, my findings show that women-led CDOs in Miami-Dade County have a major focus on alleviating poverty and economic insecurity, particularly that of women. Finally, it was found that a majority of the five organizations network transnationally, using lessons learned to inform their work of expanding the agency of their constituents and placing the economic empowerment of women as central in the process of family and community development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to software systems, there are still a large number of vulnerabilities that can remain, despite these measures. Some vulnerabilities stay in a system from one release to the next one because they cannot be easily reproduced through testing. These vulnerabilities endanger the security of the systems. We propose vulnerability classification and prediction frameworks based on vulnerability reproducibility. The frameworks are effective to identify the types and locations of vulnerabilities in the earlier stage, and improve the security of software in the next versions (referred to as releases). We expand an existing concept of software bug classification to vulnerability classification (easily reproducible and hard to reproduce) to develop a classification framework for differentiating between these vulnerabilities based on code fixes and textual reports. We then investigate the potential correlations between the vulnerability categories and the classical software metrics and some other runtime environmental factors of reproducibility to develop a vulnerability prediction framework. The classification and prediction frameworks help developers adopt corresponding mitigation or elimination actions and develop appropriate test cases. Also, the vulnerability prediction framework is of great help for security experts focus their effort on the top-ranked vulnerability-prone files. As a result, the frameworks decrease the number of attacks that exploit security vulnerabilities in the next versions of the software. To build the classification and prediction frameworks, different machine learning techniques (C4.5 Decision Tree, Random Forest, Logistic Regression, and Naive Bayes) are employed. The effectiveness of the proposed frameworks is assessed based on collected software security defects of Mozilla Firefox.