866 resultados para (In)security feelings
Resumo:
This paper begins by outlining and critiquing what we term the dominant anglophone model of neo-liberal community safety and crime prevention. As an alternative to this influential but flawed model, a comparative analysis is provided of the different constitutional-legal settlements in each of the five jurisdictions across the UK and the Republic of Ireland (ROI), and their uneven institutionalization of community safety. In the light of this it is argued that the nature of the anglophone community safety enterprise is actually subject to significant variation. Summarizing the contours of this variation facilitates our articulation of some core dimensions of community safety. Then, making use of Colebatch’s (2002) deconstruction of policy activity into categories of authority and expertise, and Brunsson’s (2002) distinction between policy talk, decisions and action, we put forward a way of understanding policy activity that avoids the twin dangers of ‘false particularism’ and ‘false universalism’ (Edwards and Hughes, 2005); that indicates a path for further empirical enquiry to assess the ‘reality’ of policy convergence; and that enables the engagement of researchers with normative questions about where community safety should be heading.
Resumo:
The subtle and complex nature of Northern Ireland's transitional landscape presents acute difficulties for the community policing concept. As the core to the police reforms in the country, its implementation has faltered in the face of institutional inertia within the Police Service of Northern Ireland (PSNI). This has been further exacerbated by a failure of the police to adequately increase the co-production of security through improved engagement and utilization of Northern Ireland's diverse community infrastructures. This paper will assess the delivery of community policing by the PSNI, while exploring their engagement with Northern Ireland's grass-roots community organizations, and specifically those involved with the governance of security at the local level. Thus, through a framework of adaptation, engagement and delivery of community policing by the PSNI within the unique context of Northern Ireland's security ‘otherness’, the paper will explore the key issues to police–community interaction associated with the broader vision of the Independent Commission on Policing (ICP) on community policing.
Resumo:
Cette thèse examine l’interprétation et l’application, par l’Haute Cour d'Israël (HCJ), de principes du droit international de l’occupation et du droit international des droits de la personne dans le traitement de requêtes judiciaires formulées par des justiciables palestiniens. Elle s’intéresse plus particulièrement aux jugements rendus depuis le déclenchement de la deuxième Intifada (2000) suite à des requêtes mettant en cause la légalité des mesures adoptées par les autorités israéliennes au nom d’un besoin prétendu d’accroitre la sécurité des colonies et des colons israéliens dans le territoire occupé de la Cisjordanie. La première question sous étude concerne la mesure dans laquelle la Cour offre un recours effectif aux demandeurs palestiniens face aux violations alléguées de leurs droits internationaux par l’occupant. La recherche fait sienne la position de la HJC selon laquelle le droit de l’occupation est guidé par une logique interne tenant compte de la balance des intérêts en cause, en l’occurrence le besoin de sécurité de l’occupant, d’une part, et les droits fondamentaux de l’occupé, d’autre part. Elle considère, en outre, que cette logique se voit reflétée dans les principes normatifs constituant la base de ce corpus juridique, soit que l’occupation est par sa nature temporaire, que de l’occupation découle un rapport de fiduciaire et, finalement, que l’occupant n’acquiert point de souveraineté sur le territoire. Ainsi, la deuxième question qui est posée est de savoir si l’interprétation du droit par la Cour (HCJ) a eu pour effet de promouvoir ces principes normatifs ou, au contraire, de leur porter préjudice. La réunion de plusieurs facteurs, à savoir la durée prolongée de l’occupation de la Cisjordanie par Israël, la menace accrue à la sécurité depuis 2000 ainsi qu’une politique de colonisation israélienne active, soutenue par l’État, présentent un cas de figure unique pour vérifier l’hypothèse selon laquelle les tribunaux nationaux des États démocratiques, généralement, et ceux jouant le rôle de la plus haute instance judiciaire d’une puissance occupante, spécifiquement, parviennent à assurer la protection des droits et libertés fondamentaux et de la primauté du droit au niveau international. Le premier chapitre présente une étude, à la lumière du premier principe normatif énoncé ci-haut, des jugements rendus par la HCJ dans les dossiers contestant la légalité de la construction du mur à l’intérieur de la Cisjordanie et de la zone dite fermée (Seam Zone), ainsi que des zones de sécurité spéciales entourant les colonies. Le deuxième chapitre analyse, cette fois à la lumière du deuxième principe normatif, des jugements dans les dossiers mettant en cause des restrictions sur les déplacements imposées aux Palestiniens dans le but allégué de protéger la sécurité des colonies et/ou des colons. Le troisième chapitre jette un regard sur les jugements rendus dans les dossiers mettant en cause la légalité du tracé du mur à l’intérieur et sur le pourtour du territoire annexé de Jérusalem-Est. Les conclusions découlant de cette recherche se fondent sur des données tirées d’entrevues menées auprès d’avocats israéliens qui s’adressent régulièrement à la HCJ pour le compte de justiciables palestiniens.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
The discipline of counselling psychology continues to grow and change in response to social, economic and political pressures. It has been argued that its quest for a coherent and distinct identity, which emphasises the possibility of the coexistence of multiple approaches, creates an inherently uncertain and dilemmatic training environment that may hinder the development of trainees’ professional identities. In order to gain a deeper understanding of the issue at hand, the aim was to explore how final year trainees and newly qualified counselling psychologists constructed and made sense of their emerging professional identities and what experiences, past and present, they drew upon in the context of their training to shape those identities. Applying narrative inquiry to analyse eight open-ended interviews, eight preliminary themes were originally identified in participants’ narratives, which with further refinements lead to stories of struggle and marginalisation, growth and discovery, and power and resilience. Participants’ stories of struggle and marginalisation emerged in reference to early family dynamics and stressful life experiences, which seemed to also foster a strong identification with the counselling psychology profession, while stories of growth and discovery focused on the importance of having supportive figures, who helped to instill a sense of security and create an atmosphere of openness. It was in this learning environment that participants felt it was possible to develop a more resilient, empowered professional self, which allowed them to shed an earlier sense of struggle and vulnerability. However, where more of an emphasis was placed on power and resilience, there seemed to be less room for participants to express other feelings that came into conflict with their preferred sense of professional self. While there seems to be a need for a ‘safer’ climate, in which trainees could voice and acknowledge anxieties, vulnerabilities and limitations, addressing concerns around power and vulnerability that may be contributing to the silencing of particular voices and identities may be equally important if trainees are to develop coherent and distinct counselling psychologist identities.
Resumo:
Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed and maintained externally to the organisation. Therefore, it is essential for cloud providers to demonstrate and implement adequate security practices to protect the data and processes put under their stewardship. Security transparency in the cloud is likely to become the core theme that underpins the systematic disclosure of security designs and practices that enhance customer confidence in using cloud service and deployment models. In this paper, we present a framework that enables a detailed analysis of security transparency for cloud based systems. In particular, we consider security transparency from three different levels of abstraction, i.e., conceptual, organisation and technical levels, and identify the relevant concepts within these levels. This allows us to provide an elaboration of the essential concepts at the core of transparency and analyse the means for implementing them from a technical perspective. Finally, an example from a real world migration context is given to provide a solid discussion on the applicability of the proposed framework.
Resumo:
Resumo:
This paper aims to conceptualise trafficking in human beings (THB) as an organised crime by drawing on the rational choice theory. Utilising crime scripting principles, it proposes trafficking schematics to capture and visualise THB in its entirety. Stemming from its transnational nature and varying conceptualisations, combatting THB faces challenges, such as the lack of harmonisation of policy instruments and differing stakeholder agendas. To mitigate these challenges, this paper proposes trafficking schematics. Their core lies in the modelling of THB constituent elements, including stages and their sequence, key actors and relationships, and financial modus operandi. Trafficking schematics may therefore contribute to addressing THB in a holistic, dynamic and integrated way, by enriching stakeholders’ understanding of the phenomenon and facilitating collaboration to address it. The paper contributes to theory and practice by drawing up a model of the procedural, human, logistical and environmental elements of THB that may be viewed as an instrument of public value creation.
Resumo:
Over the last few decades, the debate about “Peak Oil” became increasingly common and frustrating to governments, oil companies, and individuals. Also in the last decade or so, some unusual events took place which have raised the concern about the future of energy resources. These events lead policy makers to consider what is known today as “Energy Security.” The UK is one of these countries that fears the unknown future should petroleum resources worldwide become scarce or vanish. After the dwindling of the North Sea production, the UK found itself on the brink of losing its energy self-sufficiency. This article asks the questions: Has the UK’s oil and gas production peaked yet? If so, does the UK have a serious energy security problem, and if so, how may this problem be solved and what are the possible short, medium, and long-term solutions for such a concern? In answering these questions, the article discusses the concerns and challenges to the UK energy security and brings about the government plans for tackling these concerns. It is found that the UK does not experience an energy security problem on the short to medium-term, but it may suffer energy insecurity on the longer-term.
Resumo:
We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicine chart. This process can be very strenuous and error-prone, given the number of sub-tasks involved in the entire workflow and the dynamic nature of the work environment. Therefore, efforts are being made to digitalise the medication dispensation process by introducing a mobile application called Smart Dosing application. The introduction of the Smart Dosing application into hospital workflow raises security concerns and calls for security requirement analysis. This thesis is written as a part of the smart medication management project at Embedded Systems Laboratory, A° bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive stateof- the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
We outline a philosophical approach to Grand Challenge projects, with particular reference to our experience in our food security project involving the protection of stored grain from insect attack in two countries on different continents. A key consideration throughout has been the management of resistance in these pests to the valuable fumigant phosphine. Emphasis is given to the chain of research issues that required solution and the assembly of a well-integrated team, overlapping in skills for effective communication, in each country to solve the problems identified along that chain. A crucial aspect to maintaining direction is the inclusion of key end users in all deliberations, as well as the establishment and maintenance of effective outlets for the dissemination of practical recommendations. We finish with a summary of our achievements with respect to our approach to this food security Grand Challenge.
Resumo:
This paper applies a stochastic viability approach to a tropical small-scale fishery, offering a theoretical and empirical example of ecosystem-based fishery management approach that accounts for food security. The model integrates multi-species, multi-fleet and uncertainty as well as profitability, food production, and demographic growth. It is calibrated over the period 2006–2010 using monthly catch and effort data from the French Guiana's coastal fishery, involving thirteen species and four fleets. Using projections at the horizon 2040, different management strategies and scenarios are compared from a viability viewpoint, thus accounting for biodiversity preservation, fleet profitability and food security. The analysis shows that under certain conditions, viable options can be identified which allow fishing intensity and production to be increased to respond to food security requirements but with minimum impacts on the marine resources.