804 resultados para International Security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply to the legal frameworks covering developments within the third pillar of the EU. Even Council Framework Decision 2008/977/JHA, which is supposed to cover data protection provisions within PJCCM expressly states that its provisions do not apply to “Europol, Eurojust, the Schengen Information System (SIS)” or to the Customs Information System (CIS). In addition, the post Treaty of Prüm provisions covering the sharing of DNA profiles, dactyloscopic data and vehicle registration data pursuant to Council Decision 2008/615/JHA, are not to be covered by the provisions of the 2008 Framework Decision. As stated by Hijmans and Scirocco, the regime is “best defined as a patchwork of data protection regimes”, with “no legal framework which is stable and unequivocal, like Directive 95/46/EC in the First pillar”. Data security issues are also key to the sharing of data in organised crime or counterterrorism situations. This article will critically analyse the current legal framework for data protection and security within the third pillar of the EU.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Sixth Oceanic Conference on International Studies (OCIS) was held in Melbourne, Australia between 9 and 11 July 2014. The conference was hosted by the School of Social and Political Sciences at University of Melbourne and supported by the Australian Institute of International Affairs, Deakin University, La Trobe University, Monash University, RMIT University and Swinburne University. The Sixth OCIS had a broad organizing theme of ‘transition’ focused on the changing balances of power shaping the Oceanic and Asia Pacific regions and related questions of social and political change in this context. Over 200 papers were presented at the conference, reflecting a wide variety of issues in international studies and related fields of scholarship. Amongst this diversity, the conference did have some recurring themes relating to great power rivalry, the influence of China, and the implications of multilateral frameworks and key bilateral relationships on the security and economic dynamics of the region. Significant attention was also devoted to analysing the foreign policies and political institutions for managing problems of peacebuilding, terrorism, gender inequality and sexual discrimination, people movements, climate change and financial instability at the regional and global levels. This special issue of Global Change, Peace and Security reflects these themes of transition in the Asia Pacific and comprises a diverse array of contributions from scholars attending this conference.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Intelligent Internet Computing (IIC) is emerging rapidly as an exciting new paradigm including pervasive, grid, and peer-to-peer computing to provide computing and communication services any time and anywhere. IIC paradigm foresees seamless integration of communicating and computational devices and applications embedded in all parts of our environment, from our physical selves, to our homes, our offices, our streets and so on. Although IIC presents exciting enabling opportunities, the benefits will only be realized if application and security issues can be appropriately addressed. This special issue is intended to foster the dissemination of state-of-the-art research in the area of IIC, including novel applications associated with its utilization, security systems and services, security models. We plan to publish high quality manuscripts, which cover the various practical applications and related security theories of IIC. The papers should not be submitted simultaneously for publication elsewhere. Submissions of high quality papers describing mature results or on-going work are invited. Selected high-quality papers from “the Eleventh IEEE International Conference on High Performance Computing and Communications (HPCC-09) and the Third International Conference on Information Security and Assurance (ISA-09),” will be published in this special issue of Journal of Internet Technology on "Intelligent Internet Computing".

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This comprehensive and broad-ranging introductory text examines the key aspects of contemporary international development from both a practical and theoretical perspective. It addresses the fundamental question of what 'development' actually is and examines social, economic and environmental development across the globe.Written by experts with extensive field experience across a range of development settings, the book addresses key issues in the development debate. These issues include definitions of development, global influences on development, measurements of development, the contribution of international aid, the relationship between global development and gender equality, the idea of development as 'modernization', theories of underdevelopment, and regional variation.The third edition has been revised and updated to include discussion of recent events and challenges in the field, as well as coverage of the rise of new economic powers, the impact of new security challenges, and the increasing importance of sustainable development goals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this chapter the co-editors introduce the comparative volume and its rationales, provide context about national security, surveillance and terror in both Canada and Australia, describe contributions found in the volume, and conclude with an overview of the volume.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Este estudio de caso busca identificar los elementos del portafolio de política exterior de Trinidad y Tobago que le permitieron promover exitosamente sus intereses en el Protocolo de Kioto. Al hacer esto, este texto analizará las limitaciones de Trinidad y Tobago en términos de vulnerabilidades de localización, burocracia y recursos. Posteriormente, una revisión del portafolio de política exterior de este Estado ilustrará el uso de estrategias de creación de capacidades y de organización como lo son el contacto con actores institucionales y no gubernamentales, la formación de coaliciones y estrategias argumentativas, entre otras. Finalmente, este artículo concluirá que dichas acciones permitieron la promoción de la agenda de política exterior de Trinidad y Tobago a través de la creación de hojas de ruta y la coordinación de la incertidumbre con el Protocolo de Kioto. Para hacer esto, este trabajo se concentrará en examinar conceptos como vulnerabilidad y priorización, asimismo contrastando diferentes artículos académicos en la materia junto con documentos oficiales de Trinidad y Tobago.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The AgroMed International Conference 2016 aims to discuss the current land use changes, with a particular interest on farm and land system dynamics, also considering the possible competition with other uses (urban and/or natural land uses). It is focused on “Farm and land system dynamics in the Mediterranean basin: integrating spatial scales, from the local to the global one”. Teresa Pinto Correia presented H2020 project SALSA “Small farms, small food businesses and sustainable food security

Relevância:

20.00% 20.00%

Publicador: