788 resultados para H56 - National Security and War


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Final Report from the Clergy Compensation Study

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Final Report from the Clergy Compensation Study

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project looks at the ways Northeastern Ontario citizens in rural communities regulate their private property through traditional and contemporary surveillance means. Through art and objects, this project allows viewers the opportunity to experience surveillance in rural areas through visual and creative ways that encourage interaction and critique. This project defines organic surveillance by looking at the ways ruralists in Markstay Ontario practice surveillance and deterrence which is influenced by characteristics of land, risks and other determining factors such as psychology, resourcefulness, sustainability, technology and private property. Organic surveillance argues that surveillance and deterrence is prevalent far beyond datamining, GPS tracking and social media. Surveillance and deterrence as methods of survival are found everywhere, even in the farthest, most “wild” and forested areas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the spirit of the proposals of the Agenda 2020 about the structural role of cinema in the configuration of the European identities, this article highlights the significance of the national cinemas in non-hegemonic languages in the conformation of a diverse European culture. Following this perspective, we use Galician cinema as a case study in which we analyze the presence (or more precisely the absence) of the Galician language in the original version in the feature films released between 2008 and 2012.This proposal is hosted by the I+D+I project eDCINEMA: “Towards the European Digital Space. The role of small cinemas in original version” (Ref. CSO2012-35784) financed by the Ministry of Economy and Competitiveness of Spain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pessimistic Malthusian verdicts on the capacity of pre-industrial European economies to sustain a degree of real economic growth under conditions of population growth are challenged using current reconstructions of urbanisation ratios, the real wage rates of building and agricultural labourers, and GDP per capita estimated by a range of methods. Economic growth is shown to have outpaced population growth and raised GDP per capita to in excess of $1,500 (1990 $ international at PPP) in Italy during its twelfth- and thirteenth-century commercial revolution, Holland during its fifteenth- and sixteenth-century golden age, and England during the seventeenth- and eighteenth-century runup to its industrial revolution. During each of these Smithian growth episodes expanding trade and commerce sustained significant output and employment growth in the manufacturing and service sectors. These positive developments were not necessarily reflected by trends in real wage rates for the latter were powerfully influenced by associated changes in relative factor prices and the per capita supply of labour as workers varied the length of the working year in order to consume either more leisure or more goods. The scale of the divergence between trends in real wage rates and GDP per capita nevertheless varied a great deal between countries for reasons which have yet to be adequately explained.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is an established relationship between salt intake and risk of high blood pressure (BP). High blood pressure (hypertension) is a risk factor for cardiovascular disease (CVD) and scientific evidence shows that a high salt intake can contribute to the development of elevated blood pressure. The Scientific Advisory Committee on Nutrition (SACN) recommend a target reduction in the average salt intake of the population to no more than 6g per day. This figure has been adopted by the UK government as the recommended maximum salt intake for adults and children aged 11 years and over. Following publication of the SACN report in 2003, the government began a programme of reformulation work with the food industry aimed at reducing the salt content of processed food products. Voluntary salt reduction targets were first set in 2006, and subsequently in 2009, 2011 and 2014, for a range of food categories that contribute the most to the population’s salt intakes. Population representative urinary sodium data were collected in England in 2005-06, 2008 (UK), 2011 and 2014. In the latest survey assessment, estimated salt intake of adults aged 19 to 64 years in England was assessed from 24-hour urinary sodium excretion of 689 adults, selected to be representative of this section of the population. Estimated salt intake was calculated using the equation 17.1mmol of sodium = 1g of salt and assumes all sodium was derived from salt. The data were validated as representing daily intake by checking completeness of the urine collections by the para-amino benzoic acid (PABA) method. Urine samples were collected over five months (May to September) in 2014, concurrently with a similar survey in Scotland. This report presents the results for the latest survey assessment (2014) and a new analysis of the trend in estimated salt intake over time. The trend analysis is based on data for urinary sodium excretion from this survey and previous sodium surveys (including data from the National Diet and Nutrition Survey Rolling Programme (NDNS RP) Years 1 to 5) carried out in England over the last ten years, between 2005-06 and 2014. This data has been adjusted to take account of biases resulting from differences between surveys in laboratory analytical methods used for sodium. The analysis provides a revised assessment of the trend in estimated salt intake over time. The trend analysis in this report supersedes the trend analysis published in the report of the 2011 England urinary sodium survey.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Audit report on the Wireless E-911 Emergency Communications Fund of the Iowa Department of Homeland Security and Emergency Management for the year ended June 30, 2015

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

100.00% 100.00%

Publicador:

Resumo:

End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and restrictions would not be accepted by them. On the contrary, companies are obliged to employ substantial organizational and technical measures to ensure data security and compliance when allowing to use mobile devices at the workplace. So far, only individual arrangements have been presented addressing single issues in ensuring data security and compliance. However, companies need to follow a comprehensive set of measures addressing all relevant aspects of data security and compliance in order to play it safe. Thus, in this paper at first technical architectures for using mobile devices in enterprise IT are reviewed. Thereafter a set of compliance rules is presented and, as major contribution, technical measures are explained that enable a company to integrate mobile devices into enterprise IT while still complying with these rules comprehensively. Depending on the company context, one or more of the technical architectures have to be chosen impacting the specific technical measures for compliance as elaborated in this paper. Altogether this paper, for the first time, correlates technical architectures for using mobile devices at the workplace with technical measures to assure data security and compliance according to a comprehensive set of rules.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The challenging effects of globalization upon the nation-state have been a recurrent theme in the social science discourse since the 1990’s. Nationally organized education is also seen as challenged by new demands originating from globalization. In this article it is argued that ‘nation-state’ andnational identity’ are highly relevant concepts when discussing a citizenship education that seeks to develop a civic ethos with, potentially, a global reach. It is further argued that the understanding of such an ethos would benefit significantly from incorporating the role of political trust since trust has been identified as a main feature of the social capital that makes democracy work. Three themes are brought together: national identity and identification, the importance for democracy of political trust and the challenges citizenship education face when carried out in a national context but intended to manage issues that go far beyond the reach of the nation-state. The importance of citizenship education is discussed using recent research on the Swedish citizenship education classroom.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This essay addresses the fundamental conceptual challenges which face the development of the Area of Freedom Security and Justice (AFSJ) in the post-Lisbon Treaty era. It argues that Onuf style constructivism is a valid lens with which to examine the development of the AFSJ to date, involving as it does the development of a shared understanding by practitioners, predominantly law enforcement and prosecution professionals, within the structures provided for them, in order to develop a completely new area of law and practice. While this approach will continue to need to be deployed in the development of further new operational areas, such as cybercrime, a new approach is now required, that of constitutionalism. A variety of forms of constitutionalism are then examined in order to establish their suitability as a mode of analysis for these developments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.