952 resultados para security architecture in Europe


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The European Union is founded on a set of common principles of democracy, the rule of law, and fundamental rights, as enshrined in Article 2 of the Treaty on the European Union. Whereas future Member States are vetted for their compliance with these values before they accede to the Union, no similar method exists to supervise adherence to these foundational principles after accession. EU history proved that this ‘Copenhagen dilemma’ was far from theoretical. EU Member State governments’ adherence to foundational EU values cannot be taken for granted. Violations may happen in individual cases, or in a systemic way, which may go as far as overthrowing the rule of law. Against this background the European Parliament initiated a Legislative Own-Initiative Report on the establishment of an EU mechanism on democracy, the rule of law and fundamental rights and proposed among others a Scoreboard on the basis of common and objective indicators by which foundational values can be measured. This Research Paper assesses the need and possibilities for the establishment of an EU Scoreboard, as well as its related social, economic, legal and political ‘costs and benefits’.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Migration towards Europe has surged over the past few years, overwhelming government authorities at the national and EU levels, and fuelling a xenophobic, nationalist, populist discourse linking migrants to security threats. Despite positive advances in the courts and worthy national initiatives (such as Italy’s Operation Mare Nostrum), the EU’s governance of migration and borders has had disastrous effects on the human rights of migrants. These effects stem from the criminalisation of migrants, which pushes them towards more precarious migration routes, the widespread use of administrative detention and the processing of asylum claims under the Dublin system, and now the EU–Turkey agreement. Yet, this paper finds that with the right political leadership, the EU could adopt different policies in order to develop and implement a human rights-based approach to migration that would seek to reconcile security concerns with the human rights of migrants. Such an approach would enable member states to fully reap the rewards of a stable, cohesive, long-term migration plan that facilitates and governs mobility rather than restricts it at immense cost to the EU, the member states and individual migrants.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper analyses the EU budgetary responses to the ‘refugee crisis’ in Europe. The European Commission has proposed several changes to the EU budget as well as the establishment of new funding instruments. The paper explores what the announced funding consists of, what role it plays in policy-making and what issues it generates. Throughout these budgetary responses the search for flexibility has been dominant, motivated by the need to respond more swiftly to humanitarian and operational needs. In addition, the paper argues that beyond implementation or management, the role of funding is also symbolic and communicative. In light of limited competences that are difficult to exercise, funding represents a powerful tool enabling the Commission to shape policy-making in times of crisis. At the same time, the dominant search for flexibility also challenges established funding rules and procedures. It has furthermore led to reduced space for democratic scrutiny by the European Parliament. More profoundly, EU funding for cooperation with third countries to prevent the inflow of refugees and asylum seekers has monetised questions over the responsibility for these individuals. As the EU–Turkey agreement shows, this has created a self-imposed dependence on third countries, with the risk of potentially insatiable demands for EU funding. This paper questions the proportionality and rule of law compliance of allocating funding for the implementation of this agreement. Moreover, it proposes that the Commission take steps to practically safeguard the humanitarian aid principles in the management structures of the new funding instruments, and it stresses the need for more scrutiny of the reconfigured funding landscape by the European Parliament and the European Court of Auditors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Issues for 3rd (December 1977)- submitted to the Committee on Foreign Relations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Different ‘monetary architectures’ are distinguished, as a background to a discussion of the change in developed country monetary policy frameworks from fixed exchange rates under the Bretton Woods international monetary system to, ultimately, formal or informal inflation targeting. The introduction and experience of monetary targets in the 1970s is considered, followed by an analysis of the changes in countries’ monetary architectures, with particular reference to money and bond markets and to France and Italy, in the 1980s. Exchange rate targeting in Europe in the 1980s and 1990s is examined, followed by the changes in central bank independence in the 1990s. This leads to a discussion of the introduction of inflation targeting, and the issues raised for inflation targeting by the financial crisis of the late 2000s.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Networks are considered increasingly important for policy-making. The literature on new modes of governance in Europe suggests that their horizontal coordination capacity and flexible and informal structures are particularly suitable for governing the multilevel architecture of the European polity. However, empirical evidence about the effects of networks on policy-making and public policies is still quite limited. This article uses the case of the European network of energy regulators to explore the determinants of the position of network members and, in turn, the domestic adoption of soft rules developed within this network. The empirical analysis, based on multivariate statistics and semi-directive interviews, supports the expectation that institutional complementarities increase actors' centrality in networks, while arguments based on organisational resources and age are disproved. Furthermore, results show that the overall level of adoption is considerable and that centrality might have a small positive effect on domestic adoption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This handbook describes the peer review methodology that was applied at the GODIAC project fi eld studies1. The peer review evaluation method as initiated by Otto Adang in the Netherlands and further developed in a European football context (Adang & Brown, 2008) involves experienced police offi cers cooperating with researchers to perform observational fi eld studies to identify good practices and learning points for public order management. The handbook builds on the GODIAC seminars and workshops, for the fi eld study members, which took place in September 2010, January 2012 and January 2013. The handbook has been discussed in the project group and in the steering committee. It is primarily written for the GODIAC fi eld study members as background material for understanding the fi eld study process and for clarifying the different responsibilities that enable active participation in the fi eld study. The handbook has been developed during the project period and incorporates learning points and developments of the peer review method. The handbook aims at promoting the use of fi eld studies for evaluation of policing major events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The volume is divided into two parts; the fi rst deals with issues related to the police, and the second addresses issues related to demonstrators and protesters. We hope that this volume will provide further insight into issues associated with policing at major events and shed light on the complexity of the organisations, motives, and strategies in play whenever protester groups are involved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report summarises the fi eld study results of the project ’Good practice for dialogue and communication as strategic principles for policing political manifestations in Europe’ (GODIAC).1 The overall idea was to integrate operative police work, research and training within the fi eld and to build international and institutional networks, ensuring and recognising the responsibilities of the organisers. The purpose of the GODIAC project was to contribute to the development of a European approach to policing political manifestations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the advent of the internet in every day life in the 1990s, the barriers to producing, distributing and consuming multimedia data such as videos, music, ebooks, etc. have steadily been lowered for most computer users so that almost everyone with internet access can join the online communities who both produce, consume and of course also share media artefacts. Along with this trend, the violation of personal data privacy and copyright has increased with illegal file sharing being rampant across many online communities particularly for certain music genres and amongst the younger age groups. This has had a devastating effect on the traditional media distribution market; in most cases leaving the distribution companies and the content owner with huge financial losses. To prove that a copyright violation has occurred one can deploy fingerprinting mechanisms to uniquely identify the property. However this is currently based on only uni-modal approaches. In this paper we describe some of the design challenges and architectural approaches to multi-modal fingerprinting currently being examined for evaluation studies within a PhD research programme on optimisation of multi-modal fingerprinting architectures. Accordingly we outline the available modalities that are being integrated through this research programme which aims to establish the optimal architecture for multi-modal media security protection over the internet as the online distribution environment for both legal and illegal distribution of media products.