922 resultados para secure interoperation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The suggestion that the general economy of power in our societies is becoming a domain of security was made by Michel Foucault in the late 1970s. This paper takes inspiration from Foucault?s work to interpret human rights as technologies of governmentality, which make possible the safe and secure society. I examine, by way of illustration, the site of the European Union and its use of new modes of governance to regulate rights discourse – in particular via the emergence of a new Fundamental Rights Agency. „Governance? in the EU is constructed in an apolitical way, as a departure from traditional legal and juridical methods of governing. I argue, however, that the features of governance represent technologies of government(ality), a new form of both being governed through rights and of governing rights. The governance feature that this article is most interested in is experts. The article aims to show, first and foremost, how rights operate as technologies of governmentality via a new relation to expertise. Second, it considers the significant implications that this reading of rights has for rights as a regulatory and normalising discourse. Finally, it highlights how the overlap between rights and governance discourses can be problematic because (as the EU model illustrates) governance conceals the power relations of governmentality, allowing, for instance, the unproblematic representation of the EU as an international human rights actor

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article, we argue that the history of bail foretells the future of parole. Under a plancalled the Conditional Post-Conviction Release Bond Act (recently passed into law inthree states), US prisoners can secure early release only after posting ‘post-convictionbail’. As with pre-trial bail, the fledgling model would require prisoners to pay a percent-age of the bail amount to secure their release under the contractual responsibility of acommercial bail agency. If release conditions are breached, bounty hunters are legallyempowered to seize and return the parolee to prison. Our inquiry outlines the origins of this post-conviction bond plan and the research upon which it is based. Drawing on the‘new penology’ framework, we identify several underlying factors that make for a ripeadvocacy environment and set the stage for widespread state-level adoption of this planin the near future. Post-conviction bail fits squarely within the growing policy trendstoward privatization, managerialism, and actuarial justice. Most importantly, though,advocates have the benefit of precedent on their side, as most US states have longrelied on a system of commercial bail bonding and private bounty hunting to manageconditional pretrial release.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electricity systems models are software tools used to manage electricity demand and the electricity systems, to trade electricity and for generation expansion planning purposes. Various portfolios and scenarios are modelled in order to compare the effects of decision making in policy and on business development plans in electricity systems so as to best advise governments and industry on the least cost economic and environmental approach to electricity supply, while maintaining a secure supply of sufficient quality electricity. The modelling techniques developed to study vertically integrated state monopolies are now applied in liberalised markets where the issues and constraints are more complex. This paper reviews the changing role of electricity systems modelling in a strategic manner, focussing on the modelling response to key developments, the move away from monopoly towards liberalised market regimes and the increasing complexity brought about by policy targets for renewable energy and emissions. The paper provides an overview of electricity systems modelling techniques, discusses a number of key proprietary electricity systems models used in the USA and Europe and provides an information resource to the electricity analyst not currently readily available in the literature on the choice of model to investigate different aspects of the electricity system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A dynamic global security-aware synthesis flow using the SystemC language is presented. SystemC security models are first specified at the system or behavioural level using a library of SystemC behavioural descriptions which provide for the reuse and extension of security modules. At the core of the system is incorporated a global security-aware scheduling algorithm which allows for scheduling to a mixture of components of varying security level. The output from the scheduler is translated into annotated nets which are subsequently passed to allocation, optimisation and mapping tools for mapping into circuits. The synthesised circuits incorporate asynchronous secure power-balanced and fault-protected components. Results show that the approach offers robust implementations and efficient security/area trade-offs leading to significant improvements in turnover.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Treatment foster care (TFC) is a foster family-based intervention that aims to provide young people (and, where appropriate, their families) with a tailored programme designed to effect positive changes in their lives. TFC was designed specifically to cater for the needs of children whose difficulties or circumstances place them at risk of multiple placements and/or more restrictive placements such as hospital or secure residential or youth justice settings.

Objectives: To assess the impact of TFC on psychosocial and behavioural outcomes, delinquency, placement stability, and discharge status for children and adolescents who require out-of-home placement.

Search methods: We searched the Cochrane Controlled Trials Register (CENTRAL) 2006 (Issue 4), MEDLINE (1966 to January 2007), CINAHL (1982 to December 2006), PsycINFO (1872 to January 2007), ASSIA (1987 to January 2007), LILACS (1982 to January 2007), ERIC (1966 to January 2007), Sociological Abstracts (1963 to January 2007), and the National Research Register 2006 (Issue 4).

Selection criteria: Included studies were randomised controlled trials investigating the effectiveness of TFC with children and young people up to the age of 18 who, for reasons of severe medical, social, psychological and behavioural problems, were placed in out of home care in restrictive settings (e.g. secure residential care, psychiatric hospital) or at risk of placement in such settings.

Data collection and analysis: Titles and abstracts identified in the search were independently assessed for eligibility by the two authors (GM and WT) who also extracted and entered into REVMAN. Date were synthesised on the few occasions where this was possible. Results are presented in tabular, graphical (forest plots) and textual form.

Main results: Five studies including 390 participants were included in this review. Data suggest that treatment foster care may be a useful intervention for children and young people with complex emotional, psychological and behavioural need, who are at risk of placements in nonfamily settings that restrict their liberty and opportunities for social inclusion.

Authors’ conclusions: Although the inclusion criteria for this systematic review set a study design threshold higher than that of previous reviews, the results mirror those of earlier reviews but also highlights the tendency of the perceived effectiveness of popular interventions to outstrip their evidence base. Whilst the results of individual studies generally indicate that TFC is a promising intervention for children and youth experiencing mental health problems, behavioural problems or problems of delinquency, the evidence base is less robust than that usually reported.The Cochrane Database of Systematic Reviews is a peer reviewed, international journal, published electronically each month. The 2010 Inpact Factor for the Cochrane Database of Systematic Reviews was 6.185.The CDSR is now ranked in the top 10 of the 151 in the Medicine, General & Internal category.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper presents the full implementations of all of the second round candidates in hardware with all of their variants. In order to determine their computational efficiency, an important aspect in NIST's round two evaluation criteria, this paper gives an area/speed comparison of each design both with and without a hardware interface, thereby giving an overall impression of their performance in resource constrained and resource abundant environments. The implementation results are provided for a Virtex-5 FPGA device. The efficiency of the architectures for the hash functions are compared in terms of throughput per unit area. To the best of the authors' knowledge, this is the first work to date to present hardware designs which test for all message digest sizes (224, 256, 384, 512), and also the only work to include the padding as part of the hardware for the SHA-3 hash functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the work and roles of HR managers in the Irish recession. It tests the validity of three competing views about the future of HR: that the profession needs to become a business partner; that it is knee-deep in a legitimacy crisis; and that it is fragmenting by being unable to cope with the complexity of modern organizational life. Three key findings emerge from the research. First, HR managers have gained greater influence in business decision-making, but much of this influence arises from short-run retrenchment measures. Second, many HR managers remain committed to long established professional values and ideas of good practice. Third, modern HR managers are developing a professional identity that allows them to perform multiple, competing roles. These findings challenge existing arguments about the effects of the current recession. They also speak to ongoing debates about changing HR roles by showing how HR managers remain adept at making pragmatic adaptations to secure their role in organizational life. © The Author(s) 2012.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the debate precipitated by the Thatcher government's (unsuccessful) attempt to secure a British boycott of the 1980 Moscow Olympics in response to the Soviet invasion of Afghanistan. Aware that it faced a struggle to win over the autonomous British Olympic Association, but with Thatcher in particular keen to support the United States, the government's case that the invasion required a specific response in the form of a boycott was steadily overshadowed as the public debate increasingly focused on arguments over human rights and détente and the use of state power.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although cartel behaviour is almost universally (and rightly) condemned, it is not clear why cartel participants deserve the full wrath of the criminal law and its associated punishment. To fill this void, I develop a normative (or principled) justification for the criminalisation of conduct characteristic of ‘hard core’ cartels. The paper opens with a brief consideration of the rhetoric commonly used to denounce cartel activity, eg that it ‘steals from’ or ‘robs’ consumers. To put the discussion in context, a brief definition of ‘hard core’ cartel behaviour is provided and the harms associated with this activity are identified. These are: welfare losses in the form of appropriation (from consumer to producer) of consumer surplus, the creation of deadweight loss to the economy, the creation of productive inefficiency (hindering innovation of both products and processes), and the creation of so-called X-inefficiency. As not all activities which cause harm ought to be criminalised, a theory as to why certain harms in a liberal society can be criminalised is developed. It is based on JS Mill's harm to others principle (as refined by Feinberg) and on a choice of social institutions using Rawls's ‘veil of ignorance.’ The theory is centred on the value of individual choice in securing one's own well-being, with the market as an indispensable instrument for this. But as applied to the harm associated with cartel conduct, this theory shows that none of the earlier mentioned problems associated with this activity provide sufficient justification for criminalisation. However, as the harm from hard core cartel activity strikes at an important institution which permits an individual's ability to secure their own well-being in a liberal society, criminalisation of hard core cartel behaviour can have its normative justification on this basis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Adoption policy in the UK emphasizes its role in providing secure, permanent relationships to children in care who are unable to live with their birth families. Adoptive parents are crucial in providing this life-long, stable experience of family for these vulnerable children. This paper explores the experience of adoptive parenthood in the context of changes to adoptive kinship relationships brought about by new, unplanned contact with birth family during their child's middle adolescence. This contact was initiated via informal social networks and/or social media, with older birth siblings instrumental in negotiating renewed relationships. The contact precipitated a transition in adoptive family life resulting in emotional challenges and changes in parent/child relationships, which were experienced as additional to the normative transitions expected during adolescence. Parental concern as a dominant theme was founded in the child and birth sibling's stage of adolescence, coupled with constraints on adoptive parenthood imposed by the use of social media, by perceived professional attitudes and by parental social cognitions about the importance of birth ties. Adoptive parents' accounts are interpreted with reference to family life-cycle theory and implications are suggested for professional support of adoptive kinship relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article we review recent work on the history of French negation in relation to three key issues in socio-historical linguistics: identifying appropriate sources, interpreting scant or anomalous data, and interpreting generational differences in historical data. We then turn to a new case study, that of verbal agreement with la plupart, to see whether this can shed fresh light on these issues. We argue that organising data according to the author’s date of birth is methodologically sounder than according to date of publication. We explore the extent to which different genres and text types reflect changing patterns of usage and suggest that additional, different case-studies are required in order to make more secure generalisations about the reliability of different sources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article argues that the terrorist bombings of hotels, pubs and nightclubs in Bali in October 2002, and in Mombasa one month later, were inaugural moments in the post-9/11 securitization of the tourism industry. Although practices of tourism and terrorism seem antithetical – one devoted to travel and leisure, the other to political violence – this article argues that their entanglement is revealed most clearly in the counter-terrorism responses that brought the everyday lives of tourists and tourism workers, as well as the material infrastructure of the tourism industry, within the orbit of a global security apparatus waging a ‘war on terror’. Drawing on critical work in international relations and geography, this article understands the securitization of tourism as part of a much wider logic in which the liberal order enacts pernicious modes of governance by producing a terrorist threat that is exceptional. It explores how this logic is reproduced through a cosmopolitan community symbolized by global travellers, and examines the measures taken by the tourism industry to secure this community (e.g. the physical transformations of hotel infrastructure and the provision of counter-terrorism training).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Free space transmission of an on-off modulated sinusoidal signal through a phase conjugating lens (PCL) is theoretically examined using a combined time/frequency domain approach. The on-off keyed (OOK) signal is generated by a dipole antenna located in the far-field zone of the lens. The PCL consists of a dual layer of antenna elements interconnected via phase conjugating circuitry. We demonstrate that electromagnetic interference between antenna elements creates spatially localised areas of good-quality reception and zones where the signal is significantly denigrated by interference. Next, it is shown that destructive interference and packet desynchronisation effects critically depend on bit rate. It is also shown that a circular concave lens can be used to produce high-quality signal reception in a given direction while suppressing signal reception in all other directions. The effect that the bandwidth of the phase conjugating unit has on the transmitted signal properties for the cases of high and low bit rate OOK modulation are studied and a signal quality characterisation scheme is proposed which uses cross-correlation. The results of the study yields understanding of the performance of phase conjugating arrays under OOK modulation. The work suggests a novel approach for realising a secure communication wireless system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phased DM transmitter array synthesis using particle swarm optimization (PSO) is presented in this paper. The PSO algorithm is described in details with key parameters provided for 1-D four-element half-wavelength spaced QPSK DM array synthesis. A DM transmitter array for boresight and 30º direction secure communications are taken as examples to validate the proposed synthesis approach. The optimization process exhibits good convergence performance and solution quality.