894 resultados para private security military company
Resumo:
This paper addresses the gap in economic theory underlying the multidimensional concept of food security and observed data by deriving a composite food security index using the latent class model. The link between poverty and food security is then examined using the new food security index and the robustness of the link is compared with two unidimensional measures often used in the literature. Using Vietnam as a case study, it was found that a weak link exists for the rural but not for the urban composite food security index. The unidimensional measures on the other hand show a strong link in both the rural and urban regions. The results on the link are also different and mixed when two poverty types given by persistent and transient poverty are considered. These findings have important policy implications for a targeted approach to addressing food security.
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
Background There is no legal requirement for Iranian military truck drivers to undergo regular visual checkups as compared to commercial truck drivers. Objectives This study aimed to evaluate the impact of drivers’ visual checkups by comparing the visual function of Iranian military and commercial truck drivers. Patients and Methods In this comparative cross-sectional study, two hundred military and 200 commercial truck drivers were recruited and their Visual Acuity (VA), Visual Field (VF), color vision and Contrast Sensitivity (CS) were assessed and compared using the Snellen chart, confrontation screening method, D15 test and Pelli-Robson letter chart, respectively. A questionnaire regarding driving exposure and history of motor-vehicle crashes (MVCs) was also filled by drivers. Results were analyzed using an independent samples t-test, one-way ANOVA (assessing difference in number of MVCs across different age groups), chi-square test and Pearson correlation at statistical significance level of P < 0.05. Results Mean age was 41.6 ± 9.2 for the military truck drivers and 43.4 ± 10.9 for commercial truck drivers (P > 0.05). No significant difference between military and commercial drivers was found in terms of driving experience, number of MVCs, binocular VA, frequency of color vision defects and CS scores. In contrast, the last ocular examination was significantly earlier in military drivers than commercial drivers (P < 0.001). In addition, 4% of military drivers did not meet the national standards to drive as opposed to 2% of commercial drivers. There was a significant but weak correlation between binocular VA and age (r = 0.175, P < 0.001). However, CS showed a significantly moderate correlation with age (r = -0.488, P < 0.001). Conclusions The absence of legal requirement for regular eye examination in military drivers caused the incompetent drivers to be missed in contrast to commercial drivers. The need for scientific revision of VA standard for Iranian drivers is also discussed. The CS measurement in visual checkups of older drivers deserves to be investigated more thoroughly.
Resumo:
RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
In 2015 the UN Secretary-General established an External Independent Review to review how the United Nations has responded to allegations of child sexual exploitation and child sexual abuse, and to make recommendations concerning how the United Nations should respond to allegations in the future. This submission to the Review Panel draws on literature regarding children's rights, the nature of child sexual abuse, international instruments and policy, the nature of institutional child sexual abuse, and the CAR case itself. It makes recommendations for reform of UN protocols and procedures to better prevent child sexual abuse, and to improve responses to future occurrences.
Resumo:
The power system network is assumed to be in steady-state even during low frequency transients. However, depending on generator dynamics, and toad and control characteristics, the system model and the nature of power flow equations can vary The nature of power flow equations describing the system during a contingency is investigated in detail. It is shown that under some mild assumptions on load-voltage characteristics, the power flow equations can be decoupled in an exact manner. When the generator dynamics are considered, the solutions for the load voltages are exact if load nodes are not directly connected to each other
Resumo:
Fashion and war don’t seem an obvious pairing, but the military jacket is a fashion staple. It may take the form of a double-breasted dress uniform with brass buttons and epaulettes, trimmed in rock star braid, or it may be a khaki combat jacket, worn with Doc Martens and a scowl. Here I explore how these two forms of the military jacket were frogmarched into fashion...
Resumo:
Tuure Junnila, PhD (1910-1999) was one of Finland's most renowned conservative politicians of the post-war period. Junnila is remembered primarily as a persistent opponent of Urho Kekkonen, a long-term Member of Parliament, a conspicuous opposition member and a prolific political writer. Junnila's ideologies and political views were conservative, and he is one of the most outstanding figures in the history of the National Coalition Party. Junnila also made an extensive career outside of politics, first as an economist and then as an executive of Finland's leading commercial bank Kansallis-Osake-Pankki. The Young Conservative is a partial biography written using traditional historical research methods, which examines Junnila's personal history and his activity in public life up to 1956. The study begins by investigating Junnila's background through his childhood, school years, university studies and early professional career. It also looks at Junnila's work as an economist and practical banker. Particular attention is paid to Junnila's political work, constantly focusing on the following five often overlapping areas: (1) economic policy, (2) domestic policy, (3) foreign and security policy, (4) Junnila and Urho Kekkonen, (5) Junnila, the Coalition Party and Finnish conservatism. In his economic policy, Junnila emphasised the importance of economic stability, opposed socialisation and the growth of public expenditure, defended the free market system and private entrepreneurship, and demanded tax cuts. This policy was very popular within the Coalition Party during the early 1950s, making Junnila the leading conservative economic politician of the time. In terms of domestic policy, Junnila demanded as early as the 1940s that a "third force" should be established in Finland to counterbalance the agrarian and labour parties by uniting conservative and liberal ideologies under the same roof. Foreign and security policy is the area of Junnila's political activity which is most clearly situated after the mid-1950s. However, Junnila's early speeches and writings already show a striving towards the unconditional neutrality modelled by Switzerland and Sweden and a strong emphasis on Finland's right to internal self-determination. Junnila, as did the Coalition Party as a whole, adopted a consistently critical approach towards Urho Kekkonen between 1951 and 1956, but this attitude was not as bluntly negative and all-round antagonistic as many previous studies have implied. Junnila was one of the leading Finnish conservatives of the early 1950s and in all essence his views were analogous to the general alignment of the Coalition Party at the time: conservative in ideology and general policy, and liberal in economic policy.
Resumo:
The study explores the relationship between open space design, factors impacting open space provision, and resident satisfaction with open space in multistorey apartment buildings in the context of the subtropical lifestyle and climate of Brisbane Australia. The purpose of the paper is to identify the specific physical and spatial design characteristics residents perceive to be important in open spaces associated with their private dwellings and with shared open spaces. Firsthand resident evaluations of everyday experiences of residing in inner urban high density environments are explored through a survey of 636 residents and interviews with 24 residents. Private balconies are highly valued, but residents’ satisfaction would be enhanced by spaciousness for diverse activities, privacy and climate responsive design. Communal spaces and facilities are used infrequently by many residents who prefer interactions with community outside of the building. This is related to preferences for a level of anonymity in a setting where privacy is difficult to achieve due to physical proximity of neighbours.
Resumo:
In the autumn of 1997, Russian government was faced with media pressure when owners of the TV channels ORT and NTV joined forces against it. This study is based on media sources from October 1997 to December 1997. It shows clearly how the enormous power of the media was able to dictate what happened in Russia. In the mid-1990s Russians started to talk about political technology, which became a commonly used term by professionals, journalists, politicians and intelligence services. As a result of this action, two leading reformers in the government, Anatoliy Chubais and Boris Nemtsov, were dismissed from their highly influential posts as finance and energy ministers respectively, but retained their power as first deputy prime ministers. According to the correspondents, the real reason was to resolve a conflict within the parliament, which had demanded the dismissal of Mr. Chubais. This demand was presented after Chubais had accepted $90,000 as a reward for co-writing a book on privatization. Chubais was considered to be Russia’s “business card” towards the west – the"Authors’ case" (Delo avtorov) was only solved after President Boris Yeltsin took part in the public debate. According to the research, the media owned by powerful businessmen Boris Berezovsky and Vladimir Gusinski, was able to use its own security services to expose sensitive material (Russian term ‘kompromat’), if necessary, concerning any given person. The so-called Authors’ case can be considered as a part of the battle and the tip of the iceberg in arrangements designed to organize the funding of the Russian presidential election campaign in 2000. The reason why this particular incident was so widely covered on television was because several programs aimed to reveal to the public "hidden bribes" that, as they claimed, government officials had received. The political aspect, however, was quite mild, when the concrete issues of possible dismissals of Ministers were debated in the Parliament. Everything was dealt with as a “family matter” inside Kremlin. Yeltsin's "family" consisted of practically anybody from oligarch Berezovsky to Chubais, the father of Russia's privatization policy. Methods of critical history implementation analysis has been used in this research in determining the use of the source material. Literature and interviews have also provided a good base for the study. The study proves that any literature dealing with the subject has not paid enough attention to how the dismissal of Alexander Kazakov, deputy of President’s administration, was linked directly with Gazprom, the state gas monopoly. Kazakov had to leave Gazprom and lose his position as Chubais' ally when the influential ORT television company was deteriorated.
Resumo:
Dramatic growth in the Japanese economy in the postwar period – and its meltdown in the 1990s – has attracted sustained interest in the power dynamics underlying the management of Japan’s administrative state. For a long time, scholars and commentators have debated about who wields power in Japan. The question has been asked in different ways. In the 1970s and 1980s, the question was usually posed as: who orchestrated Japan’s economic miracle in the 1960s and 1970s? Today, the question is usually reframed to: who is accountable for the policy failures that plunged Japan into financial crisis and recession during the 1990s? Yet the core issue remains the same – who governs Japan? (Johnson 1995)...
Resumo:
Public-Private Partnerships (PPP) are established globally as an important mode of procurement and the features of PPP, not least of which the transfer of risk, appeal to governments and particularly in the current economic climate. There are many other advantages of PPP that are claimed as outweighing the costs of PPP and affording Value for Money (VfM) relative to traditionally financed projects or non-PPP. That said, it is the case that we lack comparative whole-life empirical studies of VfM in PPP and non-PPP. Whilst we await this kind of study, the pace and trajectory of PPP seem set to continue and so in the meantime, the virtues of seeking to improve PPP appear incontrovertible. The decision about which projects, or parts of projects, to offer to the market as a PPP and the decision concerning the allocation or sharing risks as part of engagement of the PPP consortium are among the most fundamental decisions that determine whether PPP deliver VfM. The focus in the paper is on latter decision concerning governments’ attitudes towards risk and more specifically, the effect of this decision on the nature of the emergent PPP consortium, or PPP model, including its economic behavior and outcomes. This paper presents an exploration into the extent to which the seemingly incompatible alternatives of risk allocation and risk sharing, represented by the orthodox/conventional PPP model and the heterodox/alliance PPP model respectively, can be reconciled along with suggestions for new research directions to inform this reconciliation. In so doing, an important step is taken towards charting a path by which governments can harness the relative strengths of both kinds of PPP model.
Resumo:
Public-private partnerships (PPPs) have generated a lot of interest from governments around the world for leveraging private sector involvement in developing and sustaining public infrastructure and services. Initially, PPPs were favoured by transport, energy, and other large infrastructure-intensive sectors. More recently, the concept has been expanded to include social sectors such as education.