908 resultados para Security policies
Resumo:
Global development has, in recent years, been shaped by the rise of transnational capital. This has implications for the quality and effectiveness of those national laws, regulations and policies in place to monitor transnational capital, ensure that multi national organisations assume responsibility and hold them accountable should they fail to do so. In balancing these objectives, contrasting issues come to the fore, such as the fear of capital flight; an issue especially profound in small open economies where the balance may tip in the favour of retaining, as opposed to regulating, foreign capital.
This paper can be considered in three parts. First, the paper addresses the shift in global leadership from national governments to multinational corporations (with particular reference to the rise of the Transnational Capitalist Class). This shift will incorporate the connotations of the Third Way. In considering this ideology, it will propose the Third Way as a transition phase to a stage when government is more the “third wheel” than an equal partner in governance structures. Second, the implications of the changing nature of governance on the capacity of nation states to develop effective laws, regulations and policies is discussed which leads on to the third aspect of the paper which identifies the challenges for governments, business and society in reimagining the governance structure pertaining to law, regulation and policy and the need to reconsider existing structures in light of global shifts in power structures.
A new leadership structure, both within the national and international governance system has far reaching implications. Boundary constraints no longer an issue, the potential for equality and global democracy is huge. Instead, a post recessionary world faces new governance challenges in the shape of; legitimacy; accountability and responsibility. Capitalism has invaded government and the primary challenge will be in avoiding the same issues that have dogged our financial markets for the last number of years. The challenge then to laws, regulations and public policy is huge, especially considering that the governments regulating are smaller than those dictating agenda on a global level
Resumo:
This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant motherchild dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parentchild attachment security. Mothers' religiosity also moderated the association between parentchild attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on motherchild attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.
Resumo:
SALT threatened to institutionalize a bipolar world order. NWS and NNWS alike feared that the US and SU will prioritize global security principles such as systemic stability and conflict stability to Atlantic and European security. Endangered was Europe’s security and position in the future world order. Parity in strategic weapons invalidated the US nuclear umbrella. An ABM deployment and a non-transfer regime threatened Europe’s nuclear defence options. The danger of a Limited War or a denuclearization of Central Europe led to a European co-ordination on nuclear arms control to assure the preservation of the West and the future of Europe.
Resumo:
The scheduling problem in distributed data-intensive computing environments has become an active research topic due to the tremendous growth in grid and cloud computing environments. As an innovative distributed intelligent paradigm, swarm intelligence provides a novel approach to solving these potentially intractable problems. In this paper, we formulate the scheduling problem for work-flow applications with security constraints in distributed data-intensive computing environments and present a novel security constraint model. Several meta-heuristic adaptations to the particle swarm optimization algorithm are introduced to deal with the formulation of efficient schedules. A variable neighborhood particle swarm optimization algorithm is compared with a multi-start particle swarm optimization and multi-start genetic algorithm. Experimental results illustrate that population based meta-heuristics approaches usually provide a good balance between global exploration and local exploitation and their feasibility and effectiveness for scheduling work-flow applications. © 2010 Elsevier Inc. All rights reserved.
Resumo:
One of the core elements of successful planning is the individuals’ experience of their shared open spaces. This paper attributes to the relationship between safety and urban design by means of natural surveillance and security in the city’s shared spaces. It examines how political claims over space reassembled alternative definitions of security in one of Cairo’s oldest quarters, and how ambitious planning schemes were mostly driven by problems of insecurity, chaos and disorder. The main crux to this account is based on original documents, interviews and maps which reveals considerable insights and accounts of how this vision affected the quarter’s spatial quality and the user’s reactions to his new spatial formula. It also reveals conflicting conceptions of safety and security between the planning ambitions and the users experiences, which not only lacked reliable visions for securing the quarter, but also resulted further disruption to their everyday living spaces.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.
Resumo:
Synchrophasor systems will play a crucial role in next generation Smart Grid monitoring, protection and control. However these systems also introduce a multitude of potential vulnerabilities from malicious and inadvertent attacks, which may render erroneous operation or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System (SSIDS) for malicious cyber attack and unintended misuse. The SSIDS comprises a heterogeneous whitelist and behavior-based approach to detect known attack types and unknown and so-called ‘zero-day’ vulnerabilities and attacks. The paper describes reconnaissance, Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attack types executed against a practical synchrophasor system which are used to validate the real-time effectiveness of the proposed SSIDS cyber detection method.
Resumo:
The management of non-functional features (performance, security, power management, etc.) is traditionally a difficult, error prone task for programmers of parallel applications. To take care of these non-functional features, autonomic managers running policies represented as rules using sensors and actuators to monitor and transform a running parallel application may be used. We discuss an approach aimed at providing formal tool support to the integration of independently developed autonomic managers taking care of different non-functional concerns within the same parallel application. Our approach builds on the Behavioural Skeleton experience (autonomic management of non-functional features in structured parallel applications) and on previous results on conflict detection and resolution in rule-based systems. © 2013 Springer-Verlag Berlin Heidelberg.