946 resultados para user-driven security adaptation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent decades, the governance of food safety, food quality, on-farm environmental management and animal welfare has been shifting from the realm of 'the government' to that of the private sector. Corporate entities, especially the large supermarkets, have responded to neoliberal forms of governance and the resultant 'hollowed-out' state by instituting private standards for food, backed by processes of certification and policed through systems of third party auditing. Today's food regime is one in which supermarkets impose 'private standards' along the food supply chain to ensure compliance with a range of food safety goals-often above and beyond those prescribed by government. By examining regulatory governance in Australia, Norway and the United Kingdom we highlight emerging trajectories of food governance. We argue that the imposition of the new private forms of monitoring and compliance continue the project of agricultural restructuring that began with government support for structural adjustment schemes in agriculture and that these are most evident in the UK and Australia where neoliberalism is an entrenched philosophy. However, despite Norway's identity as a social democracy, we also identify neoliberal 'creep' into the system of food governance. Small-scale producers in all three nations are finding themselves increasingly subject to governance through private, market-based mechanisms that, to varying degrees, are dominated by major supermarket chains. The result is agricultural restructuring not through the traditional avenues of elected governments, but via non-elected market operatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Major disasters, such as bushfires or floods, place significant stress on scarce public resources. Climate change is likely to exacerbate this stress. An integrated approach to disaster risk management (DRM) and climate change adaptation (CCA) could reduce the stress by encouraging the more efficient use of pooled resources and expertise. A comparative analysis of three extreme climate-related events that occurred in Australia between 2009 and 2011 indicated that a strategy to improve interagency communication and collaboration would be a key factor in this type of policy/planning integration. These findings are in accord with the concepts of Joined-up Government and Network Governance. Five key reforms are proposed: developing a shared policy vision; adopting multi-level planning; integrating legislation; networking organisations; and establishing cooperative funding. These reforms are examined with reference to the related research literature in order to identify potential problems associated with their implementation. The findings are relevant for public policy generally but are particularly useful for CCA and DRM.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Term-based approaches can extract many features in text documents, but most include noise. Many popular text-mining strategies have been adapted to reduce noisy information from extracted features; however, text-mining techniques suffer from low frequency. The key issue is how to discover relevance features in text documents to fulfil user information needs. To address this issue, we propose a new method to extract specific features from user relevance feedback. The proposed approach includes two stages. The first stage extracts topics (or patterns) from text documents to focus on interesting topics. In the second stage, topics are deployed to lower level terms to address the low-frequency problem and find specific terms. The specific terms are determined based on their appearances in relevance feedback and their distribution in topics or high-level patterns. We test our proposed method with extensive experiments in the Reuters Corpus Volume 1 dataset and TREC topics. Results show that our proposed approach significantly outperforms the state-of-the-art models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis considers and evaluates different approaches to regulating online gaming communities, including traditional top-down regulation, as well as bottom-up and hybrid forms led by participants. I examine the regulatory environment in both the video game and gambling industries through case studies of the science fiction, massively multiplayer game Eve Online and offshore gambling platforms and their community sites. I identify that the participant driven approach to regulation sometimes used in the offshore gambling industry was dependent on a number of factors, notably the strength of the community and the risks to platform operators of negative publicity. By subsequently comparing this to the video gaming industry, I suggest that participant driven processes may be an appropriate way to resolve disputes in the games industry, and show how these are – to a limited extent – already being applied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scenario 1 A buys a two storey commercial building built along the only street frontage to the property. Vehicles cannot reach the rear of the property as the building extends across the entire width of the land. A bought the building with full knowledge that vehicular access to the rest of the property had been compromised by a desire to obtain maximum street frontage for the building which was occupied by a commercial tenant. On street parking is scarce in the surrounding area. A (to the knowledge of the adjoining owner B) constructs a carpark at the rear of the building. The employees of A’s tenant have been using the carpark obtaining access via a driveway on B’s land. To formalise this arrangement, A seeks a right of way for vehicles to travel down B’s driveway to access the carpark...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the past several decades, cryptographers have consistently provided us with stronger and more capable primitives and protocols that have found many applications in security systems in everyday life. One of the central tenets of cryptographic design is that, whereas a system’s architecture ought to be public and open to scrutiny, the keys on which it depends — long, utterly random, unique strings of bits — will be perfectly preserved by their owner, and yet nominally inaccessible to foes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pockets of Change collects fourteen essays that address issues of cultural adaptation and transition in the Arts. Based on insights into a range of primary texts and cultural practices—from visual art to film, from literature to theatre—these essays investigate the ways in which traditions, art-forms, cultures and ethics adapt to challenge established boundaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. He argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. He adds that Perec's architext is de-constructive and ironic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this research is to report initial experimental results and evaluation of a clinician-driven automated method that can address the issue of misdiagnosis from unstructured radiology reports. Timely diagnosis and reporting of patient symptoms in hospital emergency departments (ED) is a critical component of health services delivery. However, due to disperse information resources and vast amounts of manual processing of unstructured information, a point-of-care accurate diagnosis is often difficult. A rule-based method that considers the occurrence of clinician specified keywords related to radiological findings was developed to identify limb abnormalities, such as fractures. A dataset containing 99 narrative reports of radiological findings was sourced from a tertiary hospital. The rule-based method achieved an F-measure of 0.80 and an accuracy of 0.80. While our method achieves promising performance, a number of avenues for improvement were identified using advanced natural language processing (NLP) techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.