908 resultados para human security


Relevância:

60.00% 60.00%

Publicador:

Resumo:

El objetivo de esta investigación diagnóstica es evaluar las acciones de la Comunidad Internacional en materia de resocialización de niños soldados desvinculados del Ejército de Resistencia del Señor (ERS) en Uganda durante el periodo de 2002 a 2013. Para ello, se hace un análisis de las causas de la existencia de niños soldados, donde se tiene en cuenta la evolución del concepto de la infancia y las particularidades que éste representa en el contexto africano. Así mismo, son analizados los alcances y limitaciones del modelo de asistencia humanitaria para la protección de la niñez enfatizando en los procesos de resocialización brindados a los niños desvinculados del ERS. Esto con el fin de evidenciar las limitaciones de la actuación de la Comunidad Internacional, y brindar una serie de recomendaciones para la implementación de programas de resocialización enfocados en la infancia.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El propósito del trabajo es exponer de qué manera el tráfico ilícito de armas pequeñas y ligeras constituye una amenaza a la seguridad en Guatemala durante el 2000 y 2005. La aproximación conceptual se centrará en las ideas de la Seguridad de Charles-Philippe David, puesto que servirá como herramienta para el análisis de la coyuntura guatemalteca. Así, se pretende dar cuenta del fortalecimiento de actores ilegales de crimen internacional organizado, narcotráfico, maras y pandillas, lo que da lugar al incremento de la violencia armada afectando diferentes esferas como la política, societal y económica.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente estudio de caso busca examinar la incidencia de las medidas migratorias de control fronterizo implementadas por el Frontex y el gobierno Italiano en las condiciones mínimas de supervivencia de los migrantes irregulares, económicos y solicitantes de asilo en la Isla de Lampedusa, en el periodo 2011-2015. De esta manera, se identifican las medidas migratorias de control fronterizo implementadas por Frontex y el gobierno Italiano. Se examina la situación de la seguridad humana en la crisis migratoria de la Isla, y se analiza la relación entre las medidas migratorias de control fronterizo y las condiciones mínimas de supervivencia de los migrantes. El resultado de la investigación permite plasmar, las consecuencias negativas que han tenido las medidas migratorias en cuanto a las condiciones mínimas de supervivencia, lo que ha desembocado en una crisis humanitaria.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La presente investigación tiene como finalidad analizar las implicaciones humanitarias de la participación de las Compañías Militares Privadas (PMC) contratadas por los Estados en escenarios de conflicto, a partir del caso de Blackwater y Estados Unidos en Irak (2003-2007), con el fin de mostrar a través de algunos hechos específicos como el acaecido en la plaza Al Nisour los vacíos existentes en la regulación de sus actividades. Frente a estos hechos se muestra como la Comunidad Internacional ha tratado de avanzar en la creación de un régimen internacional que las controle, sin embargo, como se evidencia a lo largo de este escrito la falta de compromiso por parte de los Estados ha hecho que esta tarea se vea obstaculizada y por lo tanto la actuación de estas compañías se encuentra aún en una zona jurídica gris.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

ResumenEl presente ensayo plantea un marco para comprender el concepto de la seguridad humana. Para ello, se explicará la evolución del concepto de seguridad, el origen de la seguridad humana, sus principales concepciones (amplia y restringida), las ventajas de cada una de ellas, las potencialidadesy limitantes del concepto de seguridad humana como un todo. Además, se desarrolla un estudio de caso (Ituango, Colombia) que muestra al lector la forma de operacionalizar la seguridad humana de acuerdo con sus dos interpretaciones.Palabras clave: seguridad, seguridad humana, concepción amplia seguridad humana, concepción restringida seguridad humana, derechos humanos, Ituango (Colombia).AbstractThis essay presents a framework to understand the human security concept. Therefore, it will explain the evolution of the security concept, the origin of human security, its main conceptions (broad and restricted), the advantages of each one, the potentialities and limitations of the human  security concept as a whole. Furthermore, there will be developed a case of study (Ituango, Colombia) which shows the reader how to operationalize human security according to its interpretations.Keywords: Security, human security, broad conception human security, restricted conception human security, human rights, Ituango (Colombia).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Se desarrolla un marco teórico de la seguridad comunitaria al definirla a partir de la evolución que ha tenido el tema de la seguridad comunitaria a partir de la adopción del enfoque más amplio de la seguridad humana de los habitantes como base y eje de las políticas públicas, de donde nace un nuevo conjunto de prioridades para la erradicación de los factores de riesgo social asociados o que son proclives a la violencia y la comisión de delitos, tales como la deserción escolar, el desempleo, la violencia en todas sus formas, la inequidad de género y diversidad social, la falta de cohesión social, las migraciones, internas o externas, forzadas por las condiciones de vida. El enfoque se basa en un nuevo modelo criminológico que está sustentado en el marco de los derechos humanos, la seguridad humana y el modelo de control social democrático para formar un modelo de desarrollo humano sostenible, por tanto la prevención sustentada en políticas públicas para la seguridad humana, la participación comunitaria y el nuevo rol de la policía comunitaria.It develops a theoretical framework for defining the community from the developments that have taken the issue of community safety from the adoption of the broader approach to human security of people as the basis and focus of public policy, arises where a new set of priorities for the eradication of social risk factors that are associated with or prone to violence and committing crimes, such as school dropouts, unemployment, violence in all its forms, gender inequity and social diversity, lack of social cohesion, migration, internal or external, forced by the conditions of life. The approach is based on a new criminological model that is based on the framework of human rights, human security and control model to form a social democratic model of sustainable human development, thus preventing sustained public policies for security human, community involvement and the new role of community police.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A security system based on the recognition of the iris of human eyes using the wavelet transform is presented. The zero-crossings of the wavelet transform are used to extract the unique features obtained from the grey-level profiles of the iris. The recognition process is performed in two stages. The first stage consists of building a one-dimensional representation of the grey-level profiles of the iris, followed by obtaining the wavelet transform zerocrossings of the resulting representation. The second stage is the matching procedure for iris recognition. The proposed approach uses only a few selected intermediate resolution levels for matching, thus making it computationally efficient as well as less sensitive to noise and quantisation errors. A normalisation process is implemented to compensate for size variations due to the possible changes in the camera-to-face distance. The technique has been tested on real images in both noise-free and noisy conditions. The technique is being investigated for real-time implementation, as a stand-alone system, for access control to high-security areas.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Revised: 2006-11.-- Published as an article in: Journal of Public Economics 90(12), December, 2006, pp. 2323-2349.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This handbook provides detailed information for a wide range of legal instruments relevant to fisheries and fishworkers. It covers 114 legal instruments, categorized into the following seven themes: Theme I. Human Rights, Food Security, Women and Development. Theme II. Environment and Sustainable Development. Theme III. Oceans and Fisheries Management. Theme IV. Environmental Pollution Theme V. Fishing Vessels and Safety at Sea Theme VI. Labour Theme VII. Trade The handbook also includes the working of the instruments (decision-making bodies, monitoring and implementation agencies, periodicity of meetings, rules for participation in meetings of the decision-making bodies and implementation agencies for States and non-governmental organizations), regional instrument and agencies. Apart from being a ready reckoner to the instruments, it highlights the important sections of relevance to fisheries or small-scale fisheries and fishworkers. The companion CD-ROM provides the full texts of the instruments in a searchable database. The handbook will be useful for fishworker and non-governmental organizations, and also for researchers and others interested in fisheries issues.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.