999 resultados para aesthetic security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brings together a range of specially-commissioned chapters to provide an accessible introduction to security studies in the 21st century. The second edition has been expanded to cover developments in global and regional security; nuclear proliferation; terrorism; intervention and peacekeeping. C. Snyder, Deaking Uni.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Summary: "In the wake of the September 11 and subsequent terrorist attacks, the academic and media commentaries on Islam the religion and Islam the basis for political ideology haves received an unprecedented high level of exposure and attention. The acts of political violence by extremist groups and the omnipresent war on terror have added fresh uncertainties to an already complex global order. Just as terrorism and counter-terrorism are locked in a mutually re-enforcing symbiosis, the sense of insecurity felt by Muslims and non-Muslims alike is mutually dependent and has the potential to escalate. This general assessment holds true for Muslims living in the Muslim world and beyond. The pervasive sense of being under attack physically and culturally by the United States and its allies has contributed to a growing unease among Muslims and re-enforced deep-seated mistrust of the ʻWestʼ. Public articulation of such misgivings has in turn, lent credence to Western observers who posit an inherent antipathy between the West and the Muslim world. The subsequent policies that have emerged in this context of fear and mutual distrust have contributed to the vicious cycle of insecurity. The present volume is anchored in the current debates on the uneasy and potentially mutually destructive relationship between the Muslim world and certain West countries. It brings together leading international scholars in this interdisciplinary field to deal with such inter-related questions as the nature of Islamism, the impact of the ʻwar on terrorʼ on the spread of militancy, the growing sense of being under siege by Muslim Diasporas and the many unintended ramifications of a security-minded world order. This volume deliberately focuses on these issues both at a broad theoretical level but more importantly in the form of a number of prominent case studies including Indonesia, Algeria and Turkey."--Publisher description.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the effectiveness of several well-known parametric and non-parametric event study test statistics with security price data from the major Asia-Pacific security markets. Extensive Monte Carlo simulation experiments with actual daily security returns data reveal that the parametric test statistics are prone to misspecification with Asia-Pacific returns data. Two non-parametric tests, a rank test [Corrado and Zivney (Corrado, C.J., Zivney, T.L., 1992, The specification and power of the sign test in event study hypothesis tests using daily stock returns, Journal of Financial and Quantitative Analysis 27(3), 465-478)] and a sign test [Cowan (Cowan, A.R., 1992, Non-parametric event study tests, Review of Quantitative Finance and Accounting 1(4), 343–358)] were the best performers overall with market model excess returns computed using an equal weight index.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective : Food Security has become a global concern, yet its measurement has varied considerably across disciplines and countries. We examined the current discrepancies in the definitions of food security and propose a framework for understanding and measuring food security.

Methods : This conceptual review draws from a range of works published in Medline and the gray literature to advance the understanding of food security concepts. We begin by examining the historical background of food security and then move on to examine its various definitions and interpret food through cultural lenses in terms of food access and utilization. We finish by examining various measurements and indicators of food security and reviewing implications for public health.

Results : We argue that the reliance on coping strategies as surrogate measurements of food insecurity without taking into account the social, cultural, and political contexts in which they occur is misleading, and viewing food insecurity solely from a food access or availability perspective, without taking into account food utilization and asset creation as pillars of food security, paints an incomplete picture. Although this review does not claim to provide solutions to the discrepancies in the conceptual definition of food security, it attempts to highlights areas of concern and provide a way forward.

Conclusion : When coping strategies are used as an indicator of food insecurity, they need to be culturally relevant and focus tested, and together with objective measurements of nutritional outcomes, would allow policy makers to make evidence-based decisions to inform social and nutrition policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the emergent security risk that information warfare poses to critical infrastructure systems, particularly as governments are increasingly concerned with protecting these assets against attack or disruption. Initially it outlines critical infrastructure systems and the notion of information warfare. It then discusses the potential implications and examining the concerns and vulnerabilities such cyber attacks would pose, utilising exemplar online attack occurrences. It then examines the current Australian situation before suggesting some considerations to mitigate the potential risk that information warfare poses to critical infrastructure systems, and by association: government, industry and the wider community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article examines Indonesia's capacity to deal with the contemporary Aceh conflict from a policy perspective. The author examines the impact of regime change on state capacity and democratization on center-periphery relations. She also evaluates the post-New Order regime's different security policies in Aceh, how and why they have failed and what this has meant for Indonesia's reform process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The influx of Fortune 500 companies like IBM, Toyota and Starwood Hotels into the virtual world of Second Life has generated much publicity in 2006 and 2007. The virtual world landscape has changed substantially since. Many early adopters have abandoned virtual worlds, and the number of security-related incidents in virtual worlds has risen substantially. This paper discusses key security threats in virtual worlds, and highlights the need for users and stakeholders to better understand these threats in order to manage them more effectively. The issue of managing security threats in virtual worlds is especially important in ensuring that virtual worlds remain a friendly environment to thriving online communities and ebusiness; and represent an environment whereby the interests of various stakeholders are protected and upheld. The paper contributes to practice and research by (i) raising security awareness among virtual world users and stakeholders, and (ii) prescribing a systematic approach for analyzing the nature and implication of security threats in virtual worlds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[No Abstract]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes become critical to an organization. In this paper we evaluate one particular extremely asymmetric risk where a strongly motivated attacker unleashes a prolonged attack on an organization with the aim to do maximum damage, and suggest that the probability of such an attack is increasing. We discuss how preventive controls are unlikely to ever be effective against such an attack and propose more advanced strategies that aim to limit the damage when such an attack occurs. One crucial lesson to be learned for those organizations that are dependant on their information security, such as critical infrastructure organizations, is the need to deny motivated attackers access to any information about the success of their attack. Successful deception in this area is likely to significantly reduce any potential escalation of the incident.