701 resultados para Political of security
Resumo:
This book addresses two developments in the conceptualisation of citizenship that arise from the 'war on terror', namely the re-culturalisation of membership in a polity and the re-moralisationof access to rights. Taking an anthropological perspective, it traces the ways in which the trans-nationalisation of the 'war on terror' has affected notions of 'the dangerous other' in different political and social contexts, asking what changes in the ideas of the state and of the nation have been promoted by the emerging culture of security, and how these changes affect practices of citizenship and societal group relations.
Resumo:
This research addressed the development of a consolidated model designed especially to cover the security and usability attributes of a software product. As a starting point, we built a new usability model on the basis of well-known quality standards and models. We then used an existing security model to analyse the relationship between these two approaches. This analysis consisted of a systematic mapping study of the relationship between security and usability as global quality factors. We identified five relationship types: inverse, direct, relative, one-way inverse, and no relationship. Most authors agree that there is an inverse relationship between security and usability. However, this is not a unanimous finding, and this study unveils a number of open questions, like application domain dependency and the need to explore lower-level relationships between attribute subcharacteristics. In order to clarify the questions raised during the research, we conducted a second systematic mapping to further analyse the finer-grained structure of these factors, such as authentication as a subset of security and user efficiency as a subset of usability. The most relevant finding is that efficiency does not depend on the security level during the authentication process. There are other subfactors that require analysis. Accordingly, this research is the first part of a larger project to develop a full-blown consolidated model for security and usability.
Resumo:
In some countries photovoltaic (PV) technology is at a stage of development at which it can compete with conventional electricity sources. A case in point is Germany where PV market has reached a mature stage. As a manifest of this, the German government has recently reduced the feed-in-tariff, which had been the strongest driver of PV diffusion. This development raises a fundamental question: Why would potential adopters be motivated to adopt PV when feed-in tariff diminishes? The point of departure for the literature on diffusion of PV has been on the effect of subsidies but little attention has paid to adopter motives when the policy support is scaled down. This paper presents an in-depth analysis of the adopter motives for photovoltaic applications. Anchored in an extensive exploratory case study we provide an encompassing explanation of roles of policy, adopters and system suppliers on diffusion of PV.
Resumo:
This study analyses the current picture and prospects for EU–Brazil relations in the political and security arenas. As actors experiencing relevant changes, albeit in different directions in their respective international status quo, the EU and Brazil have found some common ground for convergence at the macro level on some structural issues, such as the normative framework of a changing global order, the striving for a multipolar world and the relevance and desirability of multilateralism. At the same time, it is argued that they differ significantly as to the strategies pursued in the attainment of those shared interests, resulting in competing, or eventually divergent, policy preferences when addressing specific issues and developments at the international level, limiting the prospects for a deep mutual commitment and engagement in political and security dynamics at the global level.
Resumo:
Introduction. Since the 25th of January 2011 revolution the Egyptian economy has been suffering on all fronts. Almost all the economic indicators have been pointing towards a deteriorating situation, and in many cases have reached the trough. Yet, the economy is still surviving. This is mainly due to the unprecedented support of some of Arab Gulf countries, whose unconditional aid has helped to mitigate the deteriorating economic conditions. The economic challenges facing Egypt have been exacerbated after the 20th of January revolution mainly because of the deteriorating political and security conditions which have interrupted the functioning of the economy. Yet, this is not to say that revolution has caused these challenges. In fact, the challenges that the Egyptian has been facing have deep roots in its socio-political-economic context, which this paper aims to explain. The revolution and its aftermath have brought to the forefront challenges which have always been mitigated by short-term solutions that never dealt seriously with their roots. Moreover, the revolution has brought additional problems associated with the macroeconomic imbalances. As a result, the challenges became more complex especially in light of the need to balance the social and economic aspects. The paper proceeds as follows; in section one we pinpoint the main challenges faced by Egypt where we identify the symptoms and causes of such challenges. In section two we discuss the roots of such challenges. Finally, we conclude and provide our understanding of how Egypt is expected to face its challenges in the near future.
Resumo:
The European Union has developed new capacity as a security actor in third countries, in particular in the area of crisis management. Over the past two decades the EU has deployed numerous missions, both of a civilian and military nature. Moreover the EU has defined its ability to intervene all along the ‘crisis cycle’, (from prevention to mediation, from peace-keeping to post-conflict reconstruction) and using all tools at its disposal (taking a ‘comprehensive approach’). However the EU is still not perceived as a major security provider globally and interventions remain limited to some geographic areas, mostly in its neighbourhood and Africa, with just a few examples further afield. The EU also tends to avoid taking direct action and seems to prefer partnership arrangements with other players. How can we explain the growing activism and number of EU’s intervention with the low impact and lack of visibility? Can we expect the EU to become more active in the future, taking on more responsibility and leading roles in addressing conflict situations? This paper will argue that the main reason for the EU’s hesitant role in crisis management is to be found in the weak decision-making provisions for EU’s security interventions, as one of the few policy areas still subject to consensus amongst 28 European Union Member States. Lack of a clearer delegation of competence or stronger coordination structures is closely linked to low legitimacy for the EU to take more robust action as a security actor. In order to overcome this legitimacy problem, and in order to facilitate consensus amongst Member States, the EU thus privileges partnership arrangements with other actors who can provide legitimacy and know-how, such as the UN or the African Union. As there is no political desire in the EU for tighter decision-making in this area, we can expect that the EU will continue to play a supporting rather than leading role in crisis management, becoming the partner of choice as it deepens its experience. However this does not mean that the EU is playing just a secondary role in the wider area of security, in particular when looking at nontraditional security. Looking at the role of the EU in Asia, where the EU has deployed just two missions, this paper will offer a broader assessment of the EU as a partner in the area of security taking into account different types of actions. The paper will argue that in order to strengthen cooperation with Asian partners in the area of crisis management, the EU will need to define better what it is able to offer, present its actions as part of an overall strategy rather than ad-hoc and piecemeal, and enter into partnership arrangements with different players in the region.
Resumo:
The state still matters. However, the members of the Euro-Atlantic community may be misinterpreting this crucial baseline prior launching their military interventions since 2001. The latest violence and collapse of the state of Iraq after the invasion of Northern Iraq by a radical Sunni Muslim terrorist group, so-called Islamic State of Iraq and Syria (ISIS), demonstrate once again the centrality and requirement of a functioning state in order to maintain violent forces to disrupt domestic and regional stability. Since 2001, the US and its European allies have waged wars against failed-states in order to increase this security and national interests, and then have been involved in some type of state-building.1 This has been the case in Afghanistan, Iraq, Libya, Mali, and Central African Republic (CAR). France went into Mali (2012) and CAR (2013), which preceded two European Union military and civilian Common Security and Defense Policy missions (CSDP), in order to avoid the collapse of these two states. The threat of the collapse of both states was a concern for the members of the Euro-Atlantic community as it could have spread to the region and causing even greater instabilities. In Mali, the country was under radical Islamic pressures coming from the North after the collapse of Libya ensuing the 2011 Western intervention, while in CAR it was mainly an ethno-religious crisis. Failed states are a real concern, as they can rapidly become training grounds for radical groups and permitting all types of smuggling and trafficking.2 In Mali, France wanted to protect its large French population and avoid the fall of Mali in the hands of radical Islamic groups directly or indirectly linked to Al-Qaeda. A fallen Mali could have destabilized the region of the Sahel and ultimately affected the stability of Southern European borders. France wanted to avoid the development of a safe haven across the Sahel where movements of people and goods are uncontrolled and illegal.3 Since the end of the Cold War, Western powers have been involved in stabilizing neighborhoods and regions, like the Balkans, Africa, and Middle East, which at the exceptions of the Balkans, have led to failed policies. 9/11 changes everything. The US, under President George W. Bush, started to wage war against terrorism and all states link to it. This started a period of continuous Western interventions in this post-9/11 era in Afghanistan, Iraq, Libya, Mali and CAR. If history has demonstrated one thing, the members of the Euro-Atlantic community are struggling and will continue to struggle to stabilize Afghanistan, Iraq, Libya, Mali and Central African Republic (CAR) for one simple reason: no clear endgame. Is it the creation of a state à la Westphalian in order to permit these states to operate as the sole guarantor of security? Or is the reestablishment of status quo in these countries permitting to exit and end Western operations? This article seeks to analyze Western interventions in these five countries in order to reflect on the concept of the state and the erroneous starting point for each intervention.4 In the first part, the political status of each country is analyzed in order to understand the internal and regional crisis. In a second time, the concept of the state, framed into the Buzanian trinity, is discussed and applied to the cases. In the last part the European and American civilian-military doctrines are examined in accordance with their latest military interventions and in their broader spectrum.
Resumo:
Fifteen years have passed since the adoption of Security Council Resolution 1325 on Women, Peace and Security, through which time the EU has grown as a security actor. The keys to produce a change in implementing gender mainstreaming in the Common Security and Defence Policy (CSDP) are well known by member states; the EU and external implementation reports1 are repeated again and again, but real change requires real willingness on the part of member states, and leadership.
Resumo:
The United States has exerted a major influence on Southeast Asia, especially since World War II. As both a promoter of neoliberal reform and as the key strategic actor in the wider East Asian region, the impact of U.S. power has been immense. But both the Asian economic crisis and its aftermath, and the more recent war on terror, have highlighted the contradictory impact of evolving U.S. foreign policy and intervention in the region. At both an elite and a mass level there is evidence of resentment about, and hostility toward, U.S. policy and its perceived negative effects. This article outlines how U.S. foreign policy has impacted the region in the economic, political, and security spheres, and argues that not only has it frequently not achieved its goals, but it may in fact be undermining both America's long-term hegemonic position in the region and any prospects for political liberalization.
Resumo:
We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.
Resumo:
This multi-disciplinary research project explores the religious and cultural foundations within the "master commemorative narratives" that frame Israeli and Iranian political discourse. In articulating their grievances against one another, Israeli and Iranian leaders express the tensions between religion, nationalism, and modernity in their own societies. The theoretical and methodological approach of this dissertation is constructivist-interpretivist. The concept of "master commemorative narratives" is adapted from Yael Zerubavel's study of ritualized remembrance in Israeli political culture, and applied to both Israeli and Iranian foreign policy. Israel’s master commemorative narrative draws heavily upon the language of the Hebrew Bible, situating foreign policy discourse within a paradigm of covenantal patrimony, exile, and return, despite the unrelenting hostility of eternal enemies and "the nations." Iran’s master commemorative narrative expresses Iranian suspicion of foreign encroachment and interference, and of the internal corruption that they engender, sacralizing resistance to the forces of evil in the figurative language and myths of pre-Islamic tradition and of Shi'a Islam. Using a constructivist-interpretive methodological approach, this research offers a unique interpretive analysis of the parallels between these narratives, where they intersect, and where they come into conflict. It highlights both the broad appeal and the diverse challenges to the components of these "master" narratives within Israeli and Iranian politics and society. The conclusion of this study explains the ways in which the recognition of religious and cultural conflicts through the optic of master commemorative narratives can complement the perspectives of other theoretical approaches and challenge the conventions of Security Studies. It also suggests some of the potential practical applications of this research in devising more effective international diplomacy.
Resumo:
What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program (INP) towards being designated as a proliferation threat (securitization)? What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program away from being designated as an existential threat (de-securitization)? What has been the overall balance of power and interaction dynamics of these opposing forces over the last half-century and what is their most likely future trajectory? ^ Iran's nuclear story can be told as the unfolding of constant interaction between state and non-state forces of "nuclear securitization" and "nuclear de-securitization." Tracking the crisscrossing interaction between these different securitizing and de-securitizing actors in a historical context constitutes the central task of this project. ^ A careful tracing of "security events" on different analytical levels reveals the broad contours of the evolutionary trajectory of INP and its possible future path(s). Out of this theoretically conscious historical narrative, one can make informed observations about the overall thrust of INP along the securitization - de-securitization continuum. ^ The main contributions of this work are three fold: First, it brings a fresh theoretical perspective on Iran's proliferation behavior by utilizing the "securitization" theory tracing the initial indications of the threat designation of INP all the way back to the mid 1970s. Second, it gives a solid and thematically grounded historical texture to INP by providing an intimate engagement with the persons, processes, and events of Tehran's nuclear pursuit over half a century. Third, it demonstrates how INP has interacted with and even at times transformed the NPT as the keystone of the non-proliferation regime, and how it has affected and injected urgency to the international discourse on nuclear proliferation specifically in the Middle East.^