940 resultados para Security issues


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Os aquivos municipais preservam a documentação definida legalmente como de conservação permanente, a memória e a experiência da Administração Local e, como tal, são agentes imprescindíveis à preservação dos direitos municipais. A preocupação com a preservação da documentação deve constituir um dos pilares principais do arquivo desde o início da sua criação. E não somente quando a documentação é transferida para o Arquivo Histórico, deve estar presente durante todo o ciclo de vida da documentação. Com a criação do PARAM (Programa de Apoio à Rede de Arquivos Municipais), os arquivos municipais ganham um novo incremento, não só a nível técnico como a nível financeiro, sendo-lhe reconhecido o seu devido valor e importância, na sua dupla dimensão, administrativa e cultural. Uma das funções do arquivo é disponibilizar a documentação que têm à sua guarda e que se encontra armazenada nos depósitos. Para tal é fundamental criar condições a curto, a médio e a longo prazo, implementando toda uma política integrada de preservação, envolvendo os demais serviços da instituição, fazendo-se o controlo do estado de conservação da documentação, aplicando uma metodologia da manipulação de documentos para disponibilizá-los tanto aos clientes internos como externos. O Arquivo Intermédio da Câmara Municipal de Sintra não possui plano de preservação documental, nem ações de preservação extensíveis aos objetos digitais, daí que a presente tese de mestrado pretenda ser um proposta de um contributo de um plano de preservação, que tenha em consideração os demais aspetos desde a localização e construção ou manutenção do edifício onde se encontra o arquivo, questões de segurança, de controlo ambiental, de luz/fotodegradação, o controlo integrado de pragas, danos causados por água, os desastres naturais, a poluição, a limpeza e vigilância na zona de depósitos e armazenamento e manuseamento dos documentos.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This essay reviews the decision-making process that led to India exploding a nuclear device in May, 1974. An examination of the Analytic, Cybernetic and Cognitive Theories of decision, will enable a greater understanding of the events that led up to the 1974 test. While each theory is seen to be only partially useful, it is only by synthesising the three theories that a comprehensive account of the 1974 test can be given. To achieve this analysis, literature on decision-making in national security issues is reviewed, as well as the domestic and international environment in which involved decisionmakers operated. Finally, the rationale for the test in 1974 is examined. The conclusion revealed is that the explosion of a nuclear device by India in 1974 was primarily related to improving Indian international prestige among Third World countries and uniting a rapidly disintegrating Indian societal consensus. In themselves, individual decision-making theories were found to be of little use, but a combination of the various elements allowed a greater comprehension of the events leading up to the test than might otherwise have been the case.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La visée de ce mémoire est d’expliquer les récents changements des lois sur l’immigration et l’asile. À prime abord, le moment de ces changements suggère une influence des attentats du 11 septembre 2001. La littérature avance toutefois que ces changements dateraient plutôt de la fin de la Guerre froide. Nous avons donc vérifié deux hypothèses, la première étant que les changements législatifs découlent de l’évolution des flux migratoires, et la seconde voulant qu’ils résultent d’une « connexion sécurité‐migration ». Nous avons d’abord eu recours aux écrits sur les changements institutionnels et les politiques d’immigration et d’asile et sur la constitution des migrations comme enjeu sécuritaire. Ensuite, nous avons étudié le contenu des lois sur l’immigration et l’asile de pays membres de l’OCDE de 1989 à 2008. Deux typologies ont été construites pour évaluer l’effet des flux migratoires sur lesdits changements législatifs. Enfin, une analyse lexicométrique nous a permis d’évaluer le poids des enjeux sécuritaires dans les lois sur l’immigration et l’asile depuis 1989. Nous avons noté l’absence de corrélation entre changements législatifs et flux migratoires mais la présence d’un lien entre ces changements et la « connexion sécurité‐migration ». Le rôle joué par le 11 septembre et d’autres attaques terroristes a été vérifié pour les États‐Unis, le Royaume‐Uni et l’Union européenne. Ce mémoire démontre ainsi la mutation des lois sur l’immigration et l’asile qui sont passées du statut de « régulateur des migrations internationales » à celui de « garant de la sécurité nationale ».

Relevância:

60.00% 60.00%

Publicador:

Resumo:

L’assimilation de la santé à un « droit humain » est-elle véritablement associée à un effort international massif d’aide au développement dans ce domaine ? Nous tentons de montrer que l’aide à la santé repose depuis plusieurs années sur une conception sécuritaire, qui constitue une interprétation restrictive de la notion de bien public mondial et oriente les flux vers des maladies dont l’impact mondial est le plus visible au détriment d’autres secteurs de la santé tout aussi importants pour les populations pauvres. Cette conception pose des problèmes d’efficacité dans l’allocation des fonds et d’éthique de la décision, et nous amène à une réflexion critique sur l’usage du critère économique d’efficience dans ce contexte. Nous proposons enfin quelques pistes pour un cadre théorique renouvelé de l’aide à la santé.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ce mémoire a pour objectif d’analyser la nature et l’ampleur des enjeux de sécurité dans l’Arctique contemporain en utilisant les outils offerts par la théorie de la sécurisation de l’École de Copenhague. Cinq secteurs de sécurité – militaire, politique, identitaire, environnemental et économique – et quatre variables – la géographie, l’identité, l’histoire et la politique – sont utilisées pour examiner les perceptions de sécurité, les sécurisations et les comportements stratégiques du Canada et de la Norvège. La 1re hypothèse avancée dans ce mémoire est la suivante : depuis 2005, au Canada et en Norvège, nous sommes en train d’assister à une sécurisation progressive des enjeux non militaires dans l’Arctique - politiques, identitaires, environnementaux et économiques - et les effets entre ces secteurs de sécurité ont d’importantes conséquences sur le secteur militaire, notamment au niveau de la multiplication de projets étatiques pour la plupart essentiellement militaires, ainsi qu’au niveau d’un déclenchement d’une sécurisation de leur intégrité territoriale ou du moins un accroissement de l’insécurité à son égard. La 2e hypothèse avancée est la suivante : les nouvelles perceptions de sécurité et les comportements stratégiques des États de la région engendrent de l’insécurité à l’intérieur des sociétés ainsi qu’une dégradation de la confiance entre les acteurs étatiques. Cela a pour effet d’augmenter la division politique dans l’Arctique et de ralentir toute construction régionale. Nous concluons, sur la base de nos études de cas, qu’au Canada, la souveraineté, la nordicité et l’intégrité territoriale sont perçues comme étant menacées. De plus, les sécurisations dans l’Arctique semblent faire partie d’un renouvellement stratégique global en matière de politique étrangère et de défense. En Norvège, la Russie est considérée comme l’acteur principal du High North et à partir de 2008, la relation russo-norvégienne a subi une sécurisation. Contrairement au Canada, la Norvège préfère le statu quo stratégique dans l’Arctique en privilégiant les trois éléments traditionnels de sa politique de défense et de sécurité - la dissuasion par l’OTAN, la gestion de la Russie par l’assurance, et l’amélioration des relations est-ouest.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production. This paper describes the security issues related to wireless sensor networks and suggests some techniques for achieving system security. This paper also discusses a protocol that can be adopted for increasing the security of the transmitted data

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The study aims to get deeper insight into the highly extensive system of animal husbandry in the Mahafaly region of southwestern Madagascar. It tries to understand the major drivers for pastoral dynamics, land and resource use along a gradient in altitude and vegetation to consider the area’s high spatial and temporal heterogeneity. The study also analyzes the reproductive performance of local livestock as well as the owners’ culling strategies to determine herd dynamics, opportunities for economic growth, and future potential for rural development. Across seasons, plateau herds from both livestock species covered longer distances (cattle 13.6±3.02 km, goats 12.3±3.48 km) and were found further away from the settlements (cattle 3.1±0.96 km, goats 2.8±0.98 km) than those from the coastal plain (walking_dist: cattle 9.5±3.25 km, goats 9.2±2.57 km; max_dist: cattle 2.6±1.28 km, goats 1.8±0.61 km). Transhumant cattle were detected more vulnerable through limited access to pasture land and water resources compared to local herds. Seasonal water shortage has been confirmed as a key constraint on the plateau while livestock keeping along the coast is more limited by dry season forage availability. However, recent security issues and land use conflicts with local crop farmers are gaining importance and force livestock owners to adapt their traditional grazing management, resulting in spatio-temporal variation of livestock numbers and in the impending risk of local overgrazing and degradation of rangelands. Among the 133 plant species consumed by livestock, 13 were determined of major importance for the animals’ nutrition. The nutritive value and digestibility of the natural forage, as well as its abundance in the coastal zone, substantially decreased over the course of the dry season and emphasized the importance of supplementary forage plants, in particular Euphorbia stenoclada. At the same time, an unsustainable utilization and overexploitation of its wild stocks may raise the pressure on the vegetation and pasture resources within the nearby Tsimanampetsotsa National Park. Age at first parturition was 40.5±0.59 months for cattle and 21.3±0.63 months for goats. Both species showed long parturition intervals (cattle 24.2±0.48 months, goats 12.4±0.30 months), mostly due to the maintenance of poorly performing breeding females within the herds. Reported offspring mortality, however, was low with 2.5% of cattle and 18.8% of goats dying before reaching maturity. The analysis of economic information revealed higher than expected market dynamics, especially for zebus, resulting in annual contribution margins of 33 € per cattle unit and 11 € per goat unit. The application of the PRY Herd Life model to simulate herd development for present management and two alternate scenarios confirmed the economic profitability of the current livestock system and showed potential for further productive and economic development. However, this might be clearly limited by the region’s restricted carrying capacity. Summarizing, this study illustrates the highly extensive and resources-driven character of the livestock system in the Mahafaly region, with herd mobility being a central element to cope with seasonal shortages in forage and water. But additional key drivers and external factors are gaining importance and increasingly affect migration decisions and grazing management. This leads to an increased risk of local overgrazing and overexploitation of natural pasture resources and intensifies the tension between pastoral and conservation interests. At the same time, it hampers the region’s agronomic development, which has not yet been fully exploited. The situation therefore demonstrates the need for practical improvement suggestions and implication measures, such as the systematic forestation of supplemental forage plant species in the coastal zone or a stronger integration of animal husbandry and crop production, to sustain the traditional livestock system without compromising peoples’ livelihoods while at the same time minimizing the pastoral impact on the area’s unique nature and environment.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Rusia sufrió grandes cambios tras la desintegración de la URSS en 1991. No obstante, con la llegada de Vladimir Putin al poder, los intereses geoestratégicos de Rusia sobre el espacio postsoviético revivieron con nuevo ímpetu debido a una mayor cantidad de recursos a disposición del Estado. La República de Moldavia es un claro ejemplo del resurgir de la política exterior rusa hacia el espacio postsoviético, siendo incluso, una región clave en la lucha de la Federación Rusa por recuperar su zona de influencia.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El terrorismo en la actualidad es considerado como uno de los conceptos más controversiales en los campos social, académico y político. El término se empieza a utilizar después de la Revolución Francesa, pero recientemente, a raíz de los atentados del 11 de septiembre de 2001, ha tomado suma relevancia y ha motivado numerosas investigaciones para tratar de entender qué es terrorismo. Aunque a la fecha existen varias revisiones sistemáticas, este trabajo tiene como propósito revisar, agrupar y concretar diferentes teorías y conceptos formulados por los autores que han trabajado sobre el concepto de “terrorismo” con el fin de entender las implicaciones de su utilización en el discurso, y cómo esto afecta la dinámica interna de las sociedades en relación con la violencia, las creencias, los estereotipos entre otros elementos. Para lograrlo, se revisaron 56 artículos, publicados entre los años 1985 y 2013; 10 fuentes secundarias entre noticias y artículos de periódicos correspondientes a los años 1995-2013 y 10 estudios estadísticos cuyos resultados nos aportan a la comprensión del tema en cuestión. La búsqueda se limitó al desarrollo histórico del terrorismo, sus diferentes dimensiones y el concepto social de la realidad de terrorismo. Los hallazgos demuestran que la palabra “terrorismo” constituye un concepto que como tal es un vehículo lingüístico que puede ser utilizado con fines, estratégicos movilizando al público conforme a través del discurso e intereses políticos, destacando la necesidad de estudiar las implicaciones psicológicas y sociales de su uso.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La presente investigación tiene como objetivo analizar la incidencia de los mecanismo de cooperación humanitaria utilizados por UNICEF y CICR en la protección de la niñez durante el conflicto en Uganda en el periodo 2008-2012. Se analiza y describen los proyectos implementados para proteger a la niñez en situación de conflicto, teniendo en cuenta las relaciones establecidas entre los actores del Sistema Internacional para generar la cooperación humanitaria. Se parte del hecho que la cooperación humanitaria genera efectos positivos en la población sin embargo se da un choque cultural cuando la cooperación internacional efectúa sus acciones en comunidades con tradiciones y costumbres diferentes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Los Estados recurren a la coordinación interagencial cuando enfrentan situaciones complejas como garantizar la legitimidad estatal en territorios recuperados militarmente. En el momento que dos o más entidades deciden cooperar, deben establecer mecanismos para la coordinación de sus acciones y relacionar los esfuerzos individuales con objetivos comunes. El gobierno Uribe ha definido como prioridad el establecimiento de instancias de coordinación interagencial para complementar la Política de Seguridad Democrática con acciones para fortalecer la gobernabilidad, legitimidad y confianza de los ciudadanos en el Estado, en el marco de la recuperación social del territorio.Este artículo (i) presenta una aproximación inicial a la teoría de coordinación interagencial y describe algunas experiencias internacionales y nacionales; (ii) define el fundamento legal y de política del trabajo cívico-militar coordinado en Colombia; (iii) presenta el trabajo para la recuperación social que realiza el Centro de Coordinación de Acción Integral de la Presidencia de la República –CCAI–, mostrando algunos avances en esta tarea; y (iv) finaliza concluyendo que la seguridad e inversión social no son excluyentes y deben ir de la mano, y es necesario consolidar y asegurar la sostenibilidad de la labor realizada.-----Modern states resort to interagency coordination when they face complex situations such as warranting state legitimacy in territories militarily reclaimed. When two or more agencies decide to cooperate, they must establish certain mechanisms to coordinate their actions and to unite individual efforts towards the achievement of common goals. One of the main priorities of President Uribe’s Administration is the establishment of interagency coordination groups to complement the Democratic Security Policy with actions aimed at strengthening governance, legitimacy and citizens’ trust in the State, all this within the general framework of the territories’ overall social recovery.This article (i) presents a first approach to interagency coordination theories and describes some relevant international and national experiences; (ii) defines the legal basis and policy framework behind the coordinated civil-military interagency work done in Colombia; (iii) presents the work being done by the Centro de Coordinación de Acción Integral de la Presidencia de la República (Comprehensive Action Coordination Center of the Colombian President’s Office, CCAI) for the social recovery of the national territory, highlighting some breakthroughs in this field; and (iv) concludes with the assertion that security issues and social investment should not be mutually exclusive, that they have to go hand in hand, and that it is necessary to consolidate and warrant the sustainability of the work done so far.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El interés del presente estudio de caso es analizar la estrategia de securitización implementada por el Presidente de la Republica de Uzbekistán Islam Karimov sobre el Movimiento Islámico de Uzbekistán. Se describe y se explica cómo desde las lógicas históricas y étnicas acontecidas en Asia Central, se pueden comprender los alcances internacionales de la confrontación antagónica ejercida entre uzbekos al apoyar ideas de corte secular e islamista. Así, siguiendo los parámetros establecidos por Barry Buzan con respecto a la securitización, se puede llegar a identificar la creación de una agenda de seguridad uzbeka en la región de Asia Central, cuyos logros permitieron disminuir el riesgo de la amenaza insurgente.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O presente ensaio pretende situar o conceito de Segurança Humana no seio de uma vasta reflexão académica que entronca nas questões de segurança e reflectir sobre se a Segurança Humana, enquanto abordagem académica aparentemenete demasiado ampla e indefinida, é operacionável pela União Europeia enquanto actor de gestão de crises internacionais. Terminamos com a lembrança da atribuição do Prémio Nobel da Paz à União Europeia, questionando o impacto desta distinção no projecto normativo dos pequenos passos e da solidariedade partilhada que os seus pais fundadores preconizaram.