767 resultados para cyber-terrorism


Relevância:

20.00% 20.00%

Publicador:

Resumo:

ln a context where widespread failings in the nature of terrorism research are well recognised - yet where the quantity of work is still enormous - is it possible to fairly assess whether the field is progressing or if it has become mired in mediocre research? Citation analysis is widely used to reveal the evolution and extent of progress in fields of study and to provide valuable insight into major trends and achievements. This study identifies and analyses the current 100 most cited journal articles in terrorism studies. A search was performed using Google Scholar for peer reviewed journal articles on subjects related to terrorism and counter-terrorism. The most cited papers were published across 62 journals which reflected the interdisciplinary nature of terrorism studies. Compared to other articles, the most cited papers were more likely to be the result of colloborative research and were also more likely to provide new data. 63 of the top 1-00 articles have been published since 2001. The findings are discussed in relation to the evolution of terrorism research and current debates on progress in the field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

US presidents have expanded executive power in times of war and emergency,sometimes aggressively so. This article builds on the application of punctuated equilibria theory by Burnham (1999 and Ackerman (1999). Underpinning this theory is the notion that rapid changes in - or external shocks to - domestic and international society impose new and insistent demands on the state. In so doing, they produce important and decisive moments of institutional mobilization and creativity, disrupt a pre-existing, relatively stable, equilibrium between the Congress and the president, and precipitate decisions or nondecisions by the electorate and political leaders that define the contours for action when the next crisis or external shock occurs. The article suggests that the combination of President George W. Bush's presidentialist doctrine, 9/11 and the 'war' on terror has consolidated a new, constitutional equilibrium. While some members of Congress contest the new order, the Congress collectively has acquiesced in its own marginalization. The article surveys a wide range of executive power assertions and legislative retreats. It argues that power assertions generally draw on precedent: on, for example, a tradition of wartime presidential extraconstitutional leadership extending to presidents, such as John Adams and Abraham Lincoln,as well as to Cold War and post-Cold War presidentialism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ‘war on terror’ has marked the existence of exceptional measures involving military action abroad and the introduction of counter-terrorism legislation in the United Kingdom. Within this context fear, risk and insecurity have been intrinsic in legitimizing the measures created as being necessary to maintain national security. This article presents the findings from a study investigating the impact of the ‘war on terror’ on British Muslims’ emotions. The study revealed how facets of the ‘war on terror’, including ‘human rights and policing’, ‘What if? and pre-emption’, ‘geopolitics and reflexive fear and risk’ and ‘fear from inside the binary’ impacted participants’ emotions. Through exploring how thepolicy measures implemented in the ‘war on terror’ have influenced British Muslims’ emotions, the article takes a small step in addressing the analytical gap in criminological research on emotions in the ‘war on terror’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the application of an intelligent tutoring approach to delivery training in diagnosis procedures of a Power System. In particular, the mechanisms implemented by the training tool to support the trainees are detailed. This tool is part of an architecture conceived to integrate Power Systems tools in a Power System Control Centre, based on an Ambient Intelligent paradigm. The present work is integrated in the CITOPSY project which main goal is to achieve a better integration between operators and control room applications, considering the needs of people, customizing requirements and forecasting behaviors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber-Physical Systems and Ambient Intelligence are two of the most important and emerging paradigms of our days. The introduction of renewable sources gave origin to a completely different dimension of the distribution generation problem. On the other hand, Electricity Markets introduced a different dimension in the complexity, the economic dimension. Our goal is to study how to proceed with the Intelligent Training of Operators in Power Systems Control Centres, considering the new reality of Renewable Sources, Distributed Generation, and Electricity Markets, under the emerging paradigms of Cyber-Physical Systems and Ambient Intelligence. We propose Intelligent Tutoring Systems as the approach to deal with the intelligent training of operators in these new circumstances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the energy management of a small power system, the scheduling of the generation units is a crucial problem for which adequate methodologies can maximize the performance of the energy supply. This paper proposes an innovative methodology for distributed energy resources management. The optimal operation of distributed generation, demand response and storage resources is formulated as a mixed-integer linear programming model (MILP) and solved by a deterministic optimization technique CPLEX-based implemented in General Algebraic Modeling Systems (GAMS). The paper deals with a vision for the grids of the future, focusing on conceptual and operational aspects of electrical grids characterized by an intensive penetration of DG, in the scope of competitive environments and using artificial intelligence methodologies to attain the envisaged goals. These concepts are implemented in a computational framework which includes both grid and market simulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Localization is a fundamental task in Cyber-Physical Systems (CPS), where data is tightly coupled with the environment and the location where it is generated. The research literature on localization has reached a critical mass, and several surveys have also emerged. This review paper contributes on the state-of-the-art with the proposal of a new and holistic taxonomy of the fundamental concepts of localization in CPS, based on a comprehensive analysis of previous research works and surveys. The main objective is to pave the way towards a deep understanding of the main localization techniques, and unify their descriptions. Furthermore, this review paper provides a complete overview on the most relevant localization and geolocation techniques. Also, we present the most important metrics for measuring the accuracy of localization approaches, which is meant to be the gap between the real location and its estimate. Finally, we present open issues and research challenges pertaining to localization. We believe that this review paper will represent an important and complete reference of localization techniques in CPS for researchers and practitioners and will provide them with an added value as compared to previous surveys.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a distributed algorithm for cyber-physical systems to obtain a snapshot of sensor data. The snapshot is an approximate representation of sensor data; it is an interpolation as a function of space coordinates. The new algorithm exploits a prioritized medium access control (MAC) protocol to efficiently transmit information of the sensor data. It scales to a very large number of sensors and it is able to operate in the presence of sensor faults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Outrora dominado por ameaças provenientes de Estados-nação, o cenário global actual, dominado por uma rápida mudança de poderes que nos apresenta uma interacção complexa entre múltiplos actores, onde inimigos desconhecidos, anteriormente bem identificados, é actualmente controlado por grupos terroristas bem preparados e bem organizados. Hezbollah é reconhecido como um dos grupos terroristas mais capazes, com uma extensa rede fora do Líbano dedicada a tráfico de droga, armas e seres humanos, tal como o branqueamento de capitais para financiar o terrorismo, representando um grande foco de instabilidade à segurança. Como instrumento de Estado, os serviços de informações detêm a capacidade de estar na linha da frente na prevenção e combate ao terrorismo. Todavia, para compreender este fenómeno é necessário analisar os actores desta ameaça. À luz desta conjuntura, esta dissertação está dividida em três capítulos principais que visam responder às seguintes questões fundamentais: O que é o terrorismo? Como opera um grupo terrorista transnacional? Será que os serviços de informações têm as ferramentas necessárias para prevenir e combater estas ameaças?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cette thèse porte sur le comportement des élites politiques durant les périodes de crise nationale et plus particulièrement sur leurs réactions aux attentats terroristes. Elle démontre que les crises terroristes sont tout comme les conflits militaires ou diplomatiques propices aux unions nationales et notamment aux ralliements des partis d’opposition auprès du gouvernement. L’analyse statistique d’actes terroristes s’étant produits dans cinq états démocratiques (Allemagne, Espagne, États-Unis d’Amérique, France et Royaume-Uni) entre 1990 et 2006 révèle que l’ampleur d’un attentat en termes de pertes humaines ainsi que la répétition de ces attentats influencent dans une large mesure la réaction des élites politiques. Ainsi plus l’ampleur d’un attentat est élevée, plus la probabilité d’un ralliement est grande. En revanche, la multiplication des attentats augmente la possibilité de dissension entre l’opposition et le gouvernement. Par ailleurs, l’opposition est plus susceptible de se rallier au gouvernement lorsque l’attentat est perpétré par des terroristes provenant de l’étranger. L’analyse quantitative indique également que l’existence d’un accord formel de coopération dans la lutte antiterroriste entre le gouvernement et l’opposition favorise l’union des élites. Enfin, les données analysées suggèrent que la proportion des ralliements dans les cinq pays est plus importante depuis les attentats du 11 septembre 2001. Une analyse qualitative portant exclusivement sur la France et couvrant la période 1980-2006 confirme la validité des variables identifiées dans la partie quantitative, mais suggère que les élites réagissent au nombre total de victimes (morts mais aussi blessés) et que la répétition des actes terroristes a moins d’impact lors des vagues d’attentats. Par ailleurs, les analyses de cas confirment que les élites politiques françaises sont plus susceptibles de se rallier quand un attentat vise un haut-fonctionnaire de l’État. Il apparaît également que les rivalités et rancœurs politiques propre à la France (notamment suite à l’arrivée de la gauche au pouvoir en 1981) ont parfois empêché le ralliement des élites. Enfin, cette analyse qualitative révèle que si l’extrême gauche française soutient généralement le gouvernement, qu’il soit de gauche ou de droite, en période de crise terroriste, l’extrême droite en revanche saisit quasi systématiquement l’opportunité offerte par l’acte terroriste pour critiquer le gouvernement ainsi que les partis de l’establishment. La thèse est divisée en sept chapitres. Le premier chapitre suggère que le comportement des élites politiques en période de crises internationales graves (guerres et conflits diplomatiques) est souvent influencé par la raison d’État et non par l’intérêt électoral qui prédomine lors des périodes plus paisibles. Le second chapitre discute du phénomène terroriste et de la littérature afférente. Le troisième chapitre analyse les causes du phénomène d’union nationale, soumet un cadre pour l’analyse de la réaction des élites aux actes terroristes, et présente une série d’hypothèses. Le quatrième chapitre détaille la méthodologie utilisée au cours de cette recherche. Les chapitres cinq et six présentent respectivement les résultats des analyses quantitatives et qualitatives. Enfin, le chapitre sept conclut cette thèse en résumant la contribution de l’auteur et en suggérant des pistes de recherche.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction : La cyber santé (CS) a le potentiel d’améliorer l'efficience et l'efficacité des services de santé. Malgré cela, son adoption demeure problématique et jusqu’à 70 % des projets d’implantation échouent. Objectifs : Cette étude vise à évaluer l’état de préparation d’une organisation par rapport à la CS et à identifier les facteurs personnels qui influencent cet état. Méthode : Une étude transversale a été réalisée auprès de 137 cliniciens, 28 gestionnaires et 47 membres du personnel non clinique d’un centre de réadaptation à Montréal. Les participants ont répondu à un questionnaire auto administré sur l’état de préparation organisationnelle vis-à-vis la CS qui comprend trois sous échelles (Individu, Organisation et Technologie) avec chacune un score sur 100. Des données ont aussi été colligées sur le profil des utilisateurs, leur utilisation des technologies et leur style de réponse à la nouvelle information. Résultats : Les participants se perçoivent prêts à adopter la CS dans leur travail ( = 73.8, SD = 8.5) et perçoivent aussi favorablement les technologies disponibles ( = 73.8, SD = 7.2). Toutefois, le personnel perçoit le centre comme étant modérément prête ( = 66.6, SD = 9.8). La charge de travail perçue et la fonction au sein de l'organisation ont été identifiées comme ayant une influence sur l'état de préparation à la CS. Discussion : Ces résultats appuient la pertinence d’aborder l’état de préparation organisationnelle comme un concept multidimensionnel. À partir des résultats obtenus, des stratégies d'implantation adaptées ont pu être identifiées.