828 resultados para Asia-Pacific security
Resumo:
Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given program has received little attention. In this work, we focus on the design of object-oriented applications and use metrics to assess the impact of a number of standard refactoring rules on their security by evaluating the metrics before and after refactoring. This assessment tells us which refactoring steps can increase the security level of a given program from the point of view of potential information flow, allowing application designers to improve their system’s security at an early stage.
Resumo:
Peter Edwards writes on rural aquaculture: Myanmar revisited. Harvesting, traditional preservation and marketing of fishes of Chalan Beel, Bangladesh, by Galib, S.M. and Samad, M.A. Role of community in production and supply of larger, quality fingerlings, by Radheyshyam, De, H.K. and Saha, G.S. Can rice-fish farming provide food security in Bangladesh? by Ahmed, N. and Luong-Van, J. Nutritional and food security for rural poor through multi-commodity production from a lake of eastern Uttar Pradesh, by Singh, S.K. Emerging boost in Sri Lankan reservoir fish production: a case of adoption of past research findings, by Amarasinghe, U.S., Weerakoon, D.E.M., Athukorala, D.A. Farming the freshwater prawn Macrobrachium malcolmsonii, by Radheyshyam Breeding and seed production of butter catfish, Ompok pabda (Siluridae) at Kalyani Centre of CIFA, India, by Chakrabarti, P.P., Chakrabarty, N.M. and Mondal, S.C. Asia-Pacific Marine Finfish Aquaculture Magazine Use of fish in animal feeds: a fresh perspective National strategies for aquatic animal health management, by Mohan, C.V. NACA Newsletter.
Resumo:
During the 1980's and for much of the 1990's, many countries in the Asia Pacific were renowned for their economic development and prosperity. The Asian tigers were a source of great interest for many economists and international investors. The 1997 Asian financial crisis, however, dramatically altered the growth and the performance of these economies. The crisis sent several ofAsia's best performing economies on a downward spiral from which many have yet to fully recover. The crisis exposed the financial and the political weaknesses ofmany countries in the region. Moreover, the crisis severely affected the wellbeing and the security ofmany ofthe region's citizens. This text will examine the economic crisis in greater detail and explore current debates in the study of international relations theory. More specifically, this paper will examine recent challenges posed to traditional international relations theory and address alternative approaches to this field of study. This paper will examine Critical theory and its role in shifting the referent object of security from the state to the individual. In this context, this paper will also assess Critical theory's role in enabling such issues as gender and human security to find a place on the agendas of international relations scholars and foreign policy makers. The central focus ofthis study will be the financial crisis and its impact on human security in the Southeast Asia. Furthermore, this paper will assess the recovery efforts ofthe domestic governments, international organizations and various Canadian sponsored initiatives in the context ofhuman security.
Resumo:
Análisis de la política exterior de Singapur y cómo está determinada por las políticas comerciales del país. Analiza cómo la participación en una organización internacional y un foro económico benefician al desarrollo económico del país.
La política exterior energética China y sus implicaciones geopolíticas en Asia Central (2000 - 2010)
Resumo:
El interés de la presente monografía es evaluar las implicaciones geopolíticas que ha tenido la política exterior energética China dentro la región de Asia Central. De esta manera, se analiza el papel de los recursos energéticos en las dinámicas geopolíticas que se están dando en la región centroasiática, al igual que la influencia de grandes potencias en esta zona. Así, teniendo en cuenta la teoría geopolítica de Saúl Bernard Cohen se sostiene que el acercamiento de China, a través de su política exterior energética, ha ayudado a transformar a Asia Central en un shatterbelt debido a su intención de ejercer influencia y control sobre los recursos de la región.
Resumo:
El interés de esta monografía es analizar el crecimiento económico de Corea del Sur y sus posibilidades de alterar el equilibrio en la región de Asia-Pacífico. A partir de los conceptos de poder duro y equilibrio de poder propuestos por Joseph Nye y Ernst Haas, se examinan los principales hitos del proceso de desarrollo nacional y se determina en qué sentido el incremento del poder duro nacional le permite a este país posicionarse como una potencia regional en ascenso. Así mismo, se evalúan los procesos de liderazgo regional de China y Japón que impiden a Corea del Sur alterar sustancialmente el equilibrio de poder en esta región del mundo.
Resumo:
The goal of this publication is to attempt to assess the thirteen years (2001- -2014) of the West’s military presence in the countries of post-Soviet Central Asia, closely associated with the ISAF and OEF-A (Operation Enduring Freedom – Afghanistan) missions in Afghanistan. There will also be an analysis of the actual challenges for the region’s stability after 2014. The current and future security architecture in Central Asia will also be looked at closely, as will the actual capabilities to counteract the most serious threats within its framework. The need to separately handle the security system in Central Asia and security as such is dictated by the particularities of political situation in the region, the key mechanism of which is geopolitics understood as global superpower rivalry for influence with a secondary or even instrumental role of the five regional states, while ignoring their internal problems. Such an approach is especially present in Russia’s perception of Central Asia, as it views security issues in geopolitical categories. Because of this, security analysis in the Central Asian region requires a broader geopolitical context, which was taken into account in this publication. The first part investigates the impact of the Western (primarily US) military and political presence on the region’s geopolitical architecture between 2001 and 2014. The second chapter is an attempt to take an objective look at the real challenges to regional security after the withdrawal of the coalition forces from Afghanistan, while the third chapter is dedicated to analysing the probable course of events in the security dimension following 2014. The accuracy of predictions time-wise included in the below publication does not exceed three to five years due to the dynamic developments in Central Asia and its immediate vicinity (the former Soviet Union, Afghanistan, Pakistan, Iran), and because of the large degree of unpredictability of policies of one of the key regional actors – Russia (both in the terms of its activity on the international arena, and its internal developments).
Resumo:
The European Union is a security actor in Central Asia, although with less influence than other players. Russia and China have a much larger impact on Central Asian regimes’ security strategies. These limitations do not dispense with the need for the EU to provide a better security narrative, especially in light of its growing emphasis on human security, and to incorporate this into the current review of its strategy for the region. This policy brief will centre on the EU’s contribution to human security in Central Asia.
Resumo:
This paper presents a secure communication protocol which can be used as the framework for an e-tendering scheme. This protocol is focused on securing the integrity of tendering documents and ensuring that a secure record of document generation is kept. Our protocol provides a mechanism to manage e-tendering contract evidence as a legal record in a unique and effective manner. It is the starting point of reliable record keeping. To a certain extent, it also addresses existing security problems in the traditional tendering processes.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
The 1989 Comprehensive Plan of Action (CPA) has recently been described as a successful example of how to manage large protracted refugee flows. However, this article revisits the circumstances surrounding the CPA used to resolve the prolonged Indo-Chinese refugee crisis to highlight that part of its development was linked to the fact that Southeast Asian states refused to engage with proposed solutions, which did not include repatriation for the majority of the Indo-Chinese asylum seekers who were deemed to be ‘non-genuine’1 ( UNGA, 1989a) refugees. This resulted in the CPA often forcibly repatriating ‘non-genuine’ refugees, particularly near the end of its program. This article reviews the CPA in order to assess whether its practices and results should be repeated.
Resumo:
A collection of case studies of individuals and organisations utilising open models in the Asia Pacific and associated regions. The case studies represent activities in nine countries, broader regions such as the Arab nations, and global efforts towards sustainability and social justice, revealing creative ways of participating in the commons. Featured are remix artists, performers, open source software programmers, film makers, collecting institutions and publishing houses focused on democracy and change, who demonstrate a diverse set of motivations to engage with the shared ideals of openness and community collaboration.
Resumo:
As network capacity has increased over the past decade, individuals and organisations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the direct control of the individual or organisation that provided the data, leaving data owners at risk of data theft or misuse. This paper describes a model by which data owners can control the distribution and use of their data throughout a dynamic coalition of service providers using digital rights management technology. Our model allows a data owner to establish the trustworthiness of every member of a coalition employed to process data, and to communicate a machine-enforceable usage policy to every such member.