909 resultados para Notions of security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The subtle and complex nature of Northern Ireland's transitional landscape presents acute difficulties for the community policing concept. As the core to the police reforms in the country, its implementation has faltered in the face of institutional inertia within the Police Service of Northern Ireland (PSNI). This has been further exacerbated by a failure of the police to adequately increase the co-production of security through improved engagement and utilization of Northern Ireland's diverse community infrastructures. This paper will assess the delivery of community policing by the PSNI, while exploring their engagement with Northern Ireland's grass-roots community organizations, and specifically those involved with the governance of security at the local level. Thus, through a framework of adaptation, engagement and delivery of community policing by the PSNI within the unique context of Northern Ireland's security ‘otherness’, the paper will explore the key issues to police–community interaction associated with the broader vision of the Independent Commission on Policing (ICP) on community policing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La prévalence importante des troubles d’adaptation au sein de la population d’enfants et d’adolescents du Québec appuient l’importance d’accorder une attention particulière aux piliers développementaux influençant leur trajectoire (Ministère de la Santé et des Services sociaux du Québec, 2002). Dans ce sens, des données longitudinales ont permis de statuer sur la nature de l’impact de la relation d’attachement entre le parent et l’enfant sur son adaptation ultérieure (Sroufe, Egeland, Carlson, & Collins, 2005). La sécurité d’attachement aurait un rôle protecteur, mais cette relation a aussi été identifiée comme le système le plus influent dans la compromission du développement de l’enfant (Cicchetti & Valentino, 2006). Parmi les interventions disponibles, le programme d’intervention Circle of Security Parenting (COS-P) (Powell, Cooper, Hoffman, & Marvin, 2009) s’avère particulièrement prometteur étant donnée la qualité de l’intégration théorique et clinique qui le sous-tend. Cependant, aucune donnée n’est encore disponible pour appuyer son efficacité au sein de la population québécoise dans un contexte de soins de première ligne. La présente étude vise ainsi à amorcer cette démarche avec un devis pré/post tests en explorant les effets du protocole d’intervention COS-P auprès de quatre mères et leur enfant d’âge préscolaire. À ces fins, des mesures cernant la fonction réflexive parentale et les dimensions des représentations de l’expérience affective du parent (Parent Development Interview – PDI; Aber, Slade, Berger, Bresgi & Kaplan, 1985) sont recueillies avant et après l’intervention. Les retombées de l’intervention sont aussi examinées chez les parents au niveau du stress parental (Parental Stress Index — PSI; Abidin, 1995; Bigras, LaFrenière, & Abidin, 1996) et au niveau des problèmes comportementaux et émotionnels chez les enfants (Child Behavior Checklist – CBCL; Achenbach & Rescorla, 2000). L’ensemble de ces données est analysé dans un premier temps avec perspective groupale et dans un deuxième temps, avec une perspective individuelle descriptive détaillant les résultats pour chaque participante. Les analyses ne permettent pas de démontrer une amélioration des représentations parentales et une augmentation de la fonction réflexive parentale, tel qu’attendu. Toutefois, le stress parental et les problèmes intériorisés des enfants diminuent, bien que de façon non significative. Il est proposé que l’effet de l’intervention soit compris en considérant le parent à l’intérieur d’un système dynamique, lui permettant de s’approprier l’intervention à travers un ensemble de facteurs qui lui sont propres. Des suggestions pour les études futures sont formulées en regard des constats méthodologiques et cliniques qui se dégagent de la présente étude notamment quant à la pertinence de mesures de relance (Navarro, manuscrit en préparation) et à la poursuite de la démonstration de l’efficacité du protocole avec un devis expérimental (Lemieux, manuscrit en préparation).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using the concept of time travel as a contextual and narrative tool, the author explores themes of love, loss and growth after trauma. Reflections relate primarily to the experience of conducting the qualitative research method of autoethnography. Opening with consideration of existing work (Yoga and Loss: An Autoethnographical Exploration of Grief, Mind, and Body), discussion moves on to academic thought on mental time travel, and personal transformation, culminating in the construction of a new memory combining past, present, and future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ce mémoire a pour objectif d’analyser la pertinence d’une culture stratégique particulière, celle de l’Inde. Au moins quatre variables culturelles à dimension sécuritaire – l’identité, les valeurs, les normes et les perceptions – permettent d’expliquer la conception de la sécurité et du pouvoir indiens. L’hypothèse avancée dans ce mémoire est la suivante : à cause de l’influence de la culture stratégique indienne, l’océan Indien est perçu par l’élite indienne comme l’endroit où réside la principale menace à la sécurité de l’Inde. En outre, cette perception particulière de la menace permet de mieux comprendre les ambitions maritimes de l’Inde dans l’océan Indien à l’aube du 21e siècle. Afin de confirmer l’hypothèse, nous analysons l’influence de la culture stratégique indienne sur les approches stratégiques privilégiées par les décideurs Indiens au sein de l’océan Indien. Nous concluons, sur la base de l’étude cas, que l’objectif stratégique de New Delhi est de devenir la puissance maritime dominante de l’océan Indien. Le moyen privilégié est la création d’une marine océanique puissante, capable de maintenir en permanence une escadre en patrouille loin de ses bases navales. Sur le plan théorique, les actions indiennes – qui ont surtout un caractère défensif – sont justifiées par une doctrine de non-ingérence des grandes puissances dans les affaires indiennes, doctrine calquée sur la doctrine Monroe. Selon la doctrine indienne, seules les puissances régionales sont à même de préserver la stabilité dans la région de l’océan Indien. Conséquemment, le Gouvernement indien œuvre à réduire l’ingérence des marines de guerre étrangères au sein de l’océan Indien.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Cuenca Amazónica es el nuevo escenario geoestratégico redefinido de Halford Mackinder: el Green Heart Land, el cual refleja los intereses geoestratégicos de diferentes potencias mundiales como Brasil, Rusia y Estados Unidos, los cuales actuan bajos sus propios intereses nacionales. Su interacción deja como consecuencia la elaboración de una nueva estructura en el Sistema Internacional bajo nuevas nociones de seguridad, las cuales dinamizan las fichas del ajedrez mundial descrito por Zbniew Brzezinski.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The narrative of the United States is of a "nation of immigrants" in which the language shift patterns of earlier ethnolinguistic groups have tended towards linguistic assimilation through English. In recent years, however, changes in the demographic landscape and language maintenance by non-English speaking immigrants, particularly Hispanics, have been perceived as threats and have led to calls for an official English language policy.This thesis aims to contribute to the study of language policy making from a societal security perspective as expressed in attitudes regarding language and identity originating in the daily interaction between language groups. The focus is on the role of language and American identity in relation to immigration. The study takes an interdisciplinary approach combining language policy studies, security theory, and critical discourse analysis. The material consists of articles collected from four newspapers, namely USA Today, The New York Times, Los Angeles Times, and San Francisco Chronicle between April 2006 and December 2007.Two discourse types are evident from the analysis namely Loyalty and Efficiency. The former is mainly marked by concerns of national identity and contains speech acts of security related to language shift, choice and English for unity. Immigrants are represented as dehumanised, and harmful. Immigration is given as sovereignty-related, racial, and as war. The discourse type of Efficiency is mainly instrumental and contains speech acts of security related to cost, provision of services, health and safety, and social mobility. Immigrants are further represented as a labour resource. These discourse types reflect how the construction of the linguistic 'we' is expected to be maintained. Loyalty is triggered by arguments that the collective identity is threatened and is itself used in reproducing the collective 'we' through hegemonic expressions of monolingualism in the public space and semi-public space. The denigration of immigrants is used as a tool for enhancing societal security through solidarity and as a possible justification for the denial of minority rights. Also, although language acquisition patterns still follow the historical trend of language shift, factors indicating cultural separateness such as the appearance of speech communities or the use of minority languages in the public space and semi-public space have led to manifestations of intolerance. Examples of discrimination and prejudice towards minority groups indicate that the perception of worth of a shared language differs from the actual worth of dominant language acquisition for integration purposes. The study further indicates that the efficient working of the free market by using minority languages to sell services or buy labour is perceived as conflicting with nation-building notions since it may create separately functioning sub-communities with a new cultural capital recognised as legitimate competence. The discourse types mainly represent securitising moves constructing existential threats. The perception of threat and ideas of national belonging are primarily based on a zero-sum notion favouring monolingualism. Further, the identity of the immigrant individual is seen as dynamic and adaptable to assimilationist measures whereas the identity of the state and its members are perceived as static. Also, the study shows that debates concerning language status are linked to extra-linguistic matters. To conclude, policy makers in the US need to consider the relationship between four factors, namely societal security based on collective identity, individual/human security, human rights, and a changing linguistic demography, for proposed language intervention measures to be successful.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since 1997, the Australian Federal Liberal Government has introduced policies which have sought to reduce rates of unemployment, particularly long-term unemployment. The policy, known as Mutual Obligation, increased the expectations on unemployed people in return for their social security payment. At the same time, previous labour market programmes and government assistance schemes were scrapped or privatised. This article explores the justification of the term 'Mutual Obligation' by examining both the language and the underlying principles of the policy. By defining the problem of unemployment in terms of flaws in the previous social security system, the stage is set for the government to introduce policies which remedy those flaws by emphasising self- reliance in favour of government assistance. Further, by invoking notions of fairness and mutuality, the article argues that the term 'Mutual Obligation' masks both the extent and the strength of the obligations imposed on unemployed people.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Endogenous development is defined as development that values primarily locally available resources and the way people organized themselves for that purpose. It is a dynamic and evolving concept that also embraces innovations and complementation from other than endogenous sources of knowledge; however, only as far as they are based on mutual respect and the recognition of cultural and socioeconomic self-determination of each of the parties involved. Experiences that have been systematized in the context of the BioAndes Program are demonstrating that enhancing food security and food sovereignty on the basis of endogenous development can be best achieved by applying a ‘biocultural’ perspective: This means to promote and support actions that are simultaneously valuing biological (fauna, flora, soils, or agrobiodiversity) and sociocultural resources (forms of social organization, local knowledge and skills, norms, and the related worldviews). In Bolivia, that is one of the Latin-American countries with the highest levels of poverty (79% of the rural population) and undernourishment (22% of the total population), the Program BioAndes promotes food sovereignty and food security by revitalizing the knowledge of Andean indigenous people and strengthening their livelihood strategies. This starts by recognizing that Andean people have developed complex strategies to constantly adapt to highly diverse and changing socioenvironmental conditions. These strategies are characterized by organizing the communities, land use and livelihoods along a vertical gradient of the available eco-climatic zones; the resulting agricultural systems are evolving around the own sociocultural values of reciprocity and mutual cooperation, giving thus access to an extensive variety of food, fiber and energy sources. As the influences of markets, competition or individualization are increasingly affecting the life in the communities, people became aware of the need to find a new balance between endogenous and exogenous forms of knowledge. In this context, BioAndes starts by recognizing the wealth and potentials of local practices and aims to integrate its actions into the ongoing endogenous processes of innovation and adaptation. In order to avoid external impositions and biases, the program intervenes on the basis of a dialogue between exogenous, mainly scientific, and indigenous forms of knowledge. The paper presents an analysis of the strengths and weaknesses of enhancing endogenous development through a dialogue between scientific and indigenous knowledge by specifically focusing on its effects on food sovereignty and food security in three ‘biocultural’ rural areas of the Bolivian highlands. The paper shows how the dialogue between different forms of knowledge evolved alongside the following project activities: 1) recuperation and renovation of local seeds and crop varieties (potato – Solanum spp., quinoa – Chenopodium quinoa, cañahua – Chenopodium pallidicaule); 2) support for the elaboration of community-based norms and regulations for governing access and distribution of non-timber forest products, such as medicinal, fodder, and construction plants; 3) revitalization of ethnoveterinary knowledge for sheep and llama breeding; 4) improvement of local knowledge about the transformation of food products (sheep-cheese, lacayote – Cucurbita sp. - jam, dried llama meat, fours of cañahua and other Andean crops). The implementation of these activities fostered the community-based livelihoods of indigenous people by complementing them with carefully and jointly designed innovations based on internal and external sources of knowledge and resources. Through this process, the epistemological and ontological basis that underlies local practices was made visible. On this basis, local and external actors started to jointly define a renewed concept of food security and food sovereignty that, while oriented in the notions of well being according to a collectively re-crafted world view, was incorporating external contributions as well. Enabling and hindering factors, actors and conditions of these processes are discussed in the paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation examined how United States illicit drug control policy, often commonly referred to as the "war on drugs," contributes to the reproduction of gendered and racialized social relations. Specifically, it analyzed the identity producing practices of United States illicit drug control policy as it relates to the construction of U.S. identities. ^ Drawing on the theoretical contributions of feminist postpositivists, three cases of illicit drug policy practice were discussed. In the first case, discourse analysis was employed to examine recent debates (1986-2005) in U.S. Congressional Hearings about the proper understanding of the illicit drug "threat." The analysis showed how competing policy positions are tied to differing understandings of proper masculinity and the role of policymakers as protectors of the national interest. Utilizing critical visual methodologies, the second case examined a public service media campaign circulated by the Office of National Drug Control Policy that tied the "war on drugs" with another security concern in the U.S., the "war on terror." This case demonstrated how the media campaign uses messages about race, masculinity, and femininity to produce privileged notions of state identity and proper citizenship. The third case examined the gendered politics of drug interdiction at the U.S. border. Using qualitative research methodologies including semi-structured interviews and participant observation, it examined how gender is produced through drug interdiction at border sites like Miami International Airport. By paying attention to the discourse that circulates about women drug couriers, it showed how gender is normalized in a national security setting. ^ What this dissertation found is that illicit drug control policy takes the form it does because of the politics of gender and racial identity and that, as a result, illicit drug policy is implicated in the reproduction of gender and racial inequities. It concluded that a more socially conscious and successful illicit drug policy requires an awareness of the gendered and racialized assumptions that inform and shape policy practices.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web-based applications, such as Google Maps, is ensuring that mapping based applications are becoming commonplace amongst Internet users which has facilitated the rapid growth of geo-mashups. These user generated creations enable Internet users to aggregate and publish information over specific geographical points. This article identifies privacy invasive geo-mashups that involve the unauthorized use of personal information, the inadvertent disclosure of personal information and invasion of privacy issues. Building on Zittrain’s Privacy 2.0, the author contends that first generation information privacy laws, founded on the notions of fair information practices or information privacy principles, may have a limited impact regarding the resolution of privacy problems arising from privacy invasive geo-mashups. Principally because geo-mashups have different patterns of personal information provision, collection, storage and use that reflect fundamental changes in the Web 2.0 environment. The author concludes by recommending embedded technical and social solutions to minimize the risks arising from privacy invasive geo-mashups that could lead to the establishment of guidelines for the general protection of privacy in geo-mashups.