922 resultados para September 11 Terrorist Attacks, 2001 - Influence


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Throughout late 2001 and 2002, the Australian Government, seeking re-election, campaigned on a tough line against so-called "illegal" immigrants. Represented as "queue jumpers," "boat people," and "illegals," most of these asylum seekers came from Middle Eastern countries, and, in the main, from Afghanistan and Iraq. This paper explores the way particular representations of cultural difference were entwined in media and government attacks upon asylum seekers. In particular, it analyzes the way key government figures articulated a negative understanding of asylum seekers' family units--representing these as "foreign" or "other" to contemporary Australian standards of decency and parental responsibility. This representational regime also drew upon post-September 11 representations of Middle Eastern people, and was employed to call into question the validity of asylum-seekers' claims for refugee status. Manufactured primarily through the now notorious "children overboard" incident, these images became a central motif of the 2001 election campaign. This paper concludes by examining the way these representations of refugees as "undeserving" were paralleled by new Temporary Protection Visa regulations in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the September 11, 2001 terrorist attacks in New York City, many countries including Australia and Malaysia have been able to justify the use biometric devices such as finger print scans, retina scans and facial recognition for identification and surveillance of its citizens and others in the name of national security. In addition, biometric devices are increasingly being used worldwide by organizations to keep track of their employees and their productivity, leading to concerns of privacy, the safety, reliability, abuse and misuse of the data collected and violations of civil liberties. Taking the critical theory perspective, this paper will analyse the data collected and report on the findings of a survey carried out in Australia and Malaysia, with respect to the responses provided and opinions expressed to the survey s open ended and other questions
by individuals as to their current use, experiences, preferences, concerns about the devices and the situations in which they think biometric devices should be used, including in their workplaces. This descriptive study uses both quantitative and qualitative data to examine what Australians and Malaysians think about the use of biometric devices in everyday situtions
and compare them as to their similarities and differences. The paper will then critically examine the ethical and civil liberties issues involved in the use of biometric devices in everyday life and argues that regulatory and legal measures should be taken to safeguard the rights of citizens while maintaining national security and productivity, in order to avoid the situation of Michel Foucaults Panopticon becoming an unpleasant everyday reality, which could negatively irifluence socialjustice and create social change due to its effects on individuals in two multicultural societies. The paper will argue about the need to educate the general public as to the issues of surveillance and privacy involved in the use of biometric devices in everyday situations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the September 11, 2001 terrorist attacks in New York, the use of biometric devices such as fingerprint scans, retina and iris scans and facial recognition in everyday situations for national security and border control, have become commonplace. This has resulted in the biometric industry moving from being a niche technology to one that is ubiquitous. As a result. more and more employers are using biometrics to secure staff access to their facilities as well as for tracking staff work hours, maintaining 'discipline' and carry out surveillance against thefts. detecting work hour abuses and fraud. However, the data thus collected and the technologies themselves are feared of having the potential for and actually being misused - both in terms of the violating staff privacy and discrimination and oppression of targeted workers. This paper examines the issue of using biometric devices in organisational settings their advantages, disadvantages and actual and potential abuses from the point of view of critical theory. From the perspectives of Panoptic surveillance and hegemonic organisational control, the paper examines the issues related to privacy and identification, biometrics and privacy, biometrics and the 'body', and surveillance and modernity. The paper also examines the findings ofa survey carried out in Australia. Malaysia and the USA on respondents' opinions on the use of biometric devices in everyday life including at workplaces. The paper concludes that along with their applications in border control and national security, the use of biometric devices should be covered by relevant laws and regulations. guidelines and codes of practice. in order to balance the rights to privacy and civil liberties of workers with employers' need for improved productivity, reduced costs, safeguards related to occupational health and safety, equal opportunity, and workplace harassment of staff and other matters, that employers are legally responsible for.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the September 11,2001 terrorist attacks in New York City, many countries including Australia have been able to justify the use of biometric devices for identification and surveillance of their own citizens and others in the name of national security.

This paper reports on the preliminary findings of a survey that examined Australians' views and experiences with the use of biometric devices in everyday situations in the context of their potential to serve as a 'Panopticon' to keep the nation's citizenry under surveillance. It discusses the adoption of the new communication technology from the point of view of the Justification model that sees technology choice as social
gambling and the pluralist view of technology that sees technology as neutral in itself but as having negative or positive effects on society based on how It is used.

The paper proposes the need for Australian society to balance citizens' right to privacy and civil liberties with the right to stay alive and safe from terrorism and how it may be done with the necessary legal and regulator)' safeguards.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The topic of this dissertation is the aspects of trauma and reaction to the traumatic experience that can be found in 9/11 literature. The research engages in a comparative analysis of five books that can be categorised as 9/11 literature, which means that the events of 9/11 are central in the novels and are a recurrent theme. The books have been written by authors of different nationalities: "Extremely Loud & Incredibily Close" by J. S. Foer, "Falling Man" by D. DeLillo, "Windows on the World" by F. Beigbeder, "Saturday" by I. McEwan and "The Reluctant Fundamentalist" by M. Hamid. The characters have either experienced the attacks personally or their lives have been largely influenced by the event. In either case, the protagonist has been traumatised by the tragedy. Therefore, in this study two different fields are fused together – the field of comparative literature and that of trauma studies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this research was to better understand the impact of the terrorist attacks in 2001 on public health, particularly for Texas public health. This study employed mixed methods to examine changes to public health culture within Texas local public health agencies, important attitudes of public health workers toward responding to a disaster, and the funding policies that might ensure our investment in public health emergency preparedness is protected. ^ A qualitative analysis of interviews conducted with a large sample of public health officials in Texas found that all the constituent parts of a peculiar culture for public health preparedness existed that spanned the state's local health departments regardless of size, or funding level. The new preparedness culture in Texas had the hallmarks necessary for a robust public health preparedness and emergency response system. ^ The willingness of public health workers, necessary to make these kinds of changes and mount a disaster response was examined in one of Texas' most experienced disaster response teams—the public health workers for the City of Houston. A hypothesized latent variable model showed that willingness mediated all other factors in the model (self-efficacy, knowledge, barriers, and risk perception) for self-reported likelihood of reporting to work for a disaster. The RMSEA for the final model was 0.042 with a confidence interval of 0.036—0.049 and the chi-squared difference test was P=0.08, indicating a well-fitted model that suggests willingness is an important factor for consideration by preparedness planners and researchers alike. ^ Finally, with disasters on the rise and federal funding for preparedness dwindling, a review of states' policies for the distribution of these funds and their advantages and disadvantages were examined through a review of current literature and public documents, and a survey of state-level public health officials, emergency management professionals and researchers. Although the base plus per-capita method is the most common, it is not necessarily perceived to be the most effective. No clear "optimal" method emerged from the study, but recommendations for a strategic combination of three methods were made that has the potential to maximize the benefits of each method, while minimizing the weaknesses.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O tema Governança de Tecnologia da Informação (GTI) tornou-se mais premente no ambiente empresarial brasileiro, principalmente após as repercussões mundiais ocorridas com a queda da bolsa de valores americana Nasdaq, com a nova configuração mundial após os ataques aos Estados Unidos em 11 de setembro de 2001 e a partir da promulgação da Lei Sarbanes-Oxley em 2002. Esse modelo de gestão tem sido implementado por organizações que buscam não somente obter melhor controle de gestão em Tecnologia da Informação, como para aquelas que têm de atender às conformidades legais exigidas pelos órgãos de controle. Implementá-la é um processo complexo e desafiador em virtude da necessidade de se identificar o melhor modelo de GTI dentre as práticas existentes no mundo empresarial. As empresas precisam fazer uma composição daquelas que melhor se aderem às suas realidades. Este trabalho tem como objetivo analisar os modelos de GTI adotados em organizações no Brasil, avaliar os seus resultados, seus níveis de maturidade, os seus benefícios, suas dificuldades e suas tendências, contribuindo assim para o seu melhor entendimento e para amenizar a carência de estudos nessa área no Brasil. Este estudo, que é de natureza empírica, baseou-se na metodologia de estudo de casos múltiplos realizado em cinco empresas para explorar como este modelo de gestão vem sendo adotado, quais estruturas, metodologias e práticas de mercado têm sido utilizadas para a sua efetividade. Neste contexto, apresentam-se os resultados obtidos, os aspectos que envolvem a implementação dos modelos de GTI nas organizações, as dificuldades encontradas, o que têm condicionado o seu desempenho e suas tendências.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O tema Governança de Tecnologia da Informação (GTI) tornou-se mais premente no ambiente empresarial brasileiro, principalmente após as repercussões mundiais ocorridas com a queda da bolsa de valores americana Nasdaq, com a nova configuração mundial após os ataques aos Estados Unidos em 11 de setembro de 2001 e a partir da promulgação da Lei Sarbanes-Oxley em 2002. Esse modelo de gestão tem sido implementado por organizações que buscam não somente obter melhor controle de gestão em Tecnologia da Informação, como para aquelas que têm de atender às conformidades legais exigidas pelos órgãos de controle. Implementá-la é um processo complexo e desafiador em virtude da necessidade de se identificar o melhor modelo de GTI dentre as práticas existentes no mundo empresarial. As empresas precisam fazer uma composição daquelas que melhor se aderem às suas realidades. Este trabalho tem como objetivo analisar os modelos de GTI adotados em organizações no Brasil, avaliar os seus resultados, seus níveis de maturidade, os seus benefícios, suas dificuldades e suas tendências, contribuindo assim para o seu melhor entendimento e para amenizar a carência de estudos nessa área no Brasil. Este estudo, que é de natureza empírica, baseou-se na metodologia de estudo de casos múltiplos realizado em cinco empresas para explorar como este modelo de gestão vem sendo adotado, quais estruturas, metodologias e práticas de mercado têm sido utilizadas para a sua efetividade. Neste contexto, apresentam-se os resultados obtidos, os aspectos que envolvem a implementação dos modelos de GTI nas organizações, as dificuldades encontradas, o que têm condicionado o seu desempenho e suas tendências.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Throughout the twenty-first century the United States (U.S.) has attempted to balance its traditional national security interests, whilst also seeking to promote the long-term transformation of the Middle East and North Africa (MENA) towards democracy based on liberal values. With the September 11, 2001 terrorist attacks providing a catalyst for policy change, the U.S. has moved away from its twentieth-century policy of pursuing a regional status quo and instinctively balking at political change. Yet, the U.S. has not abandoned its reliance on autocratic regimes that cooperate on more immediate national security interests such as counter-terrorism, counter-proliferation, and the free-flow energy sources into the global market. Rather, U.S. democracy promotion in the MENA has become incremental by design and is characterized by its gradualist and often collaborative nature. U.S. foreign policy in the MENA is, therefore, depicted by a cautious evolutionary stance rather than supporting revolutionary shifts in power.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Throughout the twenty-first century the United States (U.S.) has attempted to balance its traditional national security interests, whilst also seeking to promote the long-term transformation of the Middle East and North Africa (MENA) towards democracy based on liberal values. With the September 11, 2001 terrorist attacks providing a catalyst for policy change, the U.S. has moved away from its twentieth-century policy of pursuing a regional status quo and instinctively balking at political change. Yet, the U.S. has not abandoned its reliance on autocratic regimes that cooperate on more immediate national security interests such as counter-terrorism, counter-proliferation, and the free-flow energy sources into the global market. Rather, U.S. democracy promotion in the MENA has become incremental by design and is characterized by its gradualist and often-collaborative nature. U.S. foreign policy in the MENA is, therefore, depicted by a cautious evolutionary stance rather than supporting revolutionary shifts in power.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O tema Governança de Tecnologia da Informação (GTI) tornou-se mais premente no ambiente empresarial brasileiro, principalmente após as repercussões mundiais ocorridas com a queda da bolsa de valores americana Nasdaq, com a nova configuração mundial após os ataques aos Estados Unidos em 11 de setembro de 2001 e a partir da promulgação da Lei Sarbanes-Oxley em 2002. Esse modelo de gestão tem sido implementado por organizações que buscam não somente obter melhor controle de gestão em Tecnologia da Informação, como para aquelas que têm de atender às conformidades legais exigidas pelos órgãos de controle. Implementá-la é um processo complexo e desafiador em virtude da necessidade de se identificar o melhor modelo de GTI dentre as práticas existentes no mundo empresarial. As empresas precisam fazer uma composição daquelas que melhor se aderem às suas realidades. Este trabalho tem como objetivo analisar os modelos de GTI adotados em organizações no Brasil, avaliar os seus resultados, seus níveis de maturidade, os seus benefícios, suas dificuldades e suas tendências, contribuindo assim para o seu melhor entendimento e para amenizar a carência de estudos nessa área no Brasil. Este estudo, que é de natureza empírica, baseou-se na metodologia de estudo de casos múltiplos realizado em cinco empresas para explorar como este modelo de gestão vem sendo adotado, quais estruturas, metodologias e práticas de mercado têm sido utilizadas para a sua efetividade. Neste contexto, apresentam-se os resultados obtidos, os aspectos que envolvem a implementação dos modelos de GTI nas organizações, as dificuldades encontradas, o que têm condicionado o seu desempenho e suas tendências.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose - To study how the threats of terrorism are being handled by a variety of UK companies in the travel and leisure sector in the UK in the post 9/11 era. Design/methodology/approach - A review of the literature of risk management in a world that is perceived to be more risky as a result of the terrorist attacks on the US on 11 September 2001 (9/11) is presented. Describes the application of theories of organizational resilience and institutions to frame an understanding of how managers make sense of terrorism risk and comprehend uncertainty. Reports a qualitative analysis of themes in interviews conducted with 25 managers from 6 unnamed organizations in the aviation industry (3 organizations) and the UK travel and leisure industry (3 organizations), representing a catering supplier, an airport, an airline, a tour company, a convention centre, and an arts and entertainment centre. Findings - The results indicated that the three organizations in the aviation industry prioritize threats from terrorism, whilst the three organizations in the leisure and travel sector do not, suggesting that the managers in the travel and leisure industry apply a probabilistic type of thinking and believe the likelihood of terrorism to be low. Reports that they give precedence to economic concerns and numerous other threats to the industry. Concludes that managers fall prey to the 'ludic fallacy', which conceives all odds as being calculable and hence managers conceive the terrorism risk as low while also expecting institutional factors to pre-empt and control terrorism threats, a reaction which the authors believe to be rather complacent and dangerous. Originality/value - Contributes to the research literature on risk management by revealing the gap in the ability of existing management tools and methodologies to deal with current and uncertain threats facing organizations due to terrorism.