1000 resultados para Cooperative Security
Resumo:
Asia is a prominent export market for Europe while in the East and South China Seas, tensions continue. Europe has searched for its political role in Asia. This policy brief presents an analysis and argues the role of Europe in enhancing cooperative security in Asia and the Pacific, which would promote stability and peace there.
Resumo:
Turkey is a non-nuclear member of a nuclear alliance in a region where nuclear proliferation is of particular concern. As the only North Atlantic Treaty Organization (NATO) member that has a border with the Middle East, Turkish officials argue that Turkey cannot solely rely on NATO guarantees in addressing the regional security challenges. However, Turkey has not been able to formulate a security policy that reconciles its quest for independence, its NATO membership, the bilateral relationship with the United States, and regional engagement in the Middle East. This dissertation assesses the strategic implications of Turkey’s perceptions of the U.S./NATO nuclear and conventional deterrence on nuclear issues. It explores three case studies by the process tracing of Turkish policymakers’ nuclear-related decisions on U.S. tactical nuclear weapons deployed in Europe, national air and missile defense, and Iran’s nuclear program. The study finds that the principles of Turkish security policymaking do not incorporate a fundamentally different reasoning on nuclear issues than conventional deterrence. Nuclear weapons and their delivery systems do not have a defining role in Turkish security and defense strategy. The decisions are mainly guided by non-nuclear considerations such as Alliance politics, modernization of the domestic defense industry, and regional influence. The dissertation argues that Turkey could formulate more effective and less risky security policies on nuclear issues by emphasizing the cooperative security approaches within the NATO Alliance over confrontational measures. The findings of this dissertation reveal that a major transformation of Turkish security policymaking is required to end the crisis of confidence with NATO, redefinition of the strategic partnership with the US, and a more cautious approach toward the Middle East. The dissertation argues that Turkey should promote proactive measures to reduce, contain, and counter risks before they develop into real threats, as well as contribute to developing consensual confidence-building measures to reduce uncertainty.
Resumo:
As a consequence of the terrorist attacks of 9/11 and the US-led war against Iraq, WMD and their proliferation have become a central element of the EU security agenda. In December 2003, the European Council adopted even a EU Strategy against Proliferation of WMD. The approach adopted in this Strategy can be largely described as a ‘cooperative security provider’ approach and is based on effective multilateralism, the promotion of a stable international and regional environment and the cooperation with key partners. The principal objective of this paper is to examine in how far the EU has actually implemented the ‘cooperative security provider’ approach in the area which the Non-proliferation Strategy identifies as one of its priorities – the Mediterranean. Focusing on the concept of security interdependence, the paper analyses first the various WMD dangers with which the EU is confronted in the Mediterranean area. Afterwards, it examines how the EU has responded to these hazards in the framework of the Barcelona process and, in particular, the new European Neighbourhood Policy. It is argued that despite its relatively powerful rhetoric, the EU has largely failed, for a wide range of reasons, to apply effectively its non-proliferation approach in the Mediterranean area and, thus, to become a successful security provider.
Resumo:
A presente dissertação tem por objetivo analisar os principais desafios à segurança marítima na subregião da África Ocidental, particularmente nas ilhas de Cabo Verde. Incidir-se-á, igualmente, sob as principais iniciativas adotadas a nível regional e nacional, bem como, as implicações desses novos desafios na estratégia de segurança nacional de Cabo Verde e os efeitos das ações cooperativas na segurança marítima deste arquipélago. Argumenta-se que apesar dos vários benefícios e potencialidades de exploração do espaço marítimo, existem, atualmente, diversas ameaças e vulnerabilidades, como a criminalidade organizada transnacional, mormente, o tráfico ilícito de drogas e de armas. De igual modo, a pirataria marítima, o terrorismo marítimo, a pesca ilegal e a poluição marítima colocam sérios problemas securitários aos Estados costeiros. No contexto dessas novas ameaças e face às limitações atuais do Direito Internacional Marítimo e à falta de pragmatismo de políticas nacionais e regionais, um possível caminho para combater as atividades ilícitas no mar é através de uma visão partilhada de interesses comuns e a tomada de decisões compartilhadas a todos os níveis. Para se atingir o desiderato proposto, além de se apoiar numa ampla revisão de bibliografia existente sobre a segurança marítima e relatórios elaborados por organismos regionais e internacionais, baseia-se também em leis e documentos oficiais de Cabo Verde relativos à segurança marítima.
Resumo:
Históricamente, las fronteras colombianas han sido porosas, frágiles y descuidadas desde una perspectiva política. La extrema pobreza y la ausencia de instituciones estatales han dejado a las poblaciones vulnerables ante diversos actores armados y a merced de las actividades ilícitas, que inevitablemente se desbordan y afectan los territorios vecinos. El desborde de los efectos del conflicto armado a territorio ecuatoriano, los enfrentamientos e incursiones del ejército colombiano, y la presencia de actores no estatales como los grupos al margen de la ley, han hecho que las relaciones bilaterales se minen, dañando lo que alguna vez fue una cordialidad constructiva entre Colombia y Ecuador. Para analizar esta problemática, se utilizaron las teorías de las relaciones internacionales de Interdependencia y seguridad cooperativa.
Resumo:
Este artículo analiza el impacto del conflicto colombiano sobre la seguridad de la subregión, tomando como punto de referencia principal su impacto sobre el Ecuador. Destaca, para el efecto, las vulnerabilidades que presenta la frontera norte-ecuatoriana y considera las posibilidades para enfrentar sus amenazas dentro de un marco de cooperación regional. Finalmente, el autor plantea la necesidad de desarrollar un enfoque de seguridad cooperativa, en el cual, el conflicto subregional sea abordado desde una perspectiva integral, tomando en cuenta todos sus elementos y complejidades.
Resumo:
Pós-graduação em História - FCLAS
Resumo:
O presente trabalho tem como objeto de estudo o modelo emergente de forças de escalão subagrupamento capazes de operações dispersas e detentoras de elementos de combate, apoio de combate, apoio de serviços e apoio de comando, modeladas no conceito de Força- Tarefa Subagrupamento. O objetivo do estudo é avaliar a possibilidade de emprego de Forças-Tarefa Subagrupamento nos cenários do Conceito Estratégico Militar. Nesse sentido, são analisadas duas operações de estados aliados, para as quais módulos do tipo Força-Tarefa Subagrupamento foram gerados, a Operação Romeo-Alfa e a Operação Serval. Ambas as operações são então comparadas e transpostas para os cenários de emprego da ação militar presentes no Conceito Estratégico Militar, especificamente, para o cenário de Segurança Cooperativa. Partindo do pressuposto que as forças são geradas para cenários, portanto, dependentes destes, se as operações analisadas geraram Forças-Tarefa Subagrupamentos e se são traduzíveis no cenário de Segurança Cooperativa, logo, a geração e emprego de Forças-Tarefa Subagrupamento é possível para este cenário. O trabalho conclui com a recomendação de que o modelo Força-Tarefa Subagrupamento seja adotado, com o objetivo de favorecer a capacidade de adaptação das Forças Armadas face aos requisitos do novo paradigma da conflitualidade.
Resumo:
The response of some Argentine workers to the 2001 crisis of neoliberalism gave rise to a movement of worker-recovered enterprises (empresas recuperadas por sus trabajadores or ERTs). The ERTs have emerged as former employees took over the control of generally fraudulently bankrupt factories and enterprises. The analysis of the ERT movement within the neoliberal global capitalist order will draw from William Robinson’s (2004) neo-Gramscian concept of hegemony. The theoretical framework of neo-Gramscian hegemony will be used in exposing the contradictions of capitalism on the global, national, organizational and individual scales and the effects they have on the ERT movement. The ERT movement has demonstrated strong level of resilience, despite the numerous economic, social, political and cultural challenges and limitations it faces as a consequence of the implementation of neoliberalism globally. ERTs have shown that through non-violent protests, democratic principles of management and social inclusion, it is possible to start constructing an alternative social order that is based on the cooperative principles of “honesty, openness, social responsibility and caring for others” (ICA 2007) as opposed to secrecy, exclusiveness, individualism and self-interestedness. In order to meet this “utopian” vision, it is essential to push the limits of the possible within the current social order and broaden the alliance to include the organized members of the working class, such as the members of trade unions, and the unorganized, such as the unemployed and underemployed. Though marginal in number and size, the members of ERTs have given rise to a model that is worth exploring in other countries and regions burdened by the contradictory workings of capitalism. Today, ERTs serve as living proofs that workers too are capable of successfully running businesses, not capitalists alone.
Resumo:
This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.
Resumo:
The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.
Resumo:
Cognitive radio networks sense spectrum occupancy and manage themselvesto operate in unused bands without disturbing licensed users. The detection capability of aradio system can be enhanced if the sensing process is performed jointly by a group of nodesso that the effects of wireless fading and shadowing can be minimized. However, taking acollaborative approach poses new security threats to the system as nodes can report falsesensing data to reach a wrong decision. This paper makes a review of secure cooperativespectrum sensing in cognitive radio networks. The main objective of these protocols is toprovide an accurate resolution about the availability of some spectrum channels, ensuring thecontribution from incapable users as well as malicious ones is discarded. Issues, advantagesand disadvantages of such protocols are investigated and summarized.