835 resultados para Security Studies - Military


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article argues that Critical Security Studies (CSS), exemplified by Ken Boothâs Theory of World Security, has outlined an ethics of security as emancipation of the â˜humanâ, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: â˜humanitarian containmentâ, military intervention and hospitality. Assessing each against Boothâs requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Booth, Ken, Critical Security Studies and World Politics (Boulder, CO: Lynne Rienner Publishers, 2005), pp.ix+321 RAE2008

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article argues that since 2000 successive Croatian governments have shown themselves increasingly dedicated to reforming civil-military relations. However, their efforts have been hampered by four key obstacles. First, the need to implement defence reforms in the context of an unwieldy set of civil-military relationships, political and institutional rivalries, a lack of civil and military defence expertise and a continuing legacy of politicisation. Second, the need to cut defence spending as a proportion of the overall budget whilst taking on new military roles and improving the capability of the armed forces. Third, the need to balance the demands of the NATO accession process while implementing a balanced and fundamental reform of the armed forces as a whole. Finally, the need to implement root and branch personnel reforms and downsizing in the OSRH while simultaneously recruiting and retaining quality personnel and addressing the wider social issue of unemployment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we discuss how an innovative audio-visual project was adopted to foster active, rather than declarative learning, in critical International Relations (IR). First, we explore the aesthetic turn in IR, to contrast this with forms of representation that have dominated IR scholarship. Second, we describe how students were asked to record short audio or video projects to explore their own insights through aesthetic and non-written formats. Third, we explain how these projects are understood to be deeply embedded in social science methodologies. We cite our inspiration from applying a personal sociological imagination, as a way to counterbalance a â˜marketisedâ slant in higher education, in a global economy where students are often encouraged to consume, rather than produce knowledge. Finally, we draw conclusions in terms of deeper forms of student engagement leading to new ways of thinking and presenting new skills and new connections between theory and practice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter raises the following main points:<br />&bull; The study of security has experienced a series of debates around the nature of the threats to security.<br />&bull; The early security scholars, as distinct from those who studied strategy and warfare, took a broad approach and argued that military and non-military means could achieve security.<br />&bull; During the Cold War the study of security focused on the most pressing security issue of the day &ndash; the nuclear standoff between the two superpowers.<br />&bull; In the post-Cold War era the broader approach to the study of security returned to the fore and included non-state actors and non-traditional sources of insecurity.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.

Relevância:

90.00% 90.00%

Publicador: