989 resultados para security practices


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Dominant paradigms of causal explanation for why and how Western liberal-democracies go to war in the post-Cold War era remain versions of the 'liberal peace' or 'democratic peace' thesis. Yet such explanations have been shown to rest upon deeply problematic epistemological and methodological assumptions. Of equal importance, however, is the failure of these dominant paradigms to account for the 'neoliberal revolution' that has gripped Western liberal-democracies since the 1970s. The transition from liberalism to neoliberalism remains neglected in analyses of the contemporary Western security constellation. Arguing that neoliberalism can be understood simultaneously through the Marxian concept of ideology and the Foucauldian concept of governmentality – that is, as a complementary set of 'ways of seeing' and 'ways of being' – the thesis goes on to analyse British security in policy and practice, considering it as an instantiation of a wider neoliberal way of war. In so doing, the thesis draws upon, but also challenges and develops, established critical discourse analytic methods, incorporating within its purview not only the textual data that is usually considered by discourse analysts, but also material practices of security. This analysis finds that contemporary British security policy is predicated on a neoliberal social ontology, morphology and morality – an ideology or 'way of seeing' – focused on the notion of a globalised 'network-market', and is aimed at rendering circulations through this network-market amenable to neoliberal techniques of government. It is further argued that security practices shaped by this ideology imperfectly and unevenly achieve the realisation of neoliberal 'ways of being' – especially modes of governing self and other or the 'conduct of conduct' – and the re-articulation of subjectivities in line with neoliberal principles of individualism, risk, responsibility and flexibility. The policy and practice of contemporary British 'security' is thus recontextualised as a component of a broader 'neoliberal way of war'.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed and maintained externally to the organisation. Therefore, it is essential for cloud providers to demonstrate and implement adequate security practices to protect the data and processes put under their stewardship. Security transparency in the cloud is likely to become the core theme that underpins the systematic disclosure of security designs and practices that enhance customer confidence in using cloud service and deployment models. In this paper, we present a framework that enables a detailed analysis of security transparency for cloud based systems. In particular, we consider security transparency from three different levels of abstraction, i.e., conceptual, organisation and technical levels, and identify the relevant concepts within these levels. This allows us to provide an elaboration of the essential concepts at the core of transparency and analyse the means for implementing them from a technical perspective. Finally, an example from a real world migration context is given to provide a solid discussion on the applicability of the proposed framework.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The aim of this special issue is to widen the existing debates on security privatization by looking at how and why an increasing number of private actors beyond private military and/or security companies (PMSCs) have come to perform various security related functions. While PMSCs produce security for profit, most other private sector actors make profit by selling goods and services that were originally not connected with security in the traditional understanding of the term. However, due to the continuous introduction of new legal and technical regulations by public authorities, many non- security related private businesses nowadays have to perform at least some security functions. Little research, however, has been done thus far, both in terms of security practices of non- security related private businesses and their impact on security governance. This introduction explains how this special issue contributes to closing this glaring gap by 1) extending the conceptual and theoretical arguments in the existing body of literature; and 2) offering a range of original case studies on the specific roles of non- security related private companies of all sizes, areas of businesses, and geographic origin.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ao longo dos anos a Internet tornou-se uma ferramenta fundamental para a sociedade e, nos dias de hoje, é praticamente inevitável não usufruir de algumas facilidades proporcionadas pela rede mundial. Devido à sua massificação nos últimos anos, os endereços de IP disponíveis esgotaram-se, pelo que tornou-se necessário a elaboração de uma nova versão do protocolo comunicação, utilizado para suportar todas as comunicações na Internet, o Internet Protocol, versão 6 (IPv6). Apesar da ampla utilização da Internet, a maioria dos seus utilizadores está completamente alheia às questões de segurança, estando por isso exposta a uma diversidade de perigos. O aumento da segurança é também uma das principais missões do IPv6, tendo-se introduzido alguns mecanismos de segurança relevantes. Este trabalho tem como objetivo estudar o IPv6, focando-se especialmente em questões relacionadas com os mecanismos de transição do IPv4 para IPv6 e em aspetos de segurança. Proporcionando uma abordagem teórica ao protocolo e aos conceitos de segurança, este documento apresenta também uma perspetiva mais técnica da implementação do IPv6, pretendendo ser um manual de apoio aos responsáveis pela implementação da versão 6 do IP. Os três métodos de transição, que permitem a atualização do IPv4 para IPv6, são analisados de forma a apoiar a equipa na tomada de decisão sobre qual (ou quais) os métodos de transição a utilizar. Uma parte substancial do trabalho foi dedicada à seleção e estudo de vulnerabilidades que se encontram presentes no IPv6, a forma como são exploradas por parte do atacante, a forma como podem ser classificadas e os processos que diminuem o risco de exposição a essas mesmas vulnerabilidades. Um conjunto de boas práticas na administração da segurança de redes é também apresentada, para melhorar a garantia de que problemas conhecidos não possam ser explorados por utilizadores mal intencionados.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La presente monografía busca explicar el proceso de securitización realizado por la AOSIS del cambio climático en las COP de la CMNUCC. Esta investigación defiende que la AOSIS sí ha hecho dicho proceso a través de estrategias como el liderazgo moral y los nexos con actores no-estatales; pero dicho proceso no ha sido exitoso, dado el predominio del discurso del desarrollo sostenible en las negociaciones, el debilitamiento de la AOSIS como actor securitizador y el poco apoyo formal de las potencias emergentes y el bloque UMBRELLA. Para sustentar lo anterior, se realizará una revisión de informes científicos que demuestran que el cambio climático es una amenaza a la seguridad, y un estudio desde de la teoría de securitización de Thierry Balzacq, de los discursos dados por los estados AOSIS, de las COP y de las posiciones de algunos bloques de negociación sobre el cambio climático.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Having in mind that petroleum's history presents a huge growth, the exploration and production areas have been receiving lots of investments, in order to attend the increasing demand for gas and petroleum. Looking through that scenario, new technologies have been evolving in favor of discovering new natural petroleum deposits and act with effectiveness in truly deep waters without giving up the worldwide best operational security practices. The use of rigid pipes in marine installations have been rising quickly and, thanks to this reality, the many storage and pipe launching forms became study objects and are getting improved. The analysis of steel API X70 characteristics, proving that they are suitable for use in pipes developed to transport gas and petroleum is the theme of this presentation. A tensile test was conducted to determine the base metal's mechanical properties, draining's tension, traction's resistance, elasticity's modulus and maximum tension. An aspect that is concerning too is the metallographic analysis, in order to determine the studied iron's microstructure. Results of analyzes showed that the steel has high resistance, with good capacity for deformation and well defined yield point, concluding suitable for the application in question

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Having in mind that petroleum's history presents a huge growth, the exploration and production areas have been receiving lots of investments, in order to attend the increasing demand for gas and petroleum. Looking through that scenario, new technologies have been evolving in favor of discovering new natural petroleum deposits and act with effectiveness in truly deep waters without giving up the worldwide best operational security practices. The use of rigid pipes in marine installations have been rising quickly and, thanks to this reality, the many storage and pipe launching forms became study objects and are getting improved. The analysis of steel API X70 characteristics, proving that they are suitable for use in pipes developed to transport gas and petroleum is the theme of this presentation. A tensile test was conducted to determine the base metal's mechanical properties, draining's tension, traction's resistance, elasticity's modulus and maximum tension. An aspect that is concerning too is the metallographic analysis, in order to determine the studied iron's microstructure. Results of analyzes showed that the steel has high resistance, with good capacity for deformation and well defined yield point, concluding suitable for the application in question

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The focus of this dissertation is the relationship between the necessity for protection and the construction of cultural identities. In particular, by cultural identities I mean the representation and construction of communities: national communities, religious communities or local communities. By protection I mean the need for individuals and groups to be reassured about dangers and risks. From an anthropological point of view, the relationship between the need for protection and the formation and construction of collective identities is driven by the defensive function of culture. This was recognized explicitly by Claude Lévi-Strauss and Jurij Lotman. To explore the “protective hypothesis,” it was especially useful to compare the immunitarian paradigm, proposed by Roberto Esposito, with a semiotic approach to the problem. According to Esposito, immunity traces borders, dividing Community from what should be kept outside: the enemies, dangers and chaos, and, in general, whatever is perceived to be a threat to collective and individual life. I recognized two dimensions in the concept of immunity. The first is the logic dimension: every element of a system makes sense because of the network of differential relations in which it is inscribed; the second dimension is the social praxis of division and definition of who. We are (or what is inside the border), and who They are (or what is, and must be kept, outside the border). I tested my hypothesis by analyzing two subject areas in particular: first, the security practices in London after 9/11 and 7/7; and, second, the Spiritual Guide of 9/11 suicide bombers. In both cases, one observes the construction of two entities: We and They. The difference between the two cases is their “model of the world”: in the London case, one finds the political paradigms of security as Sovereignty, Governamentality and Biopolitics. In the Spiritual Guide, one observes a religious model of the Community of God confronting the Community of Evil. From a semiotic point view, the problem is the origin of respective values, the origin of respective moral universes, and the construction of authority. In both cases, I found that emotional dynamics are crucial in the process of forming collective identities and in the process of motivating the involved subjects: specifically, the role of fear and terror is the primary factor, and represents the principal focus of my research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Travail dirigé présenté à la Faculté des études supérieures en vue de l’obtention du grade de maître ès sciences (M.Sc.) en criminologie option sécurité intérieure

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Travail dirigé présenté à la Faculté des études supérieures en vue de l’obtention du grade de maître ès sciences (M.Sc.) en criminologie option sécurité intérieure

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper was prepared as a ILEC Policy Brief for discussion at the final conference of the project on Involuntary Loss of European Citizenship: Exchanging Knowledge and Identifying Guidelines for Europe, 11-12 December 2014. Co-funded by the European Commission’s DG for Justice, Citizenship and Fundamental Rights, the ILEC project has aimed to establish a framework for debate on international norms on involuntary loss of nationality. For more information visit: www.ilecproject.eu.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper was prepared as a Policy Brief for discussion at the final conference of the project on Involuntary Loss of European Citizenship: Exchanging Knowledge and Identifying Guidelines for Europe, 11-12 December 2014. Co-funded by the European Commission’s DG for Justice, Citizenship and Fundamental Rights, the ILEC project has aimed to establish a framework for debate on international norms on involuntary loss of nationality. For more information visit: www.ilecproject.eu.