1,799,737 research outputs found

    EU SUGGESTED BEST PRACTICE DOCUMENT: CRITICAL ANALYSIS AND POLICY RECOMMENDATIONS FOR EU-WIDE HATE CRIME LAWS

    Get PDF
    This document subjects the various EU hate crime provisions to critical policy analysis, weighing up their pros and cons, and defending aspects of them from inappropriate forms of critique, and then draws some policy conclusions based on a sense of best practice. The aim of identifying best practice is to generate reform suggestions in the form of detailed model legislation. This is contained in the final section of this document. A key point considered is the narrow definition of protected groups under current EU measures. The restrictions to racist forms of hate crime and genocide denial contained in the Framework Decision is not central to the political and constitutional cultures of all member states. Indeed, it has not prevented the criminal law implementation measures of some EU Member States from including a number of other grounds, such as disability, anti-Semitism, or sexual orientation. Certain EU bodies have even encouraged this expansive approach to national implementation, with the FRA stating: ‘In the spirit of non-discrimination, it is certainly preferable to widen criminal law provisions to include equally all grounds of discrimination covered by Article 14 of the ECHR or Article 21 of the Charter of Fundamental Rights of the European Union.’ This criticism would, in practice, suggest a need for Members State supplementing these categories with one of more the following: gender, social origin, genetic features, language, political or any other opinion, membership of a national minority, birth, property or other status, disability, age or sexual orientation. Whilst supporting an expansion of the range of groups covered, the following paragraphs issue a cautionary warning against a massive extension to cover all these groups on grounds of both principle and practical consequences

    How Does the European Union Talk about Migrant Women and Religion? A Critical Discourse Analysis of the Agenda on Migration of the European Union and the Case Study of Nigerian Women

    Get PDF
    Women with different identity and migration origins represent one of the most significant groups in the migration flows of the Mediterranean in recent years and the intersection of their religious identity and gender has been often neglected in migration policies. The paper applies the method of Critical Frame Analysis (CFA) to analyze the ways in which European policy documents address the intersection between gender and religious diversity. Through the CFA, the article examines the European Agenda on Migration and the priorities identified in the text. The analysis of the document is based on recent case studies of trafficked Nigerian women, which provide examples of the dangerous invisibility of ethnic and religious women in the priorities highlighted in the policy document of the European Commission. The CFA results show that the European Agenda on Migration, in responding to the increased number of arriving migrants from Africa and in designing a new approach towards mixed migration flows, lacks any reference to the gender perspective of migration and gender mainstreaming is missing from the text. The neutrality of the document and the securitization frame applied does not take into perspective the importance of recognizing a gender and intersectional dimension of migration flows, which impacts primarily women coming from African countries beholding strong religious beliefs

    CBR and MBR techniques: review for an application in the emergencies domain

    Get PDF
    The purpose of this document is to provide an in-depth analysis of current reasoning engine practice and the integration strategies of Case Based Reasoning and Model Based Reasoning that will be used in the design and development of the RIMSAT system. RIMSAT (Remote Intelligent Management Support and Training) is a European Commission funded project designed to: a.. Provide an innovative, 'intelligent', knowledge based solution aimed at improving the quality of critical decisions b.. Enhance the competencies and responsiveness of individuals and organisations involved in highly complex, safety critical incidents - irrespective of their location. In other words, RIMSAT aims to design and implement a decision support system that using Case Base Reasoning as well as Model Base Reasoning technology is applied in the management of emergency situations. This document is part of a deliverable for RIMSAT project, and although it has been done in close contact with the requirements of the project, it provides an overview wide enough for providing a state of the art in integration strategies between CBR and MBR technologies.Postprint (published version

    Using protocol analysis to explore the creative requirements engineering process

    Full text link
    Protocol analysis is an empirical method applied by researchers in cognitive psychology and behavioural analysis. Protocol analysis can be used to collect, document and analyse thought processes by an individual problem solver. In general, research subjects are asked to think aloud when performing a given task. Their verbal reports are transcribed and represent a sequence of their thoughts and cognitive activities. These verbal reports are analysed to identify relevant segments of cognitive behaviours by the research subjects. The analysis results may be cross-examined (or validated through retrospective interviews with the research subjects). This paper offers a critical analysis of this research method, its approaches to data collection and analysis, strengths and limitations, and discusses its use in information systems research. The aim is to explore the use of protocol analysis in studying the creative requirements engineering process.<br /

    DMRG study of the Bond Alternating \textbf{S}=1/2 Heisenberg ladder with Ferro-Antiferromagnetic couplings

    Full text link
    We obtain the phase diagram in the parameter space (J/J,γ)(J'/J, \gamma) and an accurate estimate of the critical line separating the different phases. We show several measuments of the magnetization, dimerization, nearest neighbours correlation, and density of energy in the different zones of the phase diagram, as well as a measurement of the string order parameter proposed as the non vanishing phase order parameter characterizing Haldane phases. All these results will be compared in the limit J/J1J'/J\gg 1 with the behaviour of the S=1\textbf{S}=1 Bond Alternated Heisenberg Chain (BAHC). The analysis of our data supports the existence of a dimer phase separated by a critical line from a Haldane one, which has exactly the same nature as the Haldane phase in the S=1\textbf{S}=1 BAHC.Comment: Version 4. 8 pages, 15 figures (12 figures in document

    An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Full text link
    The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable. Inspired by successful prior work, in particular the work by Akhawe et al. as well as Bansal et al., in this work we propose a formal model for the web infrastructure. While unlike prior works, which aim at automatic analysis, our model so far is not directly amenable to automation, it is much more comprehensive and accurate with respect to the standards and specifications. As such, it can serve as a solid basis for the analysis of a broad range of standards and applications. As a case study and another important contribution of our work, we use our model to carry out the first rigorous analysis of the BrowserID system (a.k.a. Mozilla Persona), a recently developed complex real-world single sign-on system that employs technologies such as AJAX, cross-document messaging, and HTML5 web storage. Our analysis revealed a number of very critical flaws that could not have been captured in prior models. We propose fixes for the flaws, formally state relevant security properties, and prove that the fixed system in a setting with a so-called secondary identity provider satisfies these security properties in our model. The fixes for the most critical flaws have already been adopted by Mozilla and our findings have been rewarded by the Mozilla Security Bug Bounty Program.Comment: An abridged version appears in S&P 201

    Input variable selection in time-critical knowledge integration applications: A review, analysis, and recommendation paper

    Get PDF
    This is the post-print version of the final paper published in Advanced Engineering Informatics. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.The purpose of this research is twofold: first, to undertake a thorough appraisal of existing Input Variable Selection (IVS) methods within the context of time-critical and computation resource-limited dimensionality reduction problems; second, to demonstrate improvements to, and the application of, a recently proposed time-critical sensitivity analysis method called EventTracker to an environment science industrial use-case, i.e., sub-surface drilling. Producing time-critical accurate knowledge about the state of a system (effect) under computational and data acquisition (cause) constraints is a major challenge, especially if the knowledge required is critical to the system operation where the safety of operators or integrity of costly equipment is at stake. Understanding and interpreting, a chain of interrelated events, predicted or unpredicted, that may or may not result in a specific state of the system, is the core challenge of this research. The main objective is then to identify which set of input data signals has a significant impact on the set of system state information (i.e. output). Through a cause-effect analysis technique, the proposed technique supports the filtering of unsolicited data that can otherwise clog up the communication and computational capabilities of a standard supervisory control and data acquisition system. The paper analyzes the performance of input variable selection techniques from a series of perspectives. It then expands the categorization and assessment of sensitivity analysis methods in a structured framework that takes into account the relationship between inputs and outputs, the nature of their time series, and the computational effort required. The outcome of this analysis is that established methods have a limited suitability for use by time-critical variable selection applications. By way of a geological drilling monitoring scenario, the suitability of the proposed EventTracker Sensitivity Analysis method for use in high volume and time critical input variable selection problems is demonstrated.E

    Higgs and new physics at high energy

    Full text link
    The observation of a new particle in the search for the Standard Model (SM) Higgs boson at the LHC, reported by the ATLAS and CMS collaborations, is a milestone in the quest to understand electroweak symmetry breaking. The evidence at the level of 5 σ\sigma for a Higgs boson-like particle has been published by both experiments after a preliminary analysis of the data from the LHC Run-I. Precision measurements of the new particle are of critical importance. This document reviews the mass and spin measurement, the couplings scale factor measurements and the limits on new physics derived from these results.Comment: Presented at the 2014 Flavor Physics and CP Violation (FPCP-2014), Marseille, France, May 26-30 2014, 9 pages, 9 figure

    Getting to Grips with Critical Discourse Analysis: Shedding Light on an HE Policy Document

    Get PDF
    This paper discusses advantages of taking a Critical Discourse Analysis (CDA) approach to examine a policy document: “Born Global: implications for Higher Education” (British Academy, 2016). An adaptation of Hyatt’s (2013) CDA framework is useful for analysing the document’s linguistic features. This paper gives examples of the use of Hyatt’s categories to show that the document encapsulates a particular discourse, the justification of language learning through economic considerations. Linguistic features of the report – the choices of verbs, nouns and adjectives, use of tenses and passive voice, unheralded removal of hedging, and definite articles – all give the impression of factual evidence, whereas they disguise unresolved contradictions. CDA shows that the economic rationale in the document is tenuous

    Semantics for incident identification and resolution reports

    Get PDF
    In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from semantic deficiencies, mainly due to ambiguity or different granularity levels of description and analysis. An approach to face this problem is the use of semantic methodologies in order to provide better Knowledge Externalization from incident protocols management. In this article, we propose a method based on semantic techniques for both, analyzing and specifying (meta)security requirements on protocols used for solving security incidents. This would allow specialist getting better documentation on their intangible knowledge about them.Ministerio de Economía y Competitividad TIN2013-41086-
    corecore