179,473 research outputs found

    Escaping from American intelligence : culture, ethnocentrism and the Anglosphere

    Get PDF
    The United States and its closest allies now spend over $100 billion a year on intelligence. Ten years after 9/11, the intelligence machine is certainly bigger - but not necessarily better. American intelligence continues to privilege old-fashioned strategic analysis for policy-makers and exhibits a technocratic approach to asymmetric security threats, epitomized by the accelerated use of drone strikes and data-mining. Distinguished commentators have focused on the panacea of top-down reform, while politicians and practitioners have created entire new agencies. However these prescriptions for change remain conceptually limited because of underlying Anglo-Saxon presumptions about what intelligence is. Although intelligence is a global business, when we talk about intelligence we tend to use a vocabulary that is narrowly derived from the experiences of America and its English-speaking nebula. This article deploys the notion of strategic culture to explain this why this is. It then explores the cases of China and South Africa to suggest how we might begin to rethink our intelligence communities and their tasks. It argues that the road to success is about individuals, attitudes and cultures rather than organizations. Future improvement will depend on our ability to recognize the changing nature of the security environment and to practice the art of ‘intelligence among the people’. While the United States remains the world’s most significant military power, its strategic culture is unsuited to this new terrain and arguably other countries do these things rather better

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    The Internet of Things Will Thrive by 2025

    Get PDF
    This report is the latest research report in a sustained effort throughout 2014 by the Pew Research Center Internet Project to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-LeeThis current report is an analysis of opinions about the likely expansion of the Internet of Things (sometimes called the Cloud of Things), a catchall phrase for the array of devices, appliances, vehicles, wearable material, and sensor-laden parts of the environment that connect to each other and feed data back and forth. It covers the over 1,600 responses that were offered specifically about our question about where the Internet of Things would stand by the year 2025. The report is the next in a series of eight Pew Research and Elon University analyses to be issued this year in which experts will share their expectations about the future of such things as privacy, cybersecurity, and net neutrality. It includes some of the best and most provocative of the predictions survey respondents made when specifically asked to share their views about the evolution of embedded and wearable computing and the Internet of Things

    Technology, governance, and a sustainability model for small and medium-sized towns in Europe

    Get PDF
    New and cutting-edge technologies causing deep changes in societies, playing the role of game modifiers, and having a significant impact on global markets in small and medium-sized towns in Europe (SMSTEs) are the focus of this research. In this context, an analysis was carried out to identify the main dimensions of a model for promoting innovation in SMSTEs. The literature review on the main dimensions boosting the innovation in SMSTEs and the methodological approach was the application of a survey directed to experts on this issue. The findings from the literature review reflect that technologies, governance, and sustainability dimensions are enablers of SMSTEs’ innovation, and based on the results of the survey, a model was implemented to boost innovation, being this the major add-on of this research.info:eu-repo/semantics/publishedVersio

    Designing and Operating Safe and Secure Transit Systems: Assessing Current Practices in the United States and Abroad, MTI Report 04-05

    Get PDF
    Public transit systems around the world have for decades served as a principal venue for terrorist acts. Today, transit security is widely viewed as an important public policy issue and is a high priority at most large transit systems and at smaller systems operating in large metropolitan areas. Research on transit security in the United States has mushroomed since 9/11; this study is part of that new wave of research. This study contributes to our understanding of transit security by (1) reviewing and synthesizing nearly all previously published research on transit terrorism; (2) conducting detailed case studies of transit systems in London, Madrid, New York, Paris, Tokyo, and Washington, D.C.; (3) interviewing federal officials here in the United States responsible for overseeing transit security and transit industry representatives both here and abroad to learn about efforts to coordinate and finance transit security planning; and (4) surveying 113 of the largest transit operators in the United States. Our major findings include: (1) the threat of transit terrorism is probably not universal—most major attacks in the developed world have been on the largest systems in the largest cities; (2) this asymmetry of risk does not square with fiscal politics that seek to spread security funding among many jurisdictions; (3) transit managers are struggling to balance the costs and (uncertain) benefits of increased security against the costs and (certain) benefits of attracting passengers; (4) coordination and cooperation between security and transit agencies is improving, but far from complete; (5) enlisting passengers in surveillance has benefits, but fearful passengers may stop using public transit; (6) the role of crime prevention through environmental design in security planning is waxing; and (7) given the uncertain effectiveness of antitransit terrorism efforts, the most tangible benefits of increased attention to and spending on transit security may be a reduction in transit-related person and property crimes

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    New Trends in Development of Services in the Modern Economy

    Get PDF
    The services sector strategic development unites a multitude of economic and managerial aspects and is one of the most important problems of economic management. Many researches devoted to this industry study are available. Most of them are performed in the traditional aspect of the voluminous calendar approach to strategic management, characteristic of the national scientific school. Such an approach seems archaic, forming false strategic benchmarks. The services sector is of special scientific interest in this context due to the fact that the social production structure to the services development model attraction in many countries suggests transition to postindustrial economy type where the services sector is a system-supporting sector of the economy. Actively influencing the economy, the services sector in the developed countries dominates in the GDP formation, primary capital accumulation, labor, households final consumption and, finally, citizens comfort of living. However, a clear understanding of the services sector as a hyper-sector permeating all spheres of human activity has not yet been fully developed, although interest in this issue continues to grow among many authors. Target of strategic management of the industry development setting requires substantive content and the services sector target value assessment

    New Labour: A Witness History

    Get PDF
    This article is the edited transcript of a witness history seminar which brought together high profile ‘insiders’ and ‘outside’ academic commentators to reflect critically on New Labour’s governance of Britain, 1997-2010. The contributions cover major areas of government activity, notably the economy, industrial policy, social justice, energy policy, ‘Europe’, military intervention, the use of intelligence and government decision-making. In their respective area of expertise, the contributors investigate the Conservative legacy seen through the eyes of New Labour people, the policies New Labour under Tony Blair and Gordon Brown tried to put in place, what changes these policies were intended to bring about and, finally, what the overall balance sheet of achievements was. The concluding section draws out the key domestic and foreign policy lessons learned during the New Labour years. The article presents a fascinating collection of findings that will be hugely relevant to Ed Miliband’s Labour Party as it gears up for the 2015 general election and after
    • 

    corecore