54,216 research outputs found

    Securing By Design

    Get PDF
    This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward 'securing by design' and the policy agendas it produces of 'designing out insecurity' and 'designing in protection' because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate 'security solutions' to readymade 'security problems'. This critique leads us to propose a new research agenda we call Redesigning Security. A Redesigning Security Approach begins from a recognition that the achievement of security is more often than not illusive, which means that the desire for security is itself problematic. Rather than encouraging the design of 'security solutions' a securing by design a Redesigning Security Approach explores how we might insecure securing by design. By acknowledging and then moving beyond the new security studies insight that security often produces insecurity, our approach uses design as a vehicle through which to raise questions about security problems and security solutions by collaborating with political and critical design practitioners to design concrete material objects that themselves embody questions about traditional security and about traditional design practices that use technology to depoliticise how technology is deployed by states and corporations to make us 'safe'

    The Internet of Hackable Things

    Get PDF
    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education

    Perspectives of Integrated “Next Industrial Revolution” Clusters in Poland and Siberia

    Get PDF
    Rozdział z: Functioning of the Local Production Systems in Central and Eastern European Countries and Siberia. Case Studies and Comparative Studies, ed. Mariusz E. Sokołowicz.The paper presents the mapping of potential next industrial revolution clusters in Poland and Siberia. Deindustrialization of the cities and struggles with its consequences are one of the fundamental economic problems in current global economy. Some hope to find an answer to that problem is associated with the idea of next industrial revolution and reindustrialization initiatives. In the paper, projects aimed at developing next industrial revolution clusters are analyzed. The objective of the research was to examine new industrial revolution paradigm as a platform for establishing university-based trans-border industry clusters in Poland and Siberia47 and to raise awareness of next industry revolution initiatives.Monograph financed under a contract of execution of the international scientific project within 7th Framework Programme of the European Union, co-financed by Polish Ministry of Science and Higher Education (title: “Functioning of the Local Production Systems in the Conditions of Economic Crisis (Comparative Analysis and Benchmarking for the EU and Beyond”)). Monografia sfinansowana w oparciu o umowę o wykonanie projektu między narodowego w ramach 7. Programu Ramowego UE, współfinansowanego ze środków Ministerstwa Nauki i Szkolnictwa Wyższego (tytuł projektu: „Funkcjonowanie lokalnych systemów produkcyjnych w warunkach kryzysu gospodarczego (analiza porównawcza i benchmarking w wybranych krajach UE oraz krajach trzecich”))

    A Trip to Remember: An Airman’s View of D-Day

    Get PDF

    Keeping in Touch via Cassette: Tracing Dinka Songs from Cattle Camp to Transnational Audio-Letter

    Get PDF
    This paper explores Dinka songs as poetic autobiography, focusing in particular on their composition and circulation as audio-letters between South Sudan and the global Dinka diaspora. Drawing on current debates on mobility and belonging, the paper explores how a tradition of personal song making, which is rooted in a culture of pastoralism and localised mobilities, has been repackaged to accommodate population dispersal across continents and cultures. While ‘big’ mobilities (transacted by civil war) have caused Dinka societies to expand and grow, the paper considers how audio-letters simultaneously bring clan groups together through a combination of old cultural forms and new geographies and concerns. Through the analysis of two Dinka Bor songs, the paper explores how the immediacy and potency inflected in the sonic and poetic convention of the genre nourishes Dinka social and spatial relations and helps to define and redefine their pasts and futures. It concludes with a reflection on the ‘affiliative power’ (Suchman 2005) of the cassette, which, despite increasing access to digital technologies, has remained the song carrier of choice, and has thus become implicated in the complexity of connections, identifications and intimacies of this contemporary global cultural practice

    Opportunities and challenges posed by disruptive and converging information technologies for Australia\u27s future defence capabilities: A horizon scan

    Get PDF
    Introduction: The research project\u27s objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific\u27s competitive landscape. Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding of the interdisciplinary nature of defence technologies, identifying key areas for further exploration. The subsequent survey study, engaging 415 professionals and six experts across STEM, law enforcement, and ICT, aimed to assess the impact, deployment likelihood, and developmental timelines of the identified technologies. Findings: Key findings revealed significant overlaps in technology clusters, highlighting 11 specific technologies or trends as potential force multipliers for the ADF. Among these, Cyber and AI technologies were recognised for their immediate potential and urgency, suggesting a prioritisation for development investment. The analysis presented a clear imperative for urgent and prioritised technological investments, specifically in Cyber and AI technologies, followed by IoT/IoBT and autonomous systems technologies. The recommended strategic focus entails enhancing cyber security of critical infrastructure, optimising network communications, and harnessing smart sensors, among others. Implications: To maintain a competitive edge, the ADF and the Australian government must commit to significant investments in these priority technologies. This involves not only advancing the technological frontier but also fostering a flexible, innovation-friendly environment conducive to leveraging non-linear opportunities in technology innovation. Such an approach requires a concerted effort from both public and private sectors to invest resources effectively, ensuring the ADF\u27s adaptability and strategic overmatch in a rapidly changing technological landscape. Conclusion: Ultimately, this research illuminates the path forward for the ADF and Defence at large, highlighting the need for strategic investments in emerging technologies. By identifying strategic gaps, potential alliances, and sovereign technologies of high potential, this report serves as a blueprint for enhancing Australia\u27s defence capabilities and securing its strategic interests in the face of global technological shifts
    corecore