247,055 research outputs found

    ć›œé™…ć…łçł»ć‘ć±•äž­ćź‰ć…šć†…æ¶”çš„æŒ”ć˜

    Full text link
    This paper focuses on the origin of insecurity, safety and security of the content of the evolution of the concept of traditional security policy with the new security concept.The authors suggest that the contents of security and international relations with the social and historical development of evolving, evolve the main driving force of social progress of productive forces.In different historical periods, most representative of the level of productivity of the things often become the most valuable part of security.Compared with the past, modern security has the following characteristics: the scope of security beyond the region, for the first time the world has meaning; army in modern times to become the country\u27s &quot;principal basis&quot;; to the ideology of nationalism as factors in the country on behalf of security policies and practices play a special role.But national security has an important strategic value of the field is not a qualitative change.Mid-century, the world entered the post-industrial society or information age, the concept of security from the content and form are undergoing a profound transformation.Economic, technological and other factors<br /

    Of Relevance and Reform Under Section 215

    Get PDF

    The evolution of the European Union's 'fight against terrorism' discourse: constructing the terrorist 'other'

    Get PDF
    The purpose of this article is to explore the ways in which the EU’s counter-terrorism discourse, the 'fight against terrorism', is constructed, and the ways in which it functions both rhetorically and in practice. It argues that that 'EU identity' is constituted through and is central to the constitution of EU counter-terrorism policy. The approach taken is constructivist in nature drawing on a discourse analysis of primarily European Council policy documents, as well as the reports and speeches of the EU Counter-Terrorism Co-ordinator. In particular, it identifies three strands of the discourse that it is argued play a key role in the construction of a terrorist 'other'. These three strands include: terrorism as crime and as an emotive act of violence; terrorism as an act perpetrated solely by non-state actors; and terrorism as a 'new' and 'evolving' threat. The article proceeds in three steps. First, it outlines the theoretical considerations that underpin this research, including its empirical application. Second, it demonstrates how each strand of the discourse is constructed. Third, it discusses the functioning of the discourse, including the contested nature of the 'terrorism knowledge' that underpins the EU's counter-terrorism approach. The article concludes by reflecting on what this case study contributes to our understanding of EU counter-terrorism policy, as well as explaining how the notion of the terrorist 'other' could provide the basis for a future research agenda that deepens our understanding of how the identity of the EU is constituted

    Principle 6: participation

    Get PDF
    Innovating for child participation in a digital world means creating opportunities for children to form opinions, impart and receive diverse information, and freely join social and political activities. Although these are sometimes overlooked or sacrificed for safety reasons, children’s civil rights and freedoms are vital for their participation in a digital society, no less than for adults. The principle of participation draws together multiple rights:1 ‱ Freedom of expression, including the right to free speech, opinions and political views: both for themselves and to engage with those of others, subject to the rights of others, national security and public order. ‱ Freedom of thought: the ability to form one’s own opinion, decisions and choice of faith, and have this respected and supported, proportionate to the child’s evolving capacities, and not be manipulated, nudged or punished. ‱ Freedom of association and peaceful assembly: the ability to participate freely and safely in social and political activities, including child-led activism, without surveillance or undue restrictions. ‱ Information access: meaning that children can both access and contribute to content of all kinds; this should be easy to find, in their native language, from a plurality of sources, and be beneficial in multiple ways; any restrictions should be transparent and in children’s best interests

    Patterns of information security postures for socio-technical systems and systems-of-systems

    Get PDF
    This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems. Such systems typically span many organisational boundaries, integrating multiple computer systems, infrastructures and organisational processes. The paper describes the motivation for the proposed work, and our approach to the development, specification, integration and validation of security patterns for socio-technical and system-of-system scale systems

    The Missing Link: An Introduction to Web Development and Programming

    Get PDF
    Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and standards. Navigating a project from concept to completion often requires more than mastery of one or two complementing languages, meaning today’s developers need both breadth, and depth, of knowledge to be effective. This text provides the developer with an understanding of the various elements of web development by focusing on the concepts and fundamentals through the examples within, providing a foundation that allows easier transition to other languages and a better understanding of how to approach their work. The reader will be introduced to topics in a manner that follows most project development methods, from initial conceptualization and design through front end development, back end development, and introducing additional concepts like accessibility and security, while focusing on responsive design techniques. Each section of the text includes opportunities to practice the material and assess increased knowledge after examining the topics.https://knightscholar.geneseo.edu/oer-ost/1016/thumbnail.jp

    Moving Beyond “Reasonable”: Clarifying the FTC’s Use of Its Unfairness Authority in Data Security Enforcement Actions

    Get PDF
    Data security breaches, which compromise private consumer information, seem to be an ever-increasing threat. To stem this tide, the Federal Trade Commission (FTC) has relied upon its authority to enforce the prohibition against unfair business practices under section 5 of the Federal Trade Commission Act (“section 5”) to hold companies accountable when they fail to employ data security measures that could prevent breaches. Specifically, the FTC brings enforcement actions when it finds that companies have failed to implement “reasonable” data security measures. However, companies and scholars argue that the FTC has not provided adequate notice of which data security practices it considers “reasonable” for the purposes of section 5. This Note explains and critically analyzes several existing proposals that seek to bring clarity to the FTC’s application of its unfairness authority in the data security context and ultimately proposes a novel solution which encourages the FTC explicitly to outline its minimum data security requirements through nonlegislative rulemaking. This Note contends that the FTC should incorporate a principle of proportionality in any rule to ensure that companies know which data security measures they should implement based on the relative sensitivity of the consumer data that they retain. Additionally, this Note suggests that the FTC should incorporate a safe harbor provision so that compliant companies know that, by following the FTC’s guidelines, they will be immune from section 5 enforcement actions
    • 

    corecore