2,073 research outputs found
Rethinking Grand Strategy for an Era of Climate Change
The strategic security environment has changed drastically over the last decade, with the passing of the American unipolar moment leading to the beginnings of a new era of strategic inter-state competition. However, unlike past eras of competition, this iteration will see states compete within an increasingly destabilized climate system because of climate change. This thesis explores how the impacts of climate change will shape the upcoming era of competition, focusing on its effects on grand strategy, given the latter’s important role as a ‘bridge’ that links the means and ways of a state to its ends. In particular, the central question addressed by this thesis is as follows: Do the observed global environmental changes because of climate change necessitate the broadening of the geographic understanding of grand strategy? This thesis argues that climate change has and will continue to impact the conduct of strategy in the future. It also argues that climate change must be explicitly incorporated into modern understandings of grand strategy given its ability to undermine the economic underpinnings of states that enable the pursuit of their goals in a feasible and sustainable manner. In making this argument, this thesis develops a conceptual framework linking climate change through to the implementation of grand strategy, using the case of the 2022 Pakistani floods as a demonstrative case study to show how climate change can generate significant impacts on the grand strategies of states
LIPIcs, Volume 251, ITCS 2023, Complete Volume
LIPIcs, Volume 251, ITCS 2023, Complete Volum
Recommended from our members
Presidential Administration: An Intellectual and Legal History, 1888-1938
This dissertation explores the intellectual and legal history of presidential administration — that is, the president’s ability to direct the operations of the administrative state. The dissertation argues that presidential administration was closely connected to changing ideas about how to realize democratic government. It shows how, in the late 19th and early 20th century, the presidency acquired the institutions that lay the foundations for executive control of administration. This was a deliberate reform project, driven by ideas about what would make government responsible.
The dissertation tells this story by tracking transformations in democratic thought and law through attention to court cases and scholarship, among other genres, and looks at both published and archival sources. It draws on methods from legal history, intellectual history, and American Political Development, and occasionally makes use of an Atlantic perspective. Besides historians, law professors, and political scientists, it may be of interest to scholars of the presidency, public administration, and analysts of current legal debates about presidential power and administration
Towards trustworthy computing on untrustworthy hardware
Historically, hardware was thought to be inherently secure and trusted due to its
obscurity and the isolated nature of its design and manufacturing. In the last two
decades, however, hardware trust and security have emerged as pressing issues.
Modern day hardware is surrounded by threats manifested mainly in undesired
modifications by untrusted parties in its supply chain, unauthorized and pirated
selling, injected faults, and system and microarchitectural level attacks. These threats,
if realized, are expected to push hardware to abnormal and unexpected behaviour
causing real-life damage and significantly undermining our trust in the electronic and
computing systems we use in our daily lives and in safety critical applications. A
large number of detective and preventive countermeasures have been proposed in
literature. It is a fact, however, that our knowledge of potential consequences to
real-life threats to hardware trust is lacking given the limited number of real-life
reports and the plethora of ways in which hardware trust could be undermined. With
this in mind, run-time monitoring of hardware combined with active mitigation of
attacks, referred to as trustworthy computing on untrustworthy hardware, is proposed
as the last line of defence. This last line of defence allows us to face the issue of live
hardware mistrust rather than turning a blind eye to it or being helpless once it occurs.
This thesis proposes three different frameworks towards trustworthy computing
on untrustworthy hardware. The presented frameworks are adaptable to different
applications, independent of the design of the monitored elements, based on
autonomous security elements, and are computationally lightweight. The first
framework is concerned with explicit violations and breaches of trust at run-time,
with an untrustworthy on-chip communication interconnect presented as a potential
offender. The framework is based on the guiding principles of component guarding,
data tagging, and event verification. The second framework targets hardware elements
with inherently variable and unpredictable operational latency and proposes a
machine-learning based characterization of these latencies to infer undesired latency
extensions or denial of service attacks. The framework is implemented on a DDR3
DRAM after showing its vulnerability to obscured latency extension attacks. The
third framework studies the possibility of the deployment of untrustworthy hardware
elements in the analog front end, and the consequent integrity issues that might arise
at the analog-digital boundary of system on chips. The framework uses machine
learning methods and the unique temporal and arithmetic features of signals at this
boundary to monitor their integrity and assess their trust level
The European Experience: A Multi-Perspective History of Modern Europe, 1500–2000
The European Experience brings together the expertise of nearly a hundred historians from eight European universities to internationalise and diversify the study of modern European history, exploring a grand sweep of time from 1500 to 2000. Offering a valuable corrective to the Anglocentric narratives of previous English-language textbooks, scholars from all over Europe have pooled their knowledge on comparative themes such as identities, cultural encounters, power and citizenship, and economic development to reflect the complexity and heterogeneous nature of the European experience. Rather than another grand narrative, the international author teams offer a multifaceted and rich perspective on the history of the continent of the past 500 years. Each major theme is dissected through three chronological sub-chapters, revealing how major social, political and historical trends manifested themselves in different European settings during the early modern (1500–1800), modern (1800–1900) and contemporary period (1900–2000). This resource is of utmost relevance to today’s history students in the light of ongoing internationalisation strategies for higher education curricula, as it delivers one of the first multi-perspective and truly ‘European’ analyses of the continent’s past. Beyond the provision of historical content, this textbook equips students with the intellectual tools to interrogate prevailing accounts of European history, and enables them to seek out additional perspectives in a bid to further enrich the discipline
Meditative textual practices in England, 1661 – 1678
This thesis examines late seventeenth-century meditation as a textual practice in manuscript and print. It considers textual meditations, prayers, scriptural paraphrases, letters, memoirs, and verse, which appear in miscellanies in the period of the Cavalier Parliament, 1661 – 1678. It argues that texts were essential to meditative practice, and these texts were composed either for the practitioner or with distinct readerships in mind. Therefore the project examines the complex and shifting triad of writer, reader, and text in each instance. In addition, it shows how notions of completion, privacy, publication, literariness, and singular authorship are not fully compatible with the iterativity of the textual practices associated with meditation.
The study considers five meditative writers, found across social and confessional spectra: Katherine Austen, John Flavel, Elizabeth Delaval, Susanna Hopton, and Thomas Traherne. Each writer collates and composes texts – originated by themselves and others – into their miscellanies; and – often over long periods of time – edits, amends, or repurposes these texts according to individual circumstance. The writers deploy diverse devotional practices and textual genres including emblem, romantic fiction, and essay. Each chapter shows how differently these writers realise the general pattern described by the thesis
The thesis offers a new appreciation of the diversity of meditative practices and the textual practices associated with them. It challenges earlier perceptions of meditation as an isolated, private, devotional practice, and of meditative texts as a separate literary product of meditative thought. The thesis describes meditation as a textual habit of thought, and a rich source of knowledge, which underpinned, theological, mercantile, social, and philosophical thought. In addition, the thesis demonstrates the value of interpreting meditative texts in their material, textual, biographical, and cultural contexts, and offers a reassessment of the critical and contemporary values placed on verse and prose forms in devotional writing
Data ethics : building trust : how digital technologies can serve humanity
Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century:
For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car,
from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad,
for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world?
How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations
in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication.
The authors and institutions come from all continents.
The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust!
The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors
- …