325,859 research outputs found
The discourse of Olympic security 2012 : London 2012
This paper uses a combination of CDA and CL to investigate the discursive realization of the security operation for the 2012 London Olympic Games. Drawing on Didier Bigoâs (2008) conceptualisation of the âbanopticonâ, it address two questions: what distinctive
linguistic features are used in documents relating to security for London 2012; and, how is Olympic security realized as a discursive practice in these documents? Findings suggest that the documents indeed realized key banoptic features of the banopticon: exceptionalism, exclusion and prediction, as well as what we call âpedagogisationâ. Claims were made for the
exceptional scale of the Olympic events; predictive technologies were proposed to assess the
threat from terrorism; and documentary evidence suggests that access to Olympic venues
was being constituted to resemble transit through national boundarie
Model-Based Security Testing
Security testing aims at validating software system requirements related to
security properties like confidentiality, integrity, authentication,
authorization, availability, and non-repudiation. Although security testing
techniques are available for many years, there has been little approaches that
allow for specification of test cases at a higher level of abstraction, for
enabling guidance on test identification and specification as well as for
automated test generation.
Model-based security testing (MBST) is a relatively new field and especially
dedicated to the systematic and efficient specification and documentation of
security test objectives, security test cases and test suites, as well as to
their automated or semi-automated generation. In particular, the combination of
security modelling and test generation approaches is still a challenge in
research and of high interest for industrial applications. MBST includes e.g.
security functional testing, model-based fuzzing, risk- and threat-oriented
testing, and the usage of security test patterns. This paper provides a survey
on MBST techniques and the related models as well as samples of new methods and
tools that are under development in the European ITEA2-project DIAMONDS.Comment: In Proceedings MBT 2012, arXiv:1202.582
Why did Greece block the Euro-Atlantic integration of the Former Yugoslav Republic of Macedonia?: an analysis of Greek foreign policy behaviour shifts
This essay analyses shifts in Greek foreign policy behaviour with regard to the Former Yugoslav Republic of Macedonia from the early 1990s to the late 2000s, with a particular emphasis on the 2008 NATO Bucharest Summit. In this paper, I attempt to provide an understanding of foreign policy decisions that examines the interplay of all the international, domestic and individual levels of analysis. Two parallel analyses take place: first, a historical analysis, showing how international threats/opportunities and domestic variables shape the strategic adjustments of the Greek Foreign Policy Executives (FPE); secondly, an intuitive analysis of the rationale behind the âGreek blockingâ based on the role of âpermeableâ perceptions of Greeks on security, (negotiating) power and national interest
Reducing Biological Risks to Security: International Policy Recommendations for the Obama Administration
Summarizes discussions among biotechnology and life sciences experts on the risks of bioterrorism and threats to public health and agriculture. Assesses current efforts and makes recommendations for strengthening global prevention and response measures
From Drug War to Culture War: Russiaâs Growing Role in the Global Drug Debate
No abstract available
Recommended from our members
Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
Inter-vulnerability of financial institutions and households in the system of national financial security assessment
Purpose: The aim of this article is to study the concept of financial institutions and households' interrelation of vulnerabilities to the risk of money laundering and the integration of this concept into the methodology of a national ML/TF (Money Laundering and Terrorist Financing) risk assessment.
Design/Methodology/Approach: At the theoretical and methodological levels, authors utilized a risk-based approach, which involves the separation of the object of study in risk levels and its impact on each risk level. At the methodological and analytical levels, authors utilized methods of grouping, descriptive analysis, comparison, synthesis, and graphic visualization of data.
Findings: The most significant scientific results obtained in the course of the study include: proprietary algorithm for calculating the intensity coefficient of threats to national financial security, which practical approval on data of 27 countries allowed determining the structure of threats to financial security in the international landscape in the period 2013-2018; originally developed questionnaire on the assessment of the risks of deviations in the financial behavior of households and individuals.
Originality/Value: The key findings are targeted at their widespread application in assessing money laundering risks at the national and international levels, in developing strategic documents on the development of systems to fight money laundering and terrorist financing. The methodology for identifying the propensity to deviations of financial behavior, based on a questionnaire survey, could serve as the basis for developing scoring systems.The research was supported by Russian Foundation for Basic Research # 18-010-00657.peer-reviewe
- âŚ