325,859 research outputs found

    The discourse of Olympic security 2012 : London 2012

    Get PDF
    This paper uses a combination of CDA and CL to investigate the discursive realization of the security operation for the 2012 London Olympic Games. Drawing on Didier Bigo’s (2008) conceptualisation of the ‘banopticon’, it address two questions: what distinctive linguistic features are used in documents relating to security for London 2012; and, how is Olympic security realized as a discursive practice in these documents? Findings suggest that the documents indeed realized key banoptic features of the banopticon: exceptionalism, exclusion and prediction, as well as what we call ‘pedagogisation’. Claims were made for the exceptional scale of the Olympic events; predictive technologies were proposed to assess the threat from terrorism; and documentary evidence suggests that access to Olympic venues was being constituted to resemble transit through national boundarie

    Model-Based Security Testing

    Full text link
    Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST) is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.Comment: In Proceedings MBT 2012, arXiv:1202.582

    Why did Greece block the Euro-Atlantic integration of the Former Yugoslav Republic of Macedonia?: an analysis of Greek foreign policy behaviour shifts

    Get PDF
    This essay analyses shifts in Greek foreign policy behaviour with regard to the Former Yugoslav Republic of Macedonia from the early 1990s to the late 2000s, with a particular emphasis on the 2008 NATO Bucharest Summit. In this paper, I attempt to provide an understanding of foreign policy decisions that examines the interplay of all the international, domestic and individual levels of analysis. Two parallel analyses take place: first, a historical analysis, showing how international threats/opportunities and domestic variables shape the strategic adjustments of the Greek Foreign Policy Executives (FPE); secondly, an intuitive analysis of the rationale behind the ‘Greek blocking’ based on the role of ‘permeable’ perceptions of Greeks on security, (negotiating) power and national interest

    Reducing Biological Risks to Security: International Policy Recommendations for the Obama Administration

    Get PDF
    Summarizes discussions among biotechnology and life sciences experts on the risks of bioterrorism and threats to public health and agriculture. Assesses current efforts and makes recommendations for strengthening global prevention and response measures

    Cybersecurity Compliance and DoD Contractors

    Get PDF

    From Drug War to Culture War: Russia’s Growing Role in the Global Drug Debate

    Get PDF
    No abstract available

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc

    Inter-vulnerability of financial institutions and households in the system of national financial security assessment

    Get PDF
    Purpose: The aim of this article is to study the concept of financial institutions and households' interrelation of vulnerabilities to the risk of money laundering and the integration of this concept into the methodology of a national ML/TF (Money Laundering and Terrorist Financing) risk assessment. Design/Methodology/Approach: At the theoretical and methodological levels, authors utilized a risk-based approach, which involves the separation of the object of study in risk levels and its impact on each risk level. At the methodological and analytical levels, authors utilized methods of grouping, descriptive analysis, comparison, synthesis, and graphic visualization of data. Findings: The most significant scientific results obtained in the course of the study include: proprietary algorithm for calculating the intensity coefficient of threats to national financial security, which practical approval on data of 27 countries allowed determining the structure of threats to financial security in the international landscape in the period 2013-2018; originally developed questionnaire on the assessment of the risks of deviations in the financial behavior of households and individuals. Originality/Value: The key findings are targeted at their widespread application in assessing money laundering risks at the national and international levels, in developing strategic documents on the development of systems to fight money laundering and terrorist financing. The methodology for identifying the propensity to deviations of financial behavior, based on a questionnaire survey, could serve as the basis for developing scoring systems.The research was supported by Russian Foundation for Basic Research # 18-010-00657.peer-reviewe
    • …
    corecore