60,397 research outputs found
Not quite the 'Great Britain of the Far East': Japan's security, the US-Japan alliance and the 'war on terror' in East Asia
Japan, in responding to US expectations for support in the 'war on terror', has displayed a degree of strategic convergence on global security objectives, thus prompting policy-makers and observers to dub it the 'Great Britain of the Far East'. This article argues, however, that Japan is far from assuming this role. For Japan, the 'war on terror' serves more as a political pretext for legitimating long-planned changes in military security policy that are often only marginally related to the US's anti-terrorism agenda. Instead, Japan has focused much more on using the terror threat rationale as a means to push forward its response to the regional and traditional security challenges of North Korea and China, even if at times it attempts to depict both as 'new security challenges' or as involving elements of counterterrorism. The final conclusion is that US military hegemony may be weakened by Japan's and the Asia-Pacific's potential divergence from the US global security agenda
Approval of Citicorpās Application to Expand Data Services Activities: The Federal Reserve Boardās Policies Regarding Nonbanking Activities
Dimension-8 Operators in the Standard Model Effective Field Theory
We present a complete basis of dimension-8 operators in the Standard Model
Effective Field Theory. Attention is paid to operators that vanish in the
absence of flavor structure. The 44,807 operators are encoded in 1,029
Lagrangian terms. We also briefly discuss a few aspects of phenomenology
involving dimension-8 operators, including light-by-light scattering and
electroweak precision data.Comment: 50 pages, 21 tables; v4: added missing contribution to matching in
Eq. (5.19). T parameter calculation unchange
Reflections on globalisation, security and 9/11
The study of globalisation carries important conceptual insights into the contemporary security agenda following the events of September 11th 2001 ('9/11'). This article argues that globalisation can be defined in a variety of ways, ranging from liberalisation to Westernisation, and can also be extended into concepts of supra-territorialisation. In combination, these definitions help to explain the generation of 9/11 style-conflict by providing the political-economic motivation for hyper-terrorism, by facilitating the political identities and activities of non-state actors; and by creating an environment for the global reach of terror movements. Additionally, the interconnection between globalisation and security can be seen in the response of the United States to 9/11 and its striving to project military power on a global scale with declining reference to time and geographical distance, and the varied ability of sovereign states to respond to the challenge of trans-sovereign security problems in the future
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems
There is a growing threat to the cyber-security of safety-critical systems.
The introduction of Commercial Off The Shelf (COTS) software, including
Linux, specialist VOIP applications and Satellite Based Augmentation Systems
across the aviation, maritime, rail and power-generation infrastructures has created
common, vulnerabilities. In consequence, more people now possess the technical
skills required to identify and exploit vulnerabilities in safety-critical systems.
Arguably for the first time there is the potential for cross-modal attacks
leading to future ācyber stormsā. This situation is compounded by the failure of
public-private partnerships to establish the cyber-security of safety critical applications.
The fiscal crisis has prevented governments from attracting and retaining
competent regulators at the intersection of safety and cyber-security. In particular,
we argue that superficial similarities between safety and security have led
to security policies that cannot be implemented in safety-critical systems. Existing
office-based security standards, such as the ISO27k series, cannot easily be integrated
with standards such as IEC61508 or ISO26262. Hybrid standards such as
IEC 62443 lack credible validation. There is an urgent need to move beyond
high-level policies and address the more detailed engineering challenges that
threaten the cyber-security of safety-critical systems. In particular, we consider
the ways in which cyber-security concerns undermine traditional forms of safety
engineering, for example by invalidating conventional forms of risk assessment.
We also summarise the ways in which safety concerns frustrate the deployment of
conventional mechanisms for cyber-security, including intrusion detection systems
Recommended from our members
Dynamic Amodal Completion Through the Magic Wand Illusion
In the Magic Wand effect, an overlying figure of the same color as its background is revealed by the motion of a wand behind it. The occluding figure is inferred by integration of the occluding edge information over time. The overlying figure is perceived by modal completion, while the wand and the background underneath are perceived by amodal completion. This illusion is compared with its predecessor from nearly two centuries ago, the Plateau Anorthoscopic Illusion, in which an object is recognizable when moved behind a slit
- ā¦