1,845,589 research outputs found

    Philosophy of Global Security

    Get PDF
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out mutually advantageous cooperation more effectively irrespective of differences between them. Security problems can be explained and defined by means of making use of fundamental philosophical notions. All levels of security are interrelated on a global scale. The problem of regulation of international relations worldwide as regards guaranteeing security of all participants in them is one of primary importance. The present-day multi-polar world could be based on a social and economic pluralism and peace culture

    How to Finance the Security of the International Trade ? A Global Public Good Approach

    Get PDF
    The aim of this article is to identify the modalities of financing international trade security. Our analysis is more specifically oriented by the issue of financing the developing countries which must make a considerable effort to attain the required level, whereas the developed countries have already largely invested in trade security since the events of 11th September 2001. We first characterise security in the context of a global public good, before studying the financing conditions and the discriminating criteria of the supply of the global public good security. We then presents a critical analysis of the various possible sources and instruments for financing the global public good security and propose different financing scenarios, each one based on a specific allocation of responsibilities among the players in security. We conclude by considering the role of the international institutions as project managers of the financing and implementation of the security of international trade.international, financing, global public goods, international trade, security

    India as a global security actor

    Get PDF
    Thanks to sustained economic growth and key investments in military capabilities, India will face growing demands from within and the international community to seek and play a greater role in global security affairs. The values and interests likely to guide India’s future behavior will be a mixture of old and new, eastern and western. India’s international aspirations have an important pre-history, covered in this chapter’s first section where non-alignment, as idea and practice, is explored for its enduring significance. India’s relevance as a security actor is assessed in terms of its activities and capacity to influence developments within two security zones of major contemporary importance: Afghanistan and the Indian Ocean. Finally, a section on the constraints and challenges examines India’s ability to navigate a multi-polar world, the fallout and gains of nuclearization, the 2008 Indo-US nuclear deal, as well as ‘the weaknesses from within’ in terms of human security

    3 Critical Challenges for Global Health Security

    Get PDF
    International institutions are poised to make one of the most momentous decisions about the future of global health security since the formation of the World Health Organization (WHO) in 1948. By the end of this year, 5 global commissions will have published major critiques of global health preparedness, all spurred by the Ebola epidemic, which exposed deep flaws in the international system

    Comprehensive Security Framework for Global Threats Analysis

    Get PDF
    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios

    Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective

    Get PDF
    We present initial results on a comprehensive model of structured communications, in which self- adaptation and security concerns are jointly addressed. More specifically, we propose a model of self-adaptive, multiparty communications with secure information flow guarantees. In this model, security violations occur when processes attempt to read or write messages of inappropriate security levels within directed exchanges. Such violations trigger adaptation mechanisms that prevent the violations to occur and/or to propagate their effect in the choreography. Our model is equipped with local and global mechanisms for reacting to security violations; type soundness results ensure that global protocols are still correctly executed, while the system adapts itself to preserve security.Comment: In Proceedings BEAT 2014, arXiv:1408.556

    Security Policy Consistency

    Full text link
    With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and between security policies and other specifications, namely workflow specifications. Although the problem of security conflicts has been addressed by several authors, to our knowledge none has addressed the general problem of security inconsistencies, on its several definitions and target specifications.Comment: To appear in the first CL2000 workshop on Rule-Based Constraint Reasoning and Programmin

    Not quite the 'Great Britain of the Far East': Japan's security, the US-Japan alliance and the 'war on terror' in East Asia

    Get PDF
    Japan, in responding to US expectations for support in the 'war on terror', has displayed a degree of strategic convergence on global security objectives, thus prompting policy-makers and observers to dub it the 'Great Britain of the Far East'. This article argues, however, that Japan is far from assuming this role. For Japan, the 'war on terror' serves more as a political pretext for legitimating long-planned changes in military security policy that are often only marginally related to the US's anti-terrorism agenda. Instead, Japan has focused much more on using the terror threat rationale as a means to push forward its response to the regional and traditional security challenges of North Korea and China, even if at times it attempts to depict both as 'new security challenges' or as involving elements of counterterrorism. The final conclusion is that US military hegemony may be weakened by Japan's and the Asia-Pacific's potential divergence from the US global security agenda
    corecore