Search results for " security"
showing 10 items of 1419 documents
2020
Limited data are available regarding strength and endurance training adaptations to occupational physical performance during deployment. This study assessed acute training-induced changes in neuromuscular (electromyography; EMG) and metabolic (blood lactate, BLa) responses during a high-intensity military simulation test (MST), performed in the beginning (PRE) and at the end (POST) of a six-month crisis-management operation. MST time shortened (145 ± 21 vs. 129 ± 16 s, −10 ± 7%, p < 0.001) during the operation. Normalized muscle activity increased from PRE to POST in the hamstring muscles by 87 ± 146% (116 ± 52 vs. 195 ± 139%EMGMVC, p < 0.001) and in the quadriceps by 54 ± 81% (26 ± 8…
2018
Abstract Disaster diplomacy investigates how and why disaster-related activities do and do not influence conflict and cooperation. Studies into the topic so far have tended to develop the theory, analyse a specific case study in space and time, or connect both. Explorations of disaster diplomacy case studies over the long-term are so far absent from the literature. This paper explores Jammu and Kashmir in the Himalaya as a long-term case study for disaster diplomacy. Jammu and Kashmir has a long history of conflicts, multiple environmental hazards, and significant vulnerabilities yielding major disasters, with each topic generally addressed separately in the literature. This paper explores …
Helices of disaster memory: How forgetting and remembering influence tropical cyclone response in Mauritius
2020
Abstract Tropical cyclones have had a considerable impact on Mauritius. Large cyclones are relatively rare, and in popular imagination are thought to hit Mauritius every 15 years. Yet it has been over 25 years since the last cyclone widely considered as ‘significant’. Critically, there is little known about the role of memory in responses to cyclones and details regarding responses to past cyclones in Mauritian history are scant. This article examines past experiences and impacts of cyclones in Mauritius, as well as contemporary perceptions of cyclone vulnerability and memories of historical cyclones. The analysis draws on both community interviews and archival research conducted in Mauriti…
When Peace Leads to Divorce: The Splintering of Rebel Groups in Powersharing Agreements
2017
While research has already focused on power-sharing agreements by assessing specific effects of political, economic, territorial and military provisions, some provisions might be more important tha...
The privatization of death: the emergence of private cemeteries in Romania’s postsocialist deathscape
2020
Private cemeteries constitute a new development in the Romanian postsocialist death system that poses a challenge to the traditional burial culture. This paper charts the emergence of privately own...
Proper Incentives for Proper IT Security Management _ A System Dynamics Approach
2017
Committee Parliamentary Specialization Index. Explaining MPs’ specialisation in the Spanish Congreso de los Diputados
2019
Nowadays legislatures are largely based on committee systems. This enables a division of work and specialisation, in the context of highly complex politics and policy development. It seems clear that MP specialisation in the field of the committee they serve on is an important political asset, both for MPs and their parliamentary party group. This paper presents the Committee Parliamentary Specialization Index. This index measures the degree an MP is specialised in the jurisdiction of the committee they serve on. In the second part of the paper, the index is applied to the Spanish Congreso de los Diputados, an interesting case for testing this multi-faceted index, to find institutional, pol…
Terrorism in the Website
2020
Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation
2016
Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…