Search results for "Security"

showing 10 items of 1693 documents

When Peace Leads to Divorce: The Splintering of Rebel Groups in Powersharing Agreements

2017

While research has already focused on power-sharing agreements by assessing specific effects of political, economic, territorial and military provisions, some provisions might be more important tha...

021110 strategic defence & security studiesHistoryPoliticsLawPolitical economyPolitical science05 social sciencesPolitical Science and International Relations050602 political science & public administration0211 other engineering and technologies02 engineering and technology0506 political scienceCivil Wars
researchProduct

The privatization of death: the emergence of private cemeteries in Romania’s postsocialist deathscape

2020

Private cemeteries constitute a new development in the Romanian postsocialist death system that poses a challenge to the traditional burial culture. This paper charts the emergence of privately own...

021110 strategic defence & security studiesHistoryRomanian05 social sciences0211 other engineering and technologies02 engineering and technologylanguage.human_language0506 political scienceChurch-state relationsPolitical sciencePolitical Science and International Relations050602 political science & public administrationlanguageEconomic historySoutheast European and Black Sea Studies
researchProduct

Proper Incentives for Proper IT Security Management _ A System Dynamics Approach

2017

021110 strategic defence & security studiesIncentive0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringEconomics020201 artificial intelligence & image processing02 engineering and technologyIndustrial organizationSystem dynamicsProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Committee Parliamentary Specialization Index. Explaining MPs’ specialisation in the Spanish Congreso de los Diputados

2019

Nowadays legislatures are largely based on committee systems. This enables a division of work and specialisation, in the context of highly complex politics and policy development. It seems clear that MP specialisation in the field of the committee they serve on is an important political asset, both for MPs and their parliamentary party group. This paper presents the Committee Parliamentary Specialization Index. This index measures the degree an MP is specialised in the jurisdiction of the committee they serve on. In the second part of the paper, the index is applied to the Spanish Congreso de los Diputados, an interesting case for testing this multi-faceted index, to find institutional, pol…

021110 strategic defence & security studiesIndex (economics)Division of workJurisdiction05 social sciences0211 other engineering and technologiesContext (language use)Legislature02 engineering and technologyPublic administration0506 political sciencePoliticsPolitical sciencePolitical Science and International RelationsSpecialization (logic)050602 political science & public administrationAsset (economics)LawThe Journal of Legislative Studies
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation

2016

Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…

021110 strategic defence & security studiesK5000-5582business.industrySeparation (aeronautics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologyAnatomyDental identificationpath-findinghuman dental identificationCriminal law and procedurestomatognathic diseasesstomatognathic systemSocial pathology. Social and public welfare. CriminologyPath (graph theory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessHV1-9960Scandinavian Journal of Forensic Science
researchProduct

Building Resilience Through Effective Disaster Management

2017

Existing literature argues that taking a holistic approach to disaster management is important for organizations in building resilience. Theoretical underpinnings to achieve a holistic understanding, however, is lacking. This article applies the notion of an ecosystem as a holistic lens to understand complex disaster management. The paper reports two case studies from Japan and Nepal to illustrate how an ecosystem works during a disaster. The theoretical framework of information ecology is used in analyzing the cases. Based on the findings, the study shows three interconnected mechanisms that can build resilience of an ecosystem in a disaster management context, namely (1) coevolution, (2) …

021110 strategic defence & security studiesKnowledge managementEmergency managementbusiness.industry05 social sciencesPerspective (graphical)0211 other engineering and technologies02 engineering and technologyInformation ecology0502 economics and businessSociologybusinessResilience (network)Environmental planningComputingMilieux_MISCELLANEOUS050203 business & managementInternational Journal of Information Systems for Crisis Response and Management
researchProduct

The politics of Argentina today: human rights and Kirchnerismo

2016

After the effects of bloody dictatorship that whipped the region, Argentina as many other Latin American countries experienced a great trauma which not only altered the ways politics was lived, but also undermined the social trust of citizens respecting to their institutions. The rise of Kirchneristes and Kirchnerismo post stock and market crisis of 2001, initiated a new age in Argentina. Kirchnerismo opened the doors for the vindication of many claims of human rights organisations, but at the same time, the discourse of human rights was adjusted to the interests of Cristina Kirchner and her followers. As a result of this, the cause of human rights allowed government to produce a new way of…

021110 strategic defence & security studiesLatin AmericansHuman rightsmedia_common.quotation_subject0211 other engineering and technologies021107 urban & regional planning02 engineering and technologyDictatorshipPoliticsPolitical economyLawSociologySocial trustStock (geology)media_commonInternational Journal of Human Rights and Constitutional Studies
researchProduct

Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help

2016

International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…

021110 strategic defence & security studiesManagement sciencebusiness.industry020209 energy0211 other engineering and technologiesComplex systemModeling and simulation02 engineering and technologyDomain (software engineering)System dynamicsManagementModeling and simulationCritical infrastructuresIncentiveRisk analysis (engineering)0202 electrical engineering electronic engineering information engineeringInformation systemSecurity managementThe Internet[INFO]Computer Science [cs]BusinessPolicies
researchProduct