Search results for "Security"
showing 10 items of 1693 documents
When Peace Leads to Divorce: The Splintering of Rebel Groups in Powersharing Agreements
2017
While research has already focused on power-sharing agreements by assessing specific effects of political, economic, territorial and military provisions, some provisions might be more important tha...
The privatization of death: the emergence of private cemeteries in Romania’s postsocialist deathscape
2020
Private cemeteries constitute a new development in the Romanian postsocialist death system that poses a challenge to the traditional burial culture. This paper charts the emergence of privately own...
Proper Incentives for Proper IT Security Management _ A System Dynamics Approach
2017
Committee Parliamentary Specialization Index. Explaining MPs’ specialisation in the Spanish Congreso de los Diputados
2019
Nowadays legislatures are largely based on committee systems. This enables a division of work and specialisation, in the context of highly complex politics and policy development. It seems clear that MP specialisation in the field of the committee they serve on is an important political asset, both for MPs and their parliamentary party group. This paper presents the Committee Parliamentary Specialization Index. This index measures the degree an MP is specialised in the jurisdiction of the committee they serve on. In the second part of the paper, the index is applied to the Spanish Congreso de los Diputados, an interesting case for testing this multi-faceted index, to find institutional, pol…
Terrorism in the Website
2020
Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation
2016
Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…
Building Resilience Through Effective Disaster Management
2017
Existing literature argues that taking a holistic approach to disaster management is important for organizations in building resilience. Theoretical underpinnings to achieve a holistic understanding, however, is lacking. This article applies the notion of an ecosystem as a holistic lens to understand complex disaster management. The paper reports two case studies from Japan and Nepal to illustrate how an ecosystem works during a disaster. The theoretical framework of information ecology is used in analyzing the cases. Based on the findings, the study shows three interconnected mechanisms that can build resilience of an ecosystem in a disaster management context, namely (1) coevolution, (2) …
The politics of Argentina today: human rights and Kirchnerismo
2016
After the effects of bloody dictatorship that whipped the region, Argentina as many other Latin American countries experienced a great trauma which not only altered the ways politics was lived, but also undermined the social trust of citizens respecting to their institutions. The rise of Kirchneristes and Kirchnerismo post stock and market crisis of 2001, initiated a new age in Argentina. Kirchnerismo opened the doors for the vindication of many claims of human rights organisations, but at the same time, the discourse of human rights was adjusted to the interests of Cristina Kirchner and her followers. As a result of this, the cause of human rights allowed government to produce a new way of…
Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help
2016
International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…