Search results for "Security"
showing 10 items of 1693 documents
El otro exilio: memorias y vida cotidiana de las mujeres en el destierro republicano en Francia / The Other Exile: memory and everyday life of republ…
2016
Este estudio se acerca a la complejidad de las vivencias cotidianas femeninas en el exilio republicano en Francia desde la mirada, memorias y recuerdos de una mujer exiliada y bajo una perspectiva de genero. Se examinan sus experiencias del destierro intentando buscar esquemas de comportamiento similares a las demas exiliadas. Asi, establecemos el foco de atencion en la accion y agencia de las mujeres, en su relacion con la politica en el exilio, en la simbiosis entre el espacio publico y privado, asi como en las alteraciones y permanencias de los discursos y practicas de genero tradicionales en el marco de la Francia de guerra y posguerra y en el entorno de exiliados espanoles. A partir de…
Ethical Assumptions: A Criticism against Modern Pragmatism
2016
The advent of neoliberalism in the early 1970s marked a new age for ethical practices. Although pragmatism as an approach to ethics pre-dated neoliberalism, the neoliberal approach to political economy ushered in a new kind of pragmatism, owing little to Jeremy Bentham, even less to the American philosophical pragmatists Charles S. Peirce, William James, and John Dewey. Today’s pragmatism has permeated the penal systems of the central countries of the world capitalist system. A new ethics emerged, a neopragmatism. Acts came to be judged by their effects and not by the motives that led to the actions. This altered the doctrine of Abrahamic religions, and led to the disappearance of forgivene…
Artefacts of Cognition: the Use of Clay Tokens in a Neo-Assyrian Provincial Administration
2014
The study of clay tokens in the Ancient Near East has focused, for the most part, on their role as antecedents to the cuneiform script. Starting with Pierre Amiet and Maurice Lambert in the 1960s the theory was put forward that tokens, or calculi, represent an early cognitive attempt at recording. This theory was taken up by Denise Schmandt-Besserat who studied a large diachronic corpus of Near Eastern tokens. Since then little has been written except in response to Schmandt-Besserat's writings. Most discussions of tokens have generally focused on the time period between the eighth and fourth millennium bc with the assumption that token use drops off as writing gains ground in administrativ…
Towards an integrated approach to emergency management: interdisciplinary challenges for research and practice
2015
This article presents an interdisciplinary vision for large-scale integrated emergency management that has been inspired by the transition from platform centric to integrated operations in the oil and gas fields, which uses remote emergency control centres collaborating virtually with local responders. The article discusses some of the most salient research challenges for integrated emergency management, including the role of mobile technology, human-centred sensing, citizen participation and social media, and the socio-cultural determinants of disaster management. The purpose of this article is to frame an integrated emergency management approach that adopts a multi-disciplinary approach, …
The Mediterranean in the foreign policy of the second Spanish republic
1998
The principal reference points for the foreign policy of the Second Republic were the League of Nations and the Anglo‐French axis. In both areas of policy making, the conditioning factor was Spain's position geographically and strategically and its interest in the security of the western Mediterranean. Its participation in the successive plans to draw up a Mediterranean pact and in the Mediterranean conflicts of the period was characterized by its role as a secondary figure within that axis and by its policy of adaptation as a neutral country to the crisis of the system of collective security.
The rising fear of terrorism and the emergence of a European security governance space: citizen perceptions and EU counterterrorism cooperation
2021
Among a wide range of challenges, EU member states have been facing a growing threat from terrorism in the recent years. The primary responsibility for combating terrorism lies with each individual member state, although the threat is becoming increasingly cross-border and diverse. Regardless of whether terrorism poses a real or perceived threat to the states’ and citizens’ security, public opinion is one important force behind the extensive counterterrorism efforts undertaken in Europe. In this article, we explore the influence of public opinion on EU policy within the security domain in the period 2005–19. We investigate the relationship between the number of attacks carried out on EU ter…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
Una strategia nazionale a difesa del Cyberspazio
2023
L’articolo intende proporre un’analisi circa lo stato dell’arte della sicurezza ci- bernetica in Italia, prestando particolare attenzione alle principali novità conte- nute all’interno della Strategia Nazionale di Cybersicurezza 2022-2026. Nello specifico, dopo aver offerto un inquadramento giuridico del fenomeno degli at- tacchi informatici, il contributo intende approfondire con una visione critica le future sfide che vedranno l’Italia e l’Europa protagoniste nella difesa del pro- prio “dominio cibernetico”. The article intends to propose an analysis about the state of the art of cyber security in Italy, paying particular attention to the main innovations contained in the National Cyberse…
Phenomena in the Cyber World
2015
This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.
Towards better privacy preservation by detecting personal events in photos shared within online social networks
2015
Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…