Search results for "Security"
showing 10 items of 1693 documents
“SEE, HEAR, REMAIN SILENT AND… BORED” IN THE FIELDWORK OF A PRISON: AN AUTOETHNOGRAFIC STORY
2017
Como modalidad de investigación narrativa, la autoetnografía enfatiza la parte más personal del proceso de investigación. En este artículo, el relato autoetnográfico se utiliza para reflexionar sobre el trabajo de campo de un estudio etnográfico previo desarrollado en el polideportivo de una prisión de máxima seguridad española. Los datos recogidos en aquella ocasión han sido reexaminados ahora para explicitar críticamente los pasos dados. De este modo, se ponen de manifiesto tanto los dilemas éticos enfrentados, las complejas relaciones sociales que el proceso de investigación encerró, así como la falibilidad de las decisiones tomadas.
State surveillance as a threat to personal security of individuals
2015
Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories,as „Panopticon”, „ban-opticon” and „synopticon”. Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.
State surveillance as a threat to personal security of individuals
2015
Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.
Data Backup Dilemma
2016
When the Great East Japan Earthquake struck in 2011, several municipalities lost their residential data including backup. Since none of them had ever considered the total loss of data, data backup policy had been paid little attention. In many cases, the backup tapes were simply stored inside the server room, just beside the server rack. Following the calamity, the Japanese national government tried to introduce a data backup system to municipalities using the cloud. The purpose was to secure the safekeeping of backup data. However, municipalities were reluctant to go along with this since overcoming the loss of network connectivity during an earthquake remained foremost in their minds. The…
Video surveillance and security policy in France: From regulation to widespread acceptance
2011
This article presents a historical account of the introduction and use of video surveillance cameras in France. Specific reference is made of the introduction of regulatory and legislative arrangements and to political debates surrounding the provision of video surveillance cameras. A feature of the French context has been a desire by national government to install cameras more widely in public places and a resistance to do so by local regions (departments). This highlights a traditional tension between central and local government in France and the significance of political rhetoric to the ongoing installation and operation of video surveillance cameras.
Strengthening global health security by embedding the International Health Regulations requirements into national health systems
2018
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote th…
A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control
2006
Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…
La suspensión de la libre circulación de inversiones extranjeras en España por la crisis del COVID-19
2020
La libre circulación de inversiones es uno de los mantras que ha caracterizado la modernidad económica. El principio, sin embargo, se encuentra sometido a creciente prevención, en el marco de una visión crítica hacia la globalización en un mundo en pleno reajuste geoestratégico. Una de las manifestaciones de esta tendencia reciente de empoderamiento del Estado se refleja en la articulación de mecanismos de control de las inversiones foráneas que le permitan evitar que sectores claves de la economía nacional caigan en manos de inversores extranjeros, en muchas ocasiones, controlados por Estados competidores. A diferencia de lo que ocurre con los países de nuestro entorno, España había sido i…
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
2009
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…
Stakeholders, contradictions and salience: An empirical study of a Norwegian G2G effort
2006
Author's version of a chapter in Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences. Also available from the publisher at http://dx.doi.org/10.1109/HICSS.2006.436 Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly complex settings, consisting of a variety of stakeholders promoting different and often conflicting objectives. Yet, few studies have explicitly addressed the inherent challenges of this complexity. This study focuses on the extent to which contradictory stakeholder objectives can help explain the relatively slow progress of …