Search results for "Security"

showing 10 items of 1693 documents

“SEE, HEAR, REMAIN SILENT AND… BORED” IN THE FIELDWORK OF A PRISON: AN AUTOETHNOGRAFIC STORY

2017

Como modalidad de investigación narrativa, la autoetnografía enfatiza la parte más personal del proceso de investigación. En este artículo, el relato autoetnográfico se utiliza para reflexionar sobre el trabajo de campo de un estudio etnográfico previo desarrollado en el polideportivo de una prisión de máxima seguridad española. Los datos recogidos en aquella ocasión han sido reexaminados ahora para explicitar críticamente los pasos dados. De este modo, se ponen de manifiesto tanto los dilemas éticos enfrentados, las complejas relaciones sociales que el proceso de investigación encerró, así como la falibilidad de las decisiones tomadas. 

Narração. Atividade Motora. Relações Pesquisador-Sujeitomedia_common.quotation_subject05 social sciencesPrisonAutoethnography030229 sport sciencesNarración. Actividad física. Relaciones Investigador-Sujeto.Research processSocial relationEducationNarrative inquiry03 medical and health sciences0302 clinical medicine0502 economics and businessEthnographyPedagogySociologyNarration Physical Activity Researcher-Subject Relations.050212 sport leisure & tourismmedia_commonMaximum securityMovimento
researchProduct

State surveillance as a threat to personal security of individuals

2015

Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories,as „Panopticon”, „ban-opticon” and „synopticon”. Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.

National Security AgencyPonopticonsurveillancestate apparatusSecuritologia
researchProduct

State surveillance as a threat to personal security of individuals

2015

Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.

National Security AgencySurveillancelcsh:Industrial safety. Industrial accident preventionbusiness.industrymedia_common.quotation_subjectlcsh:Political sciencePersonal securityUnited States National Security AgencyComputer securitycomputer.software_genreThreatState (polity)state apparatusSociologylcsh:T55-55.3businesscomputerlcsh:Jmedia_commonSecuritologia
researchProduct

Data Backup Dilemma

2016

When the Great East Japan Earthquake struck in 2011, several municipalities lost their residential data including backup. Since none of them had ever considered the total loss of data, data backup policy had been paid little attention. In many cases, the backup tapes were simply stored inside the server room, just beside the server rack. Following the calamity, the Japanese national government tried to introduce a data backup system to municipalities using the cloud. The purpose was to secure the safekeeping of backup data. However, municipalities were reluctant to go along with this since overcoming the loss of network connectivity during an earthquake remained foremost in their minds. The…

National governmentComputer sciencebusiness.industry05 social sciencesCloud computing02 engineering and technologyNetwork connectivityComputer securitycomputer.software_genreHybrid approachDilemmaBackup020204 information systems0502 economics and businessData_FILES0202 electrical engineering electronic engineering information engineering050211 marketingServer roombusinesscomputerProceedings of the 17th International Digital Government Research Conference on Digital Government Research
researchProduct

Video surveillance and security policy in France: From regulation to widespread acceptance

2011

This article presents a historical account of the introduction and use of video surveillance cameras in France. Specific reference is made of the introduction of regulatory and legislative arrangements and to political debates surrounding the provision of video surveillance cameras. A feature of the French context has been a desire by national government to install cameras more widely in public places and a resistance to do so by local regions (departments). This highlights a traditional tension between central and local government in France and the significance of political rhetoric to the ongoing installation and operation of video surveillance cameras.

National governmentPublic AdministrationSociology and Political Sciencebusiness.industryCommunicationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputingMilieux_LEGALASPECTSOFCOMPUTINGContext (language use)Resistance (psychoanalysis)LegislaturePublic relationsSecurity policyPoliticsPolitical scienceLocal governmentPolitical rhetoricbusinessInformation SystemsInformation Polity
researchProduct

Strengthening global health security by embedding the International Health Regulations requirements into national health systems

2018

The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote th…

National healthmedicine.medical_specialtybusiness.industry030503 health policy & servicesHealth PolicyMember statesPublic healthPublic Health Environmental and Occupational HealthInternational healthHealth securityPublic relationsInternational Health RegulationsResilience (organizational)03 medical and health sciences0302 clinical medicineGlobal healthmedicine030212 general & internal medicine0305 other medical sciencebusinessBMJ Global Health
researchProduct

A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control

2006

Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…

National securityComputer access controlbusiness.industryComputer scienceMulti-agent systemAuthorizationData securityAccess controlComputer securitycomputer.software_genreCredentialMandatory access controlDiscretionary access controlRole-based access controlbusinesscomputer
researchProduct

La suspensión de la libre circulación de inversiones extranjeras en España por la crisis del COVID-19

2020

La libre circulación de inversiones es uno de los mantras que ha caracterizado la modernidad económica. El principio, sin embargo, se encuentra sometido a creciente prevención, en el marco de una visión crítica hacia la globalización en un mundo en pleno reajuste geoestratégico. Una de las manifestaciones de esta tendencia reciente de empoderamiento del Estado se refleja en la articulación de mecanismos de control de las inversiones foráneas que le permitan evitar que sectores claves de la economía nacional caigan en manos de inversores extranjeros, en muchas ocasiones, controlados por Estados competidores. A diferencia de lo que ocurre con los países de nuestro entorno, España había sido i…

National securityCoronavirus disease 2019 (COVID-19)business.industryModernitymedia_common.quotation_subjectDret internacional privatForeign direct investmentInvestment (macroeconomics)Free movementEconomyPolitical scienceCriticismbusinessLawmedia_common
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct

Stakeholders, contradictions and salience: An empirical study of a Norwegian G2G effort

2006

Author's version of a chapter in Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences. Also available from the publisher at http://dx.doi.org/10.1109/HICSS.2006.436 Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly complex settings, consisting of a variety of stakeholders promoting different and often conflicting objectives. Yet, few studies have explicitly addressed the inherent challenges of this complexity. This study focuses on the extent to which contradictory stakeholder objectives can help explain the relatively slow progress of …

National securityEmpirical researchbusiness.industryInformation and Communications TechnologyLocal governmentInformation systemEconomicsStakeholderStakeholder analysisVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Public relationsbusinessStakeholder theory
researchProduct