WorldWideScience

Sample records for non-path-dependent european securities

  1. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  2. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  3. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  4. Tailoring a non-path-dependent model for environmental risk management and polycentric urban land-use planning.

    Science.gov (United States)

    Sakieh, Yousef; Salmanmahiny, Abdolrassoul; Mirkarimi, Seyed Hamed

    2017-02-01

    This study attempts to develop a non-path-dependent model for environmental risk management and polycentric urban land-use planning in Gorgan Township area, Iran. Applying three suitability layers of environmental risk (soil erosion, flood risk, fire risk, and land susceptibility), urbanization potential, and integrated surface (environmental risk plus urbanization potential layers), a non-path-dependent Cellular Automata-Markov Chain (CA-MC) model was configured to execute three scenarios of polycentric urban growth allocation. Specifically, the modeling approach improved the traditional functionality of the CA-MC model from a prediction algorithm into an innovative land allocation tool. Besides, due to its flexibility, the non-path-dependent model was able to explicitly include different characteristics of the landscape structure ranging from physical land attributes to landscape functions and processes (natural hazards). Accordingly, three polycentric urban growth allocation efforts were undertaken and compared in terms of connectivity and compactness of the resultant patterns and consumption of other land resources. Based on results, the polycentric allocation procedure based on integrated suitability layer produced a more manageable pattern of urban landscape, while the growth option based on environmental risk layer was more successful for protecting farmlands against excessive urbanization. This study suggests that polycentric urban land-use planning under the strategy of rural land development programs is an available option for designing an urban landscape with lower exposure to natural hazards and more economic benefits to rural residents. Finally, the non-path-dependent modeling is a recommended approach, when highly flexible and interactive decision-support systems as well as trend-breaking scenarios are desired.

  5. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of cybe

  6. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of

  7. Security Economics and European Policy

    Science.gov (United States)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  8. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  9. European Security Policy and Earth Observation

    NARCIS (Netherlands)

    Cragg, A.; Buda, D.; Nieuwenhuijs, A.H.

    2009-01-01

    This paper gives an account of the activities of the GMOSS Working Group studying issues and priorities for European security. It draws on the European Security Strategy (ESS) and other major policy documents to provide a summary account for the general reader of the strategic challenges facing the

  10. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  11. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision-making...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  12. European Energy Security amid Ukrainian Crisis

    Directory of Open Access Journals (Sweden)

    Kumar Vijay

    2016-01-01

    Full Text Available On the basis of overall analysis of the European dependence on Russia for its energy needs (mainly gas and oil this paper tries to argue that economic sanction against Russia will have limited success. It will hurt the region badly, but it has more potential to jeopardize the European energy security aspect – a long cherished goal of the European nations. So, the best means to solve the Ukraine crisis is political and diplomatic tools, not the economic ones.

  13. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  14. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  15. The security system at European airports - Tour d’Horizon

    NARCIS (Netherlands)

    Rekiel, J.; de Wit, J.

    2013-01-01

    This paper aims to provide an analysis of the existing security system at European airports. At first, the security is defined and the considerations of the air passenger security on the ground and in the air are discussed. Subsequently, current aspects shaping the European aviation security policy

  16. The security system at European airports - Tour d’Horizon

    NARCIS (Netherlands)

    Rekiel, J.; de Wit, J.

    2013-01-01

    This paper aims to provide an analysis of the existing security system at European airports. At first, the security is defined and the considerations of the air passenger security on the ground and in the air are discussed. Subsequently, current aspects shaping the European aviation security policy

  17. The strategic role of the US in European energy security

    Science.gov (United States)

    Koranyi, David

    2016-10-01

    The US plays a key role in shoring up European energy security and this is unlikely to change dramatically after the November 2016 elections. However, the outcome could compound longer term risks to an internationally engaged US energy policy, affecting European energy security and diplomacy.

  18. The SWIFT affair and the global politics of European security

    NARCIS (Netherlands)

    de Goede, M.

    2012-01-01

    This article examines the ‘SWIFT affair’, whereby United States security authorities acquired access to financial data of European citizens, and argues that it is a powerful lens through which to understand current shifts in European security governing. The affair demonstrates the institutional chal

  19. The SWIFT affair and the global politics of European security

    NARCIS (Netherlands)

    de Goede, M.

    2012-01-01

    This article examines the ‘SWIFT affair’, whereby United States security authorities acquired access to financial data of European citizens, and argues that it is a powerful lens through which to understand current shifts in European security governing. The affair demonstrates the institutional chal

  20. Security and Liberty in the European Union: Foreword

    Directory of Open Access Journals (Sweden)

    Juliet Lodge

    2009-08-01

    Full Text Available Why do liberty and security matter? Why have they been seen as polar opposites? And why is the tension in reconciling individual and collective liberty with collective security so problematic? Without security, liberty is impossible. Without liberty, as we understand it in the European Union (EU, democracy is jeopardised. There are many facets to understanding how the domesticisation of security and the securitisation of policy arenas, previously seen as domestic politics, challenge our understanding of the meaning of liberty, democracy, fundamental human rights and open governance. This special issue of the JCER | Journal of Contemporary European Research addresses these questions and issues.

  1. European Security in the Balkans: The Case of Macedonia

    Science.gov (United States)

    2013-03-01

    our leaders will realize that the world is not “modern” or “ postmodern ” but only a continuation of the ancient world.1 —Robert D. Kaplan...the employment of the EU security strategy was its first priority. The absence of agreed security architecture encouraged some European member

  2. European Security: Chances for a European Defense Entity

    Science.gov (United States)

    1991-04-12

    segment of society should be allocated to future security, and on the role of the military in the process. The current incorporation of military...Netherlands, 14 July 1990. (The deceptive appearance of security and unity in Europe.) 33. Europa 1992. Zaken doen op de Europese interne markt ...doen op de Europese interne markt . (Den Haag), 1988. NATO Press Service. London Declaration on a Transformed North Atlantic Alliance. Brussels: Press

  3. The Spanish View of European Security for the Next Millenium

    Directory of Open Access Journals (Sweden)

    Eduardo Serra

    1997-12-01

    Full Text Available Assessing that European security cannot be dissassociated from Euro-Atlantic security, Minister Serra points out that after the Cold War the vertical tension between North and South will be the epicenter of the strategic panorama. This tension derives from theexistence of risks that are security related, economic, demographic, political, and social in nature. Serra stresses that the most important risks in the security field evolve from a possible failure in the consolidation of the European security and defense architecture, the uncertainty of Russia’s future, and the access to weapons of mass destruction. Other risks include cultural differences, the repercussions of emerging markets, and the crisis of the state. The author underlines that Spain, as a medium power, can play a role to promote dialogue, cooperation and solidarity as preventive policies, while underlining the importance of the Mediterranean for Europe.

  4. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic cha

  5. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  6. Securing the European ‘Homeland’: Profit, risk, authority

    NARCIS (Netherlands)

    Hoijtink, M.

    2016-01-01

    This thesis explores the emergence of a new European market for homeland security technology in the context of changing conceptions of risk. On the one hand, an important contribution of this study is that it focuses on the politics of the governmentality of risk and the role of industry and lobby

  7. Elements of Social Security in 6 European Countries

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security in 6 European Countries contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain and the Nether-lands. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact...

  8. Bilateral Social Security Instruments Concluded between European Socialist Countries.

    Science.gov (United States)

    Popescu, Andrei

    1982-01-01

    Presents a review of existing bilateral treaties, conventions, and agreements in the field of social policy concluded between European socialist countries. It summarizes their basic principles, their social security provisions (old-age benefit, employment injury benefits, cash benefits for sickness and maternity), and the provisions concerning…

  9. Web Interface Security Vulnerabilities of European Academic Repositories

    Directory of Open Access Journals (Sweden)

    Matus Formanek

    2017-02-01

    Full Text Available The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science. It focuses on the presence and qualities of the secure HTTPS protocol via SSL/TLS protocols. The security of the transmitted data is particularly important in the network environment of the Internet, especially if log-in user data is transmitted. Disclosure may have a direct impact on saved digital objects and their metadata which together represent the most valuable parts of systems of digital libraries and repositories. Furthermore, the paper points to the most noticeable vulnerabilities of protocols of web interfaces and presents practical recommendations for the expert public. These may contribute to the increase of the level of security of the discussed systems. The authors base their proposals on the currently available scientific publications and scientific articles about the given topic.

  10. European Strategies for Energy Security in the Natural Gas Market

    Directory of Open Access Journals (Sweden)

    Boyka Stefanova

    2012-08-01

    Full Text Available This article examines the European Union's (EU approach to energy security on the example of its natural gas imports from Russia, the largest supplier of gas to European markets. Two major projects, Nord Stream in the Northern and Western part of the EU, and Nabucco in South-Central Europe, demonstrate opposing energy security strategies, seemingly at odds with the EU objective of achieving energy independence from Russia. The question arises: Are these strategies sustainable? How can they be reconciled and pursued under a common policy? The main argument is that such conflicting sub-regional policy initiatives are amenable to progressive realignment and serve common security objectives. The article examines the Nord Stream and Nabucco pipelines in the context of the Third Energy Package, a set of policy instruments for the creation of an EU-wide internal energy market. It demonstrates that the energy security strategies pursued through Nord Stream and Nabucco fit well with the logic of the internal market reflected in premises of flexibility and efficiency. The article concludes that the security of the EU's energy market may be pursued in practice by applying different formulas relying on a variable mix of networks, partnerships, and market integration with non-members.

  11. REASSESSING THE EUROPEAN SECURITY STRATEGY IN AN AGE OF AUSTERITY

    Directory of Open Access Journals (Sweden)

    Ruxandra Laura BOSILCA

    2014-10-01

    Full Text Available The current European Security Strategy was drafted in the strategic context of 2003 and (unsubstantially revised in 2008. More than a decade later, the dramatic changes in the international context have important implications for EU`s strategic position and cast doubt on the relevance of the existing conceptual framework. Despite the efforts of some member states and various scholars, think-tanks and policy-makers advocating for a new strategic document, the much anticipated European Council of December 2013 - a body which could have provided a genuine impetus for such a change - remained silent on the issue. The author herein argues that a reassessment of the Security Strategy is more needed than ever if the EU is to remain a major global actor in times of crisis.

  12. European Security and Defense Policy: The Dialectics of Autonomy

    Science.gov (United States)

    2007-06-01

    only certain types of missions. Rather than centering on a robust military capability, Europe’s security concept has recently been more diplomatically... Pompidou : The Politics of Grandeur (Ithica, NY: Cornell University Press, 1974), p. 316. 27 of a powerful national leader. The gains of the EC were...procedures, operations centers and headquarters that were not already available via NATO. As European states were experiencing falling defense budgets, this

  13. European Energy Security and Nord Stream: A Case Study of the Nord Stream Pipeline, Its Opportunities and Risks for Europe, and Its Impact on European Energy Security

    Science.gov (United States)

    2011-06-01

    System of Gas Supplies xiii ACKNOWLEDGMENTS I would like to thank my co-advisors, Professor Robert Looney and COL (G.S.) (GAF) Dirk Rogalski...74 European Commission, Green Paper. 75 European Union, A secure Europe in a better world: European Security Strategy. 76 European Union, Europa ...online, 13 September 2010, http://www.zeit.de/wirtschaft/2010-09/wachstum-deutschland- europa (accessed 3 February 2011). 277 Deutscher Bundestag, Basic

  14. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  15. Importance of security and socialization in europeans life

    Directory of Open Access Journals (Sweden)

    Diana Elena Şerb

    2017-01-01

    Full Text Available The purpose of this research is to examine the importance of safety and socialization in the lives of individuals. The influence of agents of socialization (school, family, friends are manifested as differences in preferences, feelings and thoughts of people. The article is structured in two parts. The first part presents the knowledge in the field, but in the context of Maslow's hierarchy of needs. In the second part is carried out an research among Europeans about some aspect of their lives: how they spend their free time, the feeling of attachment to the community, a sense of security and availability to communicate personal matters to their group of friends. The research method was investigating the secondary sources (database obtained from the survey from a site specializing in the analysis of living conditions of Europeans - European Social Survey. After the reception and processing of results in Excel and SPSS we obtained a general conclusion that people need to socialize, to be part of a group and feel safe.

  16. ORIGIN, DEVELOPMENT AND PERSPECTIVES FOR THE HUMAN SECURITY CONCEPT IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Karina Paulina Marczuk

    2007-07-01

    Full Text Available The wide economic support and an attempt to guarantee safety, which the European governments are trying to provide for their citizens, are reasons why the European Union explores new directions of conducting common policies for which the most important is the human being and his needs. The European security policy – and the new concept of human security – could be one example of the EU`s new behavior. Taking into consideration the previous attempts at developing security theories in Europe and other countries, it is possible to state that the modern human security doctrine in the EU could be followed by creating a special kind of European corps which would be a new tool for ensuring security where it would be necessary to provide it – European Gendarmerie Forces (known as EGF or EUROGENDFOR. The aim of this article is to show the impact of the evolution of the modern security theories for creating a human security doctrine in the framework of the European Union. Moreover, genesis and activity of the EGF are presented and the author is trying to answer the question: could the EGF be a tool of human security in the EU?. Finally, a couple of proposals for the future development of the European security policy are mentioned.

  17. The European Union as a Security Actor: Moving Beyond the Second Pillar

    Directory of Open Access Journals (Sweden)

    Kamil Zwolski

    2009-04-01

    Full Text Available It is suggested in this article that there is a discrepancy between, on the one hand, literature that focuses on the European Union (EU as a security actor and, on the other, contemporary security studies literature. This difference concerns the fact that the literature on the EU as a security actor treats security in a narrower sense than how it is approached in the literature on security studies. Over the past few decades, security studies literature has begun to fully acknowledge that the concept of security has broadened beyond traditional ‘hard’ security concerns and can encompass many different issues, for example the security implications of climate change. However, the literature on the EU as a security actor very often associates security only with the second pillar of the EU’s organisational structure; in particular the intergovernmental cooperation embodied by the Common Foreign and Security Policy (CFSP and the European Security and Defence Policy (ESDP. The main purpose of this article is to utilise the broader security studies approach to security as a means to expand the understanding of security in the context of the EU’s performance on the international stage. This is important because it allows the Union’s �����actorness’ in the field of security to be examined in a more holistic manner.

  18. (REBUILDING THE EUROPEAN UNION`S INTERNATIONAL ROLE THROUGH HUMAN SECURITY STRATEGY IN THE AFTREMATHS OF THE EUROPEAN CRISIS

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2014-10-01

    Full Text Available In a globalized world, characterized by profound shifts in the dynamics of global power and by diverse threats to peace and security, the European Union should be an active and peace-promoter actor, according to its founding principles. Thus, the European crisis left hard to heal scars within the European Union internal coherence and for its international role and image. The European crisis determined a cleavage in foreign and defence policy between the EU`s member states, creating dissonances in its internal processes. Therefore, this incongruence determined flawed reactions to international events. In order to determine the impact of the European crisis on the EU`s international role, it is briefly analysed the EU`s and its member states reactions to the conflicts from Libya and Syria. The main hypothesis of this article is that in order to overcome the effects of the economic crisis and to rebuild its international trust, the EU should reaffirm its core principles through a coherent external policy, which should be embedded in a bottom-up legitimized paradigm. This analysis demonstrates that human security strategy and the responsibility to protect principle can become the new European meta-narrative, the fact that they have the potential to overcome the current gap between rhetoric and practice in foreign and defence European policies. Therefore, this article advocates that the human security strategy and the responsibility to protect principle represent an impetus to transform the EU in an important global actor.

  19. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  20. The EU Maritime Security Strategy : Promoting or Absorbing European Defence Cooperation?

    NARCIS (Netherlands)

    Landman, Lennart

    2015-01-01

    For centuries, the maritime domain has been a pillar of European livelihoods and prosperity through fishing and global trade. In modern times, we have come to depend on maritime transport to keep our economy going. Recently, however, old and new threats have challenged the security of the European

  1. The EU Maritime Security Strategy : Promoting or Absorbing European Defence Cooperation?

    NARCIS (Netherlands)

    Landman, Lennart

    2015-01-01

    For centuries, the maritime domain has been a pillar of European livelihoods and prosperity through fishing and global trade. In modern times, we have come to depend on maritime transport to keep our economy going. Recently, however, old and new threats have challenged the security of the European U

  2. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  3. Tracing the Interface Between Numerical Flexibility and Income Security for European Youth during the Economic Crisis

    DEFF Research Database (Denmark)

    Leschke, Janine; Finn, Mairéad

    This paper traces convergences in terms of flexibility and security with a focus on younger and older youth in European countries. Youth were one of the groups hardest hit by the economic crisis. Young people in most European countries are more likely to work on temporary contracts of limited...... underexplored. This allows us to assess if developments during the economic crisis have improved or rather deteriorated the situation of youth with regard to different dimension of flexibility and security....... benefit schemes. This paper adopts a comparative European approach in order to shed light on the interaction between flexibility and income security, for youth. Special extracts of the aggregate European Labour Force Survey data are used to trace the development of (involuntary) temporary employment among...

  4. A DECADE OF AFRICAN UNION AND EUROPEAN UNION TRANS-REGIONAL SECURITY RELATIONS

    Directory of Open Access Journals (Sweden)

    Glen Segell

    2011-08-01

    Full Text Available The first decade of the new millennium saw the European Union deploy ninesecurity missions to the African continent, quoting the European Security andDefence Policy. Unlike the numerous United Nations security missions thatEuropean states had previously contributed to, these were part of a grand strategydesigned to link the African Union and the European Union in a process of transregionalismdefined as a unique organisational infrastructure (joint secretariat forresearch, policy planning, preparation and coordination of meetings andimplementation of decisions. The rationale being that security and its associatedpeace and stability are the basis for sustainable development in other areas. Thisarticle follows the development of the trans-regionalism detailing the securitymissions.

  5. EXPORTING ECONOMIC SECURITY TOWARDS THE EUROPEAN UNION: EASTERN NEIGHBORHOOD IN CONTRAST TO SOUTHERN MEDITERRANEAN

    Directory of Open Access Journals (Sweden)

    OXANA SOIMU

    2013-05-01

    Full Text Available A prosperous neighbourhood for a developing country is an undeniable fact. Among most eloquent examples serves the European Neighbourhood Policy (ENP that is subject of large debates. In this context, we are used to get knowledge about the benefits that the ENP brings to Eastern and Southern Mediterranean partners. On the other hand, many studies criticize the European Union (EU foreign policy as presenting weak incentives and conditionality. Nevertheless, this situation requires from our point of view a thorough analysis about the share of economic security that is “imported” by the EU due to the ENP implementation in its immediate vicinity. Thereby, an empirical analysis is going to be carried out in this article where the manoeuvre with some statistic data and macroeconomic indicators within economic security typologies is expected to generate useful insights in order to identify: Who generates more economic security gains for the EU? In more details, tracing the analytic parallel between economic measures within the European Neighbourhood Policy and contemporary approach to economic security, namely according to the European vision of security it enables the author to reach conclusions which of the EU's neighbours show more economic certainty and security. If this correlation generates positive results, then the author will assert that the EU offer regarding the Neighbourhood Policy is prospective for recipients but also for the EU in terms of economic security "import".

  6. The Evolution of European Security: From Confrontation to Cooperation

    Science.gov (United States)

    2013-03-01

    leading U.S. companies such as Boeing and Lockheed Martin , just to name a few.77 But more robust cooperation is still limited by the member states...Common Security and Defense Policy: Intersecting Trajectories”, 4. 63 Gustav Lindstrom , Enter the EU Battlegroups, (Paris: Institute for Security...Battlegroups, Strategy Research Project (Carlisle Barracks, PA: U.S. Army War College, January 22, 2009), 4. 67 Lindstrom , Enter the EU Battlegroups

  7. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  8. Harmonisation of securities law : custody and transfer of securities in European private law

    NARCIS (Netherlands)

    M. Haentjens

    2007-01-01

    The settlement of a cross-border securities transaction is riskier and eleven times more expensive than the settlement of a purely domestic transaction. This dramatic discrepancy is mainly due to differences in national securities laws. Matthias Haentjens argues that national systems of securities l

  9. Cost efficiency in the European securities settlement and depository industry

    NARCIS (Netherlands)

    van Cayseele, P.J.G.; Wuyts, C.

    2007-01-01

    We examine whether the European settlement and custody institutions operate in an efficient way. To do this, we start from an analytically founded discussion regarding the activities performed by the operators in this sector. Based on the insights obtained, we estimate both a translog cost function

  10. The Role of European Security Institutions in Future Crises

    Science.gov (United States)

    1992-06-05

    Serbo-Croatians. The Poles had obtained some autonomy in Galicia and the Czechs gained some recognition when the Czech university in Prague was 44...united European posture in this matter. The lack of such a policy, means inter alia that economic policy toward foreign countries cannot be optimally

  11. Energy supply security and geopolitics : A European perspective

    NARCIS (Netherlands)

    Correlje, A; van der Linde, C

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets, Regions and Empires involves a world broken up in rival political and

  12. Baltic dimension of the European security and defence policy

    Directory of Open Access Journals (Sweden)

    M. L. Gladysh

    2015-03-01

    The basic threats and security challenges for the Baltic States nowadays are defined, including possible aggression from Russia, which is broadcasted through the mainstream media as a reaction to the idea of protecting Russian­speaking population of the Baltic States and the establishment of «geopolitical balance through their return to the Russian sphere of influence».

  13. Energy supply security and geopolitics : A European perspective

    NARCIS (Netherlands)

    Correlje, A; van der Linde, C

    2006-01-01

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets, Regions and Empires involves a world broken up in rival political and eco

  14. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  15. Motives for European Union Common Security and Defense Policy Mission Selection

    OpenAIRE

    Page, Greg A.

    2011-01-01

    Approved for public release; distribution is unlimited. The European Union (EU) currently lacks a comprehensive agreement on where the EU will engage in crisis management missions under the Common Security and Defense Policy (CSDP) framework. This thesis investigates the motives for why the European Union engages in military or civilian operations under the framework of CSDP. Predominant research suggests the three dominant factors motivating the EU to engage in CSDP are national intere...

  16. Looking beyond credit ratings : Factors investors consider In pricing European asset-backed securities

    NARCIS (Netherlands)

    Fabozzi, F.; Vink, D.

    2012-01-01

    In this paper, we empirically investigate what credit factors investors rely upon when pricing the spread at issue for European asset-backed securities. More specifically, we investigate how credit factors affect new issuance spreads after taking into account credit rating. We do so by investigating

  17. The information content of three credit ratings : The case of European residential mortgage-backed securities

    NARCIS (Netherlands)

    Fabozzi, F.; Vink, D.

    2015-01-01

    We assess the information content of three credit ratings for tranches of newly issued European residential mortgage-backed securities. We find that tranches rated by three credit rating agencies where the rating by Standard & Poor's (S&P's) Ratings Service or Fitch is inferior to Moody's lead to

  18. Looking beyond credit ratings : Factors investors consider In pricing European asset-backed securities

    NARCIS (Netherlands)

    Fabozzi, F.; Vink, D.

    2012-01-01

    In this paper, we empirically investigate what credit factors investors rely upon when pricing the spread at issue for European asset-backed securities. More specifically, we investigate how credit factors affect new issuance spreads after taking into account credit rating. We do so by investigating

  19. European Court of Justice Secures Fundamental Rights from UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Sebastian Recker

    2009-02-01

    /msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    The European Court of Justice has annulled Council Regulation (EC No 881/2002[1] freezing funds of Mr. Kadi and Al Barakaat based on Resolution 1267 (1999[2] of the United Nations Security Council[3]. In so doing, the European Court of Justice has set aside the Court of First Instance’s judgment

  20. Towards a Global Maritime Surveillance- A New European Challenge for European Security

    Science.gov (United States)

    Claverie, Alain; Barbagelata, Andrea; Pasco, Xavier; Darnis, Jean Pierre

    2005-03-01

    The illegal immigration connected to traffic and criminal activity is creating problems in Europe. Maritime surveillance is one of the most problematic dimensions.The political decision and the international agreement of the development of VTMS and the AIS are a first step towards securing the maritime traffic and protecting the maritime borders.The weight of the terrorism through the emergence of new set of threats is changing the situation in creating new needs of control through a global approach. The recent sea trial of the US department of Homeland Security is an indicator of this evolution. Space technologies have unique capabilities to support this kind of global approaches:• GNSS and the satellite telecommunication fleet (e.g. INMARSAT, ORBCOM) have a direct contribution to the extension of the AIS.• Satellite remote sensing is the logic extension of the control of the "VTMS" area.The new generation of satellite fleet (e.g. Pléiades, TerraSar, COSMO/SkyMed, Radarsat) should ensure an acceptable first level of control.The revisitation time, the near real time transmission with fast processing is an effective answer to the need of the Maritime Security Authorities.

  1. Secure E-Business applications based on the European Citizen Card

    Science.gov (United States)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  2. European energy security analysing the EU-Russia energy security regime in terms of interdependence theory

    CERN Document Server

    Esakova, Nataliya

    2012-01-01

    Nataliya Esakova performs an analysis of the interdependencies and the nature of cooperation between energy producing, consuming and transit countries focusing on the gas sector. For the analysis the theoretical framework of the interdependence theory by Robert O. Keohane and Joseph S. Nye and the international regime theory are applied to the recent developments within the gas relationship between the European Union and Russia in the last decade. The objective of the analysis is to determine, whether a fundamental regime change in terms of international regime theory is taking place, and, if so, which regime change explanation model in terms of interdependence theory is likely to apply.

  3. European energy security. Analysing the EU-Russia energy security regime in terms of interdependence theory

    Energy Technology Data Exchange (ETDEWEB)

    Esakova, Nataliya

    2012-07-01

    Nataliya Esakova performs an analysis of the interdependencies and the nature of cooperation between energy producing, consuming and transit countries focusing on the gas sector. For the analysis the theoretical framework of the interdependence theory by Robert O. Keohane and Joseph S. Nye and the international regime theory are applied to the recent developments within the gas relationship between the European Union and Russia in the last decade. The objective of the analysis is to determine, whether a fundamental regime change in terms of international regime theory is taking place, and, if so, which regime change explanation model in terms of interdependence theory is likely to apply. (orig.)

  4. Ensuring Security of Supply of Natural Gas in the European Union’s Common Energy Policy

    Directory of Open Access Journals (Sweden)

    Andrei Teofil Postolachi

    2013-08-01

    Full Text Available The problematic of energy policy is nowadays widely disputed in the European Union community. In a global context characterized by highly and raising dependency of the economic activity on the energetic resources, the European authorities had launched a strategy in this sector which regards the problems of access to secure and affordable energy products. The aim of this paper is linked to the natural gas field of the European energetic concerns, and it assumes the high dependency of internal consumption on imports, more than half of the natural gas that is used in the 27 states comes from abroad. Ensuring a higher level of security in the supply is one of the goals that European Union wants to achieve on medium and long term. In these circumstances, actual measurements take into account different type of actions: stabilize relations with existing partner gas exporters (Russia, Algeria, Norway; diversification of transport routes coming from these countries, especially in the idea of trying to avoid transit countries (mainly Ukraine and Belarus; and finally opening discussions and investing in alternative routes which should transport the gas from new suppliers placed in the Caspian Sea or Central Asia region.

  5. Response of Central European Civil Security Systems to the Economic Crisis

    Directory of Open Access Journals (Sweden)

    Brázová Věra - Karin

    2015-12-01

    Full Text Available The public sector across Europe and elsewhere was affected by the economic crisis which fully unfolded in 2008. Considerable attention has been paid in the literature to the impacts of related budgetary cuts on social welfare, while some other areas remain largely under-researched. One of such areas is the so-called civil security, where no such endeavour has been attempted so far. In order to fill this gap, the paper examines the civil security systems of Central European countries (Czech Republic, Slovakia, Poland and Hungary, employing a qualitative comparative analysis. Taking on the systems perspective, the article inquires how the stress posed by the economic crisis affected the civil security systems - their structure and financing. The paper builds on the findings from a 7th FP project, “ANVIL”, within which data on civil protection and disaster management systems were collected.

  6. Study evaluating the status quo and the legal implications of third party liability for the European Security Industry

    NARCIS (Netherlands)

    Bergkamp, L.; Faure, M.G.; Hinteregger, M.; Philipsen, N.J.

    2013-01-01

    Third party liability has been identified as an issue that could adversely impact the European security industry. Limitless third party liability for security product and services is believed to have the potential to reduce investments in innovation. In the US, the Safety Act (discussed in this

  7. Study evaluating the status quo and the legal implications of third party liability for the European Security Industry

    NARCIS (Netherlands)

    Bergkamp, L.; Faure, M.G.; Hinteregger, M.; Philipsen, N.J.

    2013-01-01

    Third party liability has been identified as an issue that could adversely impact the European security industry. Limitless third party liability for security product and services is believed to have the potential to reduce investments in innovation. In the US, the Safety Act (discussed in this stud

  8. Study on the Evaluation of the European Union Agency for Network and Information Security

    DEFF Research Database (Denmark)

    Attström, Karin; Ludden, Vanessa; Lessmann, Franziska

    The European Union Agency for Network and Information Security (ENISA) was established in 2004. The Agency provides advice and recommendations, data analysis, and supports awareness raising and cooperation by the EU bodies and Member States in the field of cybersecurity. ENISA uses its expertise......, and positioning with respect to other EU and national bodies. It assesses ENISA’s strengths, weaknesses, opportunities and threats (SWOTs) with regard to the new cybersecurity and digital privacy landscape. It also provides options to modify the mandate of the Agency to better respond to new, emerging needs...

  9. Green paper. Towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  10. Gazprom, the Kremlin and the European energy security; Gazprom, het Kremlin en de Europese energieveiligheid

    Energy Technology Data Exchange (ETDEWEB)

    Kneppers, S.

    2011-04-15

    The author discusses possible consequences of the relationship between Gazprom and the Kremlin and its impact on European energy security. Under Vladimir Putin's presidency, Moscow reasserted control over the Russian gas sector. Since 2005 the Russian state owns a controlling stake in Gazprom. After the Russian-Ukrainian gas crises of 2006 and 2009 Europe's dependence on Russian gas supplies has become a source of concern to the EU member states. It was feared that Russia might use Gazprom and its gas supplies as political leverage in Europe. Additionally, concerns were raised about a shortfall in Russian gas production in the near future. Moreover, it was asserted that European energy security could be further endangered by the establishment of a gas cartel, in which Russia would play a leading role. However, the financial crisis of October 2008, the rapid growth in US production of unconventional gas, and an increase in supply of LNG have changed the global energy market. [Dutch] De auteur bespreekt de mogelijke gevolgen van de relatie tussen Gazprom en het Kremlin en de impact ervan op de Europese energieveiligheid. Onder voorzitterschap van Vladimir Poetin, bevestigde Moskou opnieuw haar controle over de Russische gassector. Sinds 2005 heeft de Russische staat een meerderheidsbelang in Gazprom. Na de Russisch-Oekraiense gascrisissen van 2006 en 2009 is de afhankelijkheid van Europa voor de levering van Russisch gas uitgegroeid tot een bron van zorg voor de EU-lidstaten. Gevreesd werd dat Rusland Gazprom en haar gasvoorziening zou gebruiken als politiek middel in Europa. Daarnaast werden zorgen geuit over een tekort in de Russisch gasproductie in de nabije toekomst. Bovendien werd beweerd dat de Europese energieveiligheid verder zou kunnen worden bedreigd door de oprichting van een gaskartel, waarin Rusland een leidende rol speelt. Echter, de financiele crisis van oktober 2008, de snelle groei in de VS van de productie van onconventioneel gas, en een

  11. Spanish security policy in the New Europe : Mediterranean dimension and European instruments

    Directory of Open Access Journals (Sweden)

    Esther Barbé

    1993-07-01

    Full Text Available The changes that have occurred in Europe in the last few years have left the bipolar order of the cold war behind, giving way to a system in process of transformation and one characterized by geographical indefinition.Two dominant tendencies appear in the New Europe : on one side the changes in the mental map (on some occasiones reliving former territorial conflicts and on the other the symbolism of the EC, a magnetic pole of attraction that has converted the Europe of the 90s into the defining axis of the new external frontier.This moving towards Central Europe and the East revives in Spain feelings of periphery and increasing uncertainty. Within this framework, Spanish security policy has centred itself on its particular, historical and geographcal objectives : the mediterranean dimension. Among the instruments two are highlighted as being of particular importance : the concept of security beyond military reach, including economic cooperation and the institutional reform of the future European defence through the development of the Maastricht Treaty.

  12. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  13. A Glance to Turkey-EU Relations from the Security Perspective: Incorporation of Turkey into the EU is Necessary for European Security would Strengthen the Prospects of Turkey's Integration

    Directory of Open Access Journals (Sweden)

    Umit Kurt

    2016-01-01

    Full Text Available This study argues that Turkey's inclusion into the EU is important for the EU's security role. An essential reason behind the European Council decision to raise Turkey's status to that of candidate country is the EU's evolving security role. In other words, the estimates of the potential benefits of Turkey's inclusion into the EU's Common European Security and Defense Policy (CESDP and the costs entailed by its exclusion essentially shape the EU's policy towards Turkey.

  14. Security of energy supply under the laws of the European Union / European Community; Energieversorgungssicherheit im Recht der Europaeischen Union, Europaeischen Gemeinschaft

    Energy Technology Data Exchange (ETDEWEB)

    Proefrock, M.C.

    2007-07-01

    Security of supply is defined as the availability and reliability of energy supply at acceptable prices. By security of energy supply we mean a globally large supply of reliable, affordable, clean energy. By virtue of its nature security of supply in the energy sector primarily requires making provisions for the future through exploration, innovation, research, diversification and investments in technology. Energy politics takes place in a tension field defined by the goals of economic efficiency, sustainability and security of supply. In the past there have been repeated shifts within this triad of goals. The task for a rational energy policy is to reconciliate these goals in a meaningful way. European energy policy is understood to comprise all sovereign measures taken by the European Union in the energy sector, in particular measures that impact on the supply and demand for energy resources. Energy law serves, or should serve, to bring energy policy to realisation and therefore presupposes the existence of the latter. Energy policy means the figuration of an economy's energy sector in such a manner that the present and future demand of the economic region is covered.

  15. Security as a legal obligation. About EU legislation related to security and Sarbanes Oxley in the European Union.

    Directory of Open Access Journals (Sweden)

    Edwin JACOBS

    2005-06-01

    Full Text Available Since the Sarbanes-Oxley Act there is a worldwide focus on security issues in general. This new focus seems to emphasise that security is a new kind of legal obligation. However, security is already a legal obligation for all EU companies since the early nineties. On top of that, in electronic banking there is a whole range of legal obligations in some way related to security, that were already (and remain applicable, notwithstanding a possible application of the Sarbanes-Oxley Act on some EU companies. The criterion of what can be 'reasonably expected' as 'bonus pater familias' from service providers, but equally also from their customers, becomes increasingly important.

  16. SecurIST: Ensuring Secure, Dependable & Resiliant ICT Technologies to Empower the European Citizen of the Future

    OpenAIRE

    Clarke, James (James H.); Fitzgerald, William M.

    2006-01-01

    Industry and companies are benefiting significantly from the increased productiv-ity, competitiveness and customer satisfac-tion provided by mobility. However, to be viable in the future, mobility must address the foremost challenge confronting it today ensuring a high level of security to protect the enterprise network and the valuable in-formation it carries, dependability along with subscriber privacy issues. With the advent of mobility, security is even more important than before. Any exi...

  17. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Directory of Open Access Journals (Sweden)

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  18. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Directory of Open Access Journals (Sweden)

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  19. Understanding the Role of Bureaucracy in the European Security and Defence Policy: The State of the Art

    Directory of Open Access Journals (Sweden)

    Maurer Heidi

    2010-08-01

    Full Text Available The establishment of the European Security and Defence Policy (ESDP in 1999 has led to the creation of a whole range of bureaucratic bodies in Brussels and the national capitals. These bodies support the crisis management operations of the European Union. This review article presents the state of the art of academic research on the role of bureaucracy in this recent policy area. It argues that the growing institutional complexity and the constant interaction between actors at the national and European level require scholars to go beyond the dominant approaches of International Relations. Using insights from comparative politics, public administration and multi-level governance, this article considers four important questions: who these civil servants are, why they matter, how they interact, and how they are controlled politically and democratically.

  20. Europol’s Cybercrime Centre (EC3), its Agreements with Third Parties and the Growing Role of Law Enforcement on the European Security Scene

    DEFF Research Database (Denmark)

    Vendius, Trine Thygesen

    2015-01-01

    The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community approach” the EC3 is concluding partnerships with member...... states, European agencies, international partners and the private sector. This article describes the coming about of EC3 and its efforts to address cybercrime. Furthermore, the article is an attempt to assess the growing role of the European law enforcement community on the European security scene...

  1. A Common European Security and Defense Policy in the European Union: Greek Policy and Strategy on ESDP

    Science.gov (United States)

    2003-06-01

    create such an empire, and an army for all of Europe. That leader was Charlemagne , or Charles the Great, King of the Franks and Emperor of the Holy...army responsible for the security and defense of all Europe. Charles, King of the Franks, known as Charlemagne , who became the supreme ruler of...Western Europe when crowned Emperor on Christmas Day in the year 800 AD,3 rose from such a power vacuum and the lack of such an army after the fall of

  2. South Stream and Nord Stream 2 - Implications for the European Energy Security

    Directory of Open Access Journals (Sweden)

    Daniela Munteanu

    2016-11-01

    Full Text Available Energy security is the main issue on EU agenda. While the European Commission is looking forward to diversifying its gas imports and tackling any further energy crisis, and climate change, Russia – the major exporter to Europe does not intend to lose its share of the European market. In the past ten years several energy projects have been initiated and lobbied by both businesses and politicians. In this paper we will discuss two of these projects – Nord Stream 2 and Turkish Stream. While their commercial aims, though most certainly in contradiction with EU legislation, are more or less clear, their political feasibility is questionable. While the Turkish Stream is almost suspended, the Nord Stream 2 is still under discussion. Many speculations are made around the geopolitical aims of the stakeholders and their partisanship. That because energy is highly politicised and any project in the area influences and is influenced by the political and geopolitical context. National interests collide within European Union and go against its legislation and energy strategy. We will try to draw an overview of the both political and economic motives that drive these projects, make an analysis of their feasibility as well as give an explanation to their failure or potential success. We will do that against the current political backdrop trying to connect all the variables and draw a conclusion of the possible future implications for European Union. For that we used the most recent and updated literature and newspaper articles. | "South Stream e Nord Stream 2 – Implicações para a Segurança Energética Europeia". A segurança energética é a principal questão da agenda da UE. Embora a Comissão Europeia esteja ansiosa para diversificar as suas importações de gás e combater qualquer futura crise energética e as alterações climáticas, a Rússia - o principal exportador de gás para a Europa não tem a intenção de perder a sua quota no mercado

  3. Security Policy in the European Union and the United States through the issue of their Defence Expenditures

    Directory of Open Access Journals (Sweden)

    Dr. Theodore Metaxas

    2012-01-01

    Full Text Available This article aims to clarify how the level of defence expenditures affected security poli-cy in the post-World War II Europe and the United States till the present day. We first analyze theoretically the issue of a nation’s power through its defence outlays. We then proceed to the examination of how security policy was formulated during Cold War and afterwards for both Europe and the United States through their defence ex-penditures. By comparing European to United States defence budgets ceilings we found that the European military capabilities are undermined by the low level of the defence budget which is provided by the European Union member states as a whole, as well as by the lack of homogeneity in military means. By contrast, we noticed that the historically large US defence expenditures were one of the major reasons for the US global hegemony during Cold war and afterwards. We also examine the implica-tions that defence expenditures have on military industry, macroeconomic perfor-mance and geopolitics and the correlation that arises among them.

  4. ECURITY AND SECURITY RELATED RESEARCH WITHIN THE EUROPEAN UNION AND THE SLOVAK REPUBLIC

    Directory of Open Access Journals (Sweden)

    Milan SOPÓCI

    2014-04-01

    Full Text Available The article presents current aspects of security and security related research. Due to current threats, it emphasizes new measures taken by EU member states and that are focused on science and security research. It underlines particular EU projects and the involvement of individual member states in these activities. The article refers to the position of the Slovak Republic (SR in relation with EU countries and the reflection of some activities in the development programs within the Slovak Department of Defense.

  5. CSCE as the Central Forum of the Future European Collective Security Structure

    Science.gov (United States)

    1992-04-13

    Bukowski , Charles . "Yugoslavia and the Conference on Security and Cooperation in Europe." Coexistence, Vol.28, No.4, 1991, pp.371-389. Chalmers, Malcolm. "An...neutral states with small armed forces than for states with larger armed forces dictated by security. Charles and Clifford Kupchan 25 An alternative...security organization can be found in Charles and Clifford Kupchan’s proposal that recognizes the need to reflect power realities, while preserving the

  6. Economic separatism in the European Union member states as a factor of regional security

    Directory of Open Access Journals (Sweden)

    A A Shakhina

    2014-12-01

    Full Text Available The article is devoted to the examination of the economic separatism problem in the European Union member states. It considers specific of the regional separatist movements as exemplified by the conflicts in Scotland, Catalonia, Bavaria, Flanders. Various points of view on the relevance of the budgetary separatism for the European integration process are given in the article.

  7. Causes, rationales and dynamics : exploring the strategic security partnership between the European Union and Africa

    NARCIS (Netherlands)

    Siradag, Abdurrahim

    2012-01-01

    This study examines a strategic partnership in the areas of peace and security between the EU and Africa. The EU has been strengthening its institutional ties with African organisations since 2000, with security relations with Africa a priority on the EU’s agenda following the 9/11 attacks on the Un

  8. Motives for European Union Common Security and Defense Policy Mission Selection

    Science.gov (United States)

    2011-03-01

    ABBREVIATIONS CDU Christian Democratic Union CFSP Common Foreign and Security Policy CSDP Common Security and Defense Policy DRC Democratic Republic of...rightist party, the Christian Democratic Union ( CDU ), was for it. In France the Union for the Popular Movement (UMP), closely aligned with the former

  9. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  10. Energy security and European Union. Proposals for the French presidency; Securite energetique et Union Europeenne. Propositions pour la presidence francaise

    Energy Technology Data Exchange (ETDEWEB)

    Mandil, C

    2008-04-15

    This report treats of energy security and of the two related topics which are the fight against climatic change and the economic growth. The first chapter analyses the energy risks that we will have to face. It makes a difference between the long-term risks (depletion of energy resources) and the short-term risks (supply disruption). Concerning the short-term risks, it is recalled that most of the supply incidents have an internal cause and that imports can have advantages and not only drawbacks. The second chapter approaches the delicate problem of European harmonization between the speech and the action when the energy security is in concern. A conclusion of this chapter is that the 'speaking with a single voice' goal can be reached only if improvements are made in the domain of solidarity between member states. The completion of the internal energy market is therefore a priority and the mission of regulators must include the security aspect. The third chapter treats of the particular case of the relation with the Russian supplier. It suggests to work for a lower energy dependence with respect to Russia, by developing the energy efficiency, the LNG industry, the renewable energies and the nuclear energy. The fourth chapter deals with the relations with the Caspian sea surrounding countries in the perspective of gas exports towards Europe. Here again, the cooperation with Russia is of prime importance. It approaches also the problem of the gas negotiation with Turkey which requires a significant improvement of the consistency of European diplomacy in this area. The last chapter treats of the role of international organisations and of the dialogue in the domain of energy. It suggests some paths to develop the confidence between the different intervening parties. It stresses on the lack of transparency which disturbs the markets and weakens the security. (J.S.)

  11. European Security through EU-Russian Relations: Towards a New Multilateral Order?

    Directory of Open Access Journals (Sweden)

    Sandra Fernandes

    2011-05-01

    Full Text Available Since the end of the Cold War, the EU and Russia have managed to create an original framework for institutionalised cooperation despite asymmetric characteristics. Yet, the way these two main security actors interact has an impact on the (non-resolution of security issues in Europe, ranging from ‘‘frozen conflicts’’ to the discussion of the security architecture. Since the second mandate of President Putin, the relation has been characterised by two paradoxical features. On the one hand, the methodology and the domains of cooperation have reached a high degree of achievement. On the other hand, the political quality of the relationship has deteriorated and it is not able to achieve the desired ‘‘strategic partnership’’ that should be based on a common set of values and principles. This article aims to define multilateralism as a paradigm applicable to EU-Russian relations. It examines their relationship in the security and defence realm and the Union’s reactions to a new security approach by Russia since the 2008 Medvedev proposal. The article questions how the EU-Russian political dialogue impacts on multilateralism in the security field. The conclusion considers EU-Russian relations as a peculiar multilateral playground addressing common security challenges, which still needs to be developed further in order to be instrumental in the search for collective and legitimate solutions.

  12. Civil-Military Relations in European Security Institutions - Challenges of Multi-Institutionality in Peace Operations

    Science.gov (United States)

    2007-03-01

    Enciclopedia Publishing House, 2002), 593 14 Mark A. Bucknam. Responsibility of Command. How UN and NATO Commanders Influenced Airpower over Bosnia...Relation: Democratization, Reform, Security, Maior, George Cristian and Watts, Larry eds. Bucharest: Enciclopedia Publishing House, 2002. Cousens

  13. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-06-15

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  14. The impact of European Registers of Road Transport Undertakings on security and enforcement of the system of digital tachograph

    Science.gov (United States)

    Rychter, M.; Rychter, R.

    2016-09-01

    Secure digital tachograph system is indisputably a means having the great influence on road safety, enforcement of the social conditions for drivers in road transport as well as supporting the fair competition between road transport undertakings. In order to better monitor the compliance of road transport with the rules in force, inter alia the provisions on usage the digital tachographs, the European Union regulation introduces the European Registers of Road Transport Undertakings (ERRU), a system that allows a better exchange of information between Member States. The main purpose of this analysis is to present the measures for enforcement the execution of the provisions on obligation of installation and usage of digital tachographs in road transport and for improving the security of data recorded within digital tachograph system especially through exchange of the information on the most serious infringements committed by hauliers in any Member State, which may lead to the loss of good repute and the e-document engineering method used by the ERRU system.

  15. Can the European Union’s Market Liberalism Ensure Energy Security in a Time of ‘Economic Nationalism’?

    Directory of Open Access Journals (Sweden)

    Francis McGowan

    2008-07-01

    Full Text Available The EU’s higher profile in energy policy matters is arguably due to the increased importance of market liberalisation as a policy objective over the last twenty years. Given the EU’s own competences in the internal market and competition policy, the European Commission has accordingly been able to play a more active role in energy policy-making. Moreover it has been active in extending this approach to its energy relations with its neighbours as manifest in the Energy Charter Treaty, the European Energy Community Treaty and bilateral agreements with third countries. The European Commission has been keen to assert the centrality of market liberalisation to its future energy policy and energy diplomacy, notwithstanding the changes that have taken place in energy markets. Given that there appears to be an increased interest in ‘national champions’ amongst both energy exporting countries and at least some EU member states, how far can the EU sustain a strategy of market liberalisation? The article will place current policy dilemmas (and the EU’s role in the context of a shifting energy policy agenda – essentially from a supply security ‘economic nationalism’ to market liberalism and back again. It then considers how EU policy is adapting to these circumstances and assesses the effectiveness of this response.

  16. LNG REGASIFICATION TERMINALS ACCESS CAPACITY ANALYSIS FOR SECURITY OF EUROPEAN NATURAL GAS SUPPLY

    Directory of Open Access Journals (Sweden)

    Matija Veselić

    2011-12-01

    Full Text Available Increasing natural gas consumption, declining North Sea gas reserves, increased production costs and the deregulation of European gas and electricity markets have all combined to create new opportunities for LNG in Europe. In these circumstances, LNG represents an opportunity for many European countries to diversify their natural gas supply, while decreasing their dependence on Russian natural gas import at the same time. The largest exporters of LNG to Europe are Qatar, Algeria, Nigeria, Trinidad & Tobago, Egypt and Oman. Spain, Great Britain and France are the largest European importers of LNG. Spain has six LNG regasification terminals, followed by four in Great Britain, three in France, two in Italy and Turkey and finally Greece and Portugal with one terminal each. New LNG regasification terminals are currently under construction in Italy, Spain, Sweden and Netherlands. In addition, more than 30 new LNG terminal projects have been proposed around Europe. Italy plans to construct as many as 10 new regasification terminals, due to the strong orientation of its national energy policy towards LNG. Many European countries are strongly considering participating in the LNG chain for the first time, namely Albania, Cyprus, Ireland, Lithuania, Germany, Poland, Romania, Ukraine and Croatia. This paper focuses on a specific aspect of the LNG supply chain: the import facility (the paper is published in Croatian.

  17. European energy security: Towards the creation of the geo-energy space

    Energy Technology Data Exchange (ETDEWEB)

    Mane-Estrada, Aurelia [G.A.T.E.-Barcelona Univ., Barcelona (Spain)

    2006-12-15

    The last changes in the energy scene had culminated in an even-growing capacity of influence of the private energy majors on the political and governmental decisions. However, the European Union has at its disposal the necessary elements - the EU-Russia Energy Dialogue and its relationship with Turkey - that could became a useful regional instrument in order to strengthen the EU's position in the International Energy Scene (IES). That is why the purpose of this paper is to propose the creation of a regional energy block, as a new way of understanding energy policies. We shall define this block as a pan-European geo-energy space. To this end, the present work is divided into three parts. Firstly, we will explain the failure of the policies founded on the Market and Institutions approach. Secondly, and within the actual context of the IES, we seek to point out which elements could support the option of a European regional strategy. Finally, in the third part, we will establish that the existence of the EU-Russia Energy Dialogue and the future incorporation of Turkey are the foundations from which a hypothetical pan-European geo-energy space can be built. (Author)

  18. Between Development and Security: The European Union, Governance and Fragile States

    NARCIS (Netherlands)

    W. Hout (Wil)

    2009-01-01

    textabstractThis paper presents an analysis of recently adopted EU policies on fragile states. While the European Union has incorporated governance issues into its strategies for fragile states, its approach to governance has a highly technocratic character, with a strong emphasis on public sector r

  19. West European Defense Identity: Implications for U.S. Security Policy

    Science.gov (United States)

    1992-06-01

    Garrett has listed terrorists and modern-armed Third World regional bullies " as the major threats in the European and Middle Eastern theater", while House...Debate on the Constitution: The Social State, Plebiscite, the Right to Housing, and Kindergarten ," Frankfurter Allgemeine, December 4, 1991, 5 (FBIS-WE

  20. Social security and free movement in the EU : European coordination – Legal loopholes – Welfare tourism?

    NARCIS (Netherlands)

    Cremers, Jan

    2016-01-01

    Second contribution in the series INT-AR papers. This paper is dedicated to an overview of the coordination of social security rules in the EU, to the existing loopholes and to the question whether there is any social welfare tourism.

  1. Do European Banks with a Covered Bond Program still issue Asset-Backed Securities for funding?

    NARCIS (Netherlands)

    Boesel, Nils; Kool, C.J.M.; Lugo, S.

    2016-01-01

    The decline in the issuance of Asset-Backed Securities (ABS) since the financial crisis and the comparative advantage of Covered Bonds (CBs) as a funding alternative to ABS raise the question whether banks still issue ABS as a mean to receive funding. Employing double-hurdle regression models on a d

  2. Eploring rating shopping for European tripple A senior structured finance securities

    NARCIS (Netherlands)

    Fabozzi, F.; Nawas, M.; Vink, D.

    2016-01-01

    In much of the research with respect to the use of credit ratings, the notion of rating shopping features prominently. One form of rating shopping predicts that investors price the risk that arises when securities have fewer than three ratings. Inconsistent with what rating shopping would predict,

  3. Flexibility and security for older workers: HRM-arrangements in four European countries

    NARCIS (Netherlands)

    Tros, F.

    2010-01-01

    National policies in the Netherlands, Denmark, Germany and Belgium show policy shifts towards active ageing and towards flexicurity to enhance flexibility and security in the labour market. The main question is about the practice and implementation of these macro policies on the workplace level.

  4. Flexibility and security for older workers: HRM-arrangements in four European countries

    NARCIS (Netherlands)

    Tros, F.

    2010-01-01

    National policies in the Netherlands, Denmark, Germany and Belgium show policy shifts towards active ageing and towards flexicurity to enhance flexibility and security in the labour market. The main question is about the practice and implementation of these macro policies on the workplace level. The

  5. Between Development and Security: The European Union, Governance and Fragile States

    NARCIS (Netherlands)

    W. Hout (Wil)

    2009-01-01

    textabstractOver the past five to seven years, most international aid donors have started to pay attention to so-called ‘fragile states’. Generally, the interest in state fragility was spurred by security considerations in the wake of the terrorist attacks of ‘9/11’. Fragile states came to be seen a

  6. Do European Banks with a Covered Bond Program still issue Asset-Backed Securities for funding?

    NARCIS (Netherlands)

    Boesel, Nils; Kool, C.J.M.; Lugo, S.

    The decline in the issuance of Asset-Backed Securities (ABS) since the financial crisis and the comparative advantage of Covered Bonds (CBs) as a funding alternative to ABS raise the question whether banks still issue ABS as a mean to receive funding. Employing double-hurdle regression models on a

  7. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...

  8. The Franco-German Concordat: The Key to Future Western European Security and Stability

    Science.gov (United States)

    1990-02-20

    34)v this was publicly changed under President Pompidou to focus on the Soviet Union. 2 1 This targeting doctrine has remained largely unchanged, and the...the SPD, the German people chose to place the major promoters of the Atlantic and West European circles, the right-of- center Christian Democratic Union...34Beyond INF: West Germany’s Center -Right Party and Arms Control," International Affairs Volume 65 (1) (Winter 1988/89), pp. 54-74. 9. Daniel Colard

  9. Russia’s Proposal for a European Security Treaty: Motives and Implications

    Science.gov (United States)

    2010-09-01

    Towards a New Euro–Atlantic Security Architecture (London: Report of Russian Experts for the Valdai Discussion Club , December 2009), 13. 6...laws passed by the Duma authorizing military interventions to protect Russians and Russian speaking peoples in surrounding states, and in the new...Russian-dominated economic club comprised of Russia, Kazakhstan, and Belarus. Claiming that Minsk owed it approximately two hundred million U.S. dollars

  10. Harmonization of social security law of Serbia with the law of European Union

    Directory of Open Access Journals (Sweden)

    Golubović Velizar

    2011-01-01

    Full Text Available In this work, the author shortly exposes Communitarian social security law and remained tasks of the harmonization of Serbian legislation in this field. Recently some amendments of legislation were made in order to strengthen principles of gender equality and prevent discrimination, to regulate employment of persons with disability, as well as to install supervision in Institutions for occupational retirement. Regarding the compulsory social insurance in Serbia it may be concluded that there exists a high degree of compliance with the EU legislation, with an exception of privileged mode of entitlement for old age and disability pensions for women and partial disability caused by work injury where it is necessary to conclude agreements on social security with 10 EU states members. On the other side, occupational retirement provision is partially incompatible with Communitarian social security law, i.e. with Directive 2003/41/EC in the field of technical provision, as well as with Directive 113/2004/EU regarding the obligation of equation of the life expectancy for both sexes.

  11. European energy security: An analysis of future Russian natural gas production and exports

    Energy Technology Data Exchange (ETDEWEB)

    Soederbergh, Bengt, E-mail: bengt.soderbergh@fysast.uu.s [Global Energy Systems, Department of Physics and Astronomy, Uppsala University, Laegerhyddsvaegen 1, Box 535, SE-751 21, Uppsala (Sweden); Jakobsson, Kristofer; Aleklett, Kjell [Global Energy Systems, Department of Physics and Astronomy, Uppsala University, Laegerhyddsvaegen 1, Box 535, SE-751 21, Uppsala (Sweden)

    2010-12-15

    The widening gap between EU gas production and consumption may require an 87% increase of import volumes between 2006 and 2030, and there are great uncertainties regarding the amounts of gas that can be expected from new suppliers. The potential of increased production from Norway and Algeria is limited; hence, Russia is likely to play a crucial part of meeting the anticipated growing gas demand of the EU. A field-by-field study of 83 giant gas fields shows that the major producing Russian gas fields are in decline, and by 2013 much larger supplies from the Yamal Peninsula and the Shtokman field will be needed in order to avoid a decline in production. Gas from fields in Eastern Siberia and the Far East will mainly be directed to the Asian and Pacific Rim markets, thereby limiting its relevance to the European and CIS markets. As a result, the maximum export increase to the European and CIS markets amounts only to about 45% for the period 2015-2030. The discourse surrounding the EU's dependence on Russian gas should thus not only be concerned with geopolitics, but also with the issue of resource limitations. - Research highlights: {yields}Natural gas production in the Nadym Pur Taz region (Western Siberia) will start to decline within a few years. {yields}New production from the Yamal peninsula is critical to ensure gas exports to Europe. {yields}Additional production in East Siberia and the Far East will not be available for the European market. {yields}Rapid gas demand growth in China might also lead to competition for gas from Western Siberia.

  12. The Creation of an Energy Security Society as a Way to Decrease Securitization Levels between the European Union and Russia in Energy Trade

    Directory of Open Access Journals (Sweden)

    Olga Khrushcheva

    2011-05-01

    Full Text Available The energy trade between the European Union and Russia is securitized due to a combination of factors. First, there are securitizing agents within the European Union. Second, the domestic consolidation of the energy sector under governmental control, the Gazprom monopoly on transportation networks linking Central Asian gas with European markets and the state imposed-limits on foreign direct investment may also raise concerns in the European Union. Finally, Russia is also securitizing the energy sphere by claiming that the EU is trying to impose its values on Russia (for example through the Energy Charter Treaty, which contradicts Russian interests. This article combines securitization theory and the English School of thought and argues that the creation of an Energy Security Society could help de-securitize energy trade between the European Union and Russia.

  13. Measuring the security of external energy supply in the European Union

    DEFF Research Database (Denmark)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy.......The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political...

  14. Russian gas and european energy security: Interdependence following the crisis with Georgia and the Ukraine

    Directory of Open Access Journals (Sweden)

    Domenico Gullo

    2009-12-01

    Full Text Available At the present time, gas represents one of the main energy raw materials that are used for producing electricity and other private uses. The dual political conflict between the Ukraine and the Russian Federation (winter 2005 and Christmas 2008 and 2009 has highlighted the EU’s position of structural weaknesses both in terms of the supply of its raw materials and as regards possible alternatives to Russia as an energy supplier. The European countries worst hit by Russian-Ukrainian tensions have been those with the greatest dependence on Russian gas. This crisis scenario has led governments to promote a common European energy policy with the aim of, in the future, being in a stronger position than Europe’s current one when negotiating with both Russia and all the other suppliers of energy sources. The article attempts to develop and analyse what has happened since 2005 between the two crises (also with particular references to the recent conflicts between Georgia and Russia in August 2008. The authors begin by analysing the main theoretical framework with respect to interdependence. They then go on to analyse the events, identifying and delimiting the movements of the actors so as to be able to understand both the present situation and the foreseeable consequences of same. In the last part, the authors attempt to analyse the different theoretical frameworks delimited at the beginning of the research by comparing them with the events that have taken place.

  15. European energy security. An analysis of future Russian natural gas production and exports

    Energy Technology Data Exchange (ETDEWEB)

    Soederbergh, Bengt; Jakobsson, Kristofer; Aleklett, Kjell [Global Energy Systems, Department of Physics and Astronomy, Uppsala University, Laegerhyddsvaegen 1, Box 535, SE-751 21, Uppsala (Sweden)

    2010-12-15

    The widening gap between EU gas production and consumption may require an 87% increase of import volumes between 2006 and 2030, and there are great uncertainties regarding the amounts of gas that can be expected from new suppliers. The potential of increased production from Norway and Algeria is limited; hence, Russia is likely to play a crucial part of meeting the anticipated growing gas demand of the EU. A field-by-field study of 83 giant gas fields shows that the major producing Russian gas fields are in decline, and by 2013 much larger supplies from the Yamal Peninsula and the Shtokman field will be needed in order to avoid a decline in production. Gas from fields in Eastern Siberia and the Far East will mainly be directed to the Asian and Pacific Rim markets, thereby limiting its relevance to the European and CIS markets. As a result, the maximum export increase to the European and CIS markets amounts only to about 45% for the period 2015-2030. The discourse surrounding the EU's dependence on Russian gas should thus not only be concerned with geopolitics, but also with the issue of resource limitations. (author)

  16. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  17. Security of supply

    OpenAIRE

    2007-01-01

    Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. Ramsay discusses security of energy supplies in a global market; Hasan M. Qabazard outlines OPEC’s abiding commitment to energy security.

  18. EUROPEAN POLICY REGARDING ENERGETIC SECURITY IN THE FIELD OF RENEWABLE ENERGY

    Directory of Open Access Journals (Sweden)

    Maria POPESCU,

    2015-12-01

    Full Text Available In recent years the European Union has been working continually to promote green energy. Renewable energy presents certain social, economic and environmental benefits, has a low environmental impact, therefore, can support economic growth on a sustainable basis. Theme analyzes progress in the EU, trends and long-term scenarios in renewable resources. Renewables have a high potential to stimulate EU industrial competitiveness. Developing new energy sources with low carbon is very important to avoid high costs of climate change and pollution conditions. Renewable energy can use all our energy requirements: electricity production, transport and domestic heating. Hydropower and wind are exclusively used for generating electricity, while biomass, geothermal and solar can be used to produce electricity and heat.

  19. Evolving towards a European administration of the issues of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Pablo Acosta Gallo

    2010-09-01

    Full Text Available Building Europe is a process that, for 50 years, has been characterised by a high degree of uncertainty, guided more by pragmatism than by ideological or dogmatic factors. However, the impact of the decisions adopted at the EU level on the social and legal sphere of EU citizens is one that is unquestionable and, furthermore, increasing. Among the most important aspects of EU law that have had the greatest individual impact are the measures that comprise the Area of Freedom, Security and Justice. True citizenship of the EU necessarily involves sufficient guarantees in these three areas, and the powers of the Union have committed themselves to constituting and strengthening these guarantees. Nevertheless, the successive EU enlargements have highlighted the shortcomings in this field. The entry of new countries into the EU provides economic capacity and social and cultural wealth, but it also adds new dimensions in the area of border control and of crime prevention and limitation, thereby increasing the need for greater capacity in the areas of policing and the law. Policies require institutions in order for them to be introduced. In the field of justice, Eurojust can be considered the embryo of an EU administration in this area. This is where the tension between the national and the EU is manifested.

  20. Security of supply and retail competition in the European gas market

    Energy Technology Data Exchange (ETDEWEB)

    Abada, Ibrahim, E-mail: ibrahim.abada@polytechnique.edu [IFP Energies nouvelles, 1 et 4 avenue de Bois Preau, 92852 Rueil-Malmaison (France); EDF Research and Development, 1 avenue du General de Gaulle, 92140 Clamart (France); EconomiX-CNRS, University of Paris Ouest (France); Massol, Olivier, E-mail: olivier.massol@ifpen.fr [Center for Economics and Management, IFP School, 228-232 av. Napoleon Bonaparte, 92852 Rueil-Malmaison (France); Department of Economics, City University London, Northampton Square, London EC1V 0HB (United Kingdom)

    2011-07-15

    In this paper, we analyze the impact of uncertain disruptions in gas supply upon gas retailer contracting behavior and consequent price and welfare implications in a gas market characterized by long-term gas contracts using a static Cournot model. In order to most realistically describe the economical situation, our representation divides the market into two stages: the upstream market that links, by means of long-term contracts, producers in exporting countries (Russia, Algeria, etc.) to local retailers who bring gas to the consuming countries to satisfy local demands in the downstream market. Disruption costs are modeled using short-run demand functions. First we mathematically develop a general model and write the associated KKT conditions, then we propose some case studies, under iso-elasticity assumptions, for the long-short-run inverse-demand curves in order to predict qualitatively and quantitatively the impacts of supply disruptions on Western European gas trade. In the second part, we study in detail the German gas market of the 1980s to explain the supply choices of the German retailer, and we derive interesting conclusions and insights concerning the amounts and prices of natural gas brought to the market. The last part of the paper is dedicated to a study of the Bulgarian gas market, which is greatly dependent on the Russian gas supplies and hence very sensitive to interruption risks. Some interesting conclusions are derived concerning the necessity to economically regulate the market, by means of gas amounts control, if the disruption probability is high enough. - Highlights: > We model retail competition using a Nash-Cournot framework. > Risk-neutral retailers decide their import policy among a set of risky producers. > Case 1: the German gas trade of the 1980s to understand the gas sources' choices. > Case 2: the current Bulgarian gas trade to study the market properties. > Conclusions about the market regulation for welfare optimization reasons.

  1. Dragon in Support Harmonizing European and Chinese Marine Monitoring for Environment and Security

    Science.gov (United States)

    Desnos, Yves-Louis; Zmuda, Andy; Li, Zengyuan; Gao, Zhihai

    2008-04-01

    ESA has been cooperating with National Remote Sensing Center of China (NRSCC), Ministry Of Science and Technology of China (MOST) in the development of Earth Observation (EO) applications for the last 15 years. In 2004, this cooperation was reinforced with the creation of a dedicated three-year EO science and exploitation programme called "Dragon". The programme brings together joint Sino-European teams to address 16 identified priority themes investigating land, ocean and atmospheric applications using data from ESA's ERS and Envisat missions. Detailed coordination of all requested acquisitions over China has been performed since the programme started. Consequently a large amount of data has now been delivered.The results of the joint teams' research have been presented at annual Symposia and regular progress meeting with Chinese scientists in Beijing. The mid term results of the programme have been published as a joint ESA and NRSCC publication entitled "Proceedings of Dragon Programme Mid Term Results (SP-611)". Since then, notable results have been achieved in all the thematic areas under investigation exploiting both archive ERS and Envisat instrument data, for example: • Forest cover and forest biomass maps of NE China using ERS SAR tandem data from the 1990s and change detection using up-to-date forest maps based on ASAR AP data• Flood monitoring and mapping and NRT information provision to local and national authorities• Ship cruises for collection of validation data in support of ocean colour studies • Exploitation of the ASAR, RA, MERIS and AA TSR sensors for bio-physical parameter retrieval for China seas• Quantification and modelling of NO2, CO and CH4 levels and their increasing trend since the 1990s •Mixing and modelling and changes in NO2 distribution and concentration in the middle atmospheric layers • Rice mapping and methane modelling exploiting Envisat's optical, SAR and atmospheric sensors• Impact of the Olympic games on the

  2. Challenge for the national security of the Republic of Serbia in the concept of common European values

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2016-01-01

    Full Text Available Peaceful future based on common values, as a motive for the integration of the peoples of Europe, implies discontinuity with value-concepts that were the cause of conflicts. When the European Union and its member states ignore the promotion of the Ustasha's ideological concept which caused great evil to Serbia, as a neighboring country and a candidate for EU membership, the doubt arises whether the current value concept contains elements of challenge for the candidate's national security. In this article, we assume that the historical legacy of Nazism has influenced the shaping of European values. The analysis starts from the Nazi views embodied in the root of the interest for unity of Europe, and the factors of influence of the Nazi value order after World War II. The idea of unified Europe can be attributed to Nazis, who had territorial ambitions in terms of Europe as the living space of the Germanic race, under the dominance of Germany. During the war, there was a significant level of collaboration in European states, while Nazis basically aimed to annihilate Jews, Slavs and Gypsies. After the war, anti-Nazism was marginalized, due to the Cold War against communism and the Soviet Union. The identified trends are analyzed in the context of shaping the value system at the time of neo-liberalism and globalization. After the undermining of the international financial system in 1971, and the rise of neo-liberalism, globalization has generated a trend of centralization and financial domination. This is accompanied by neo-conservative doctrine and politics, which promote realism in international relations, and 'desovereignization' of nation states. The example of the coup d'état and civil conflict in Ukraine exposed tolerance for ultra-nationalistic and neo-Nazi ideas. We find that elitism and imperialism remain as value similarities between the Nazi and the current neo-liberal European value discourse, and that there is an essentially identical

  3. Energy Security and Climate Change in the European Union,China and Latin American Relationships:Major Challenges and Areas of International Cooperation

    Institute of Scientific and Technical Information of China (English)

    Maria; Cristina; Silva; Parejas

    2009-01-01

    The author discusses the subject in both ecological and political perspectives based on a most comprehensive,authoritative and updated bibliography.Hence,Latin America and the Caribbean(LAC) is as much diversified as there are sub-regions and regional organizations in geopolitical and geo-economical terms and often dialectic regarding energy security,climate change and LAC ties with Europeans and China and so is the tripartite relations with the rest of the world so far as energy security and climate cha...

  4. Maintaining the Critical Balance: The United States, NATO, and the European Security Equilibrium in the Post-Cold War Operating Environment

    Science.gov (United States)

    2012-06-08

    security requirements and the foreign policy dogma inspired by Soviet Communism.”36 Despite Kennan’s later reflections that he felt the likelihood...Southern European nations. Those prospective participants, hoping to benefit from inclusion in the Marshall Plan, then created the Interim Committee on...of a resurgent German threat as a result of Germany’s inclusion in this plan. Following a series of intricate diplomatic concessions with the

  5. OSCE and European Security

    Directory of Open Access Journals (Sweden)

    Mark Sigler

    1997-12-01

    Full Text Available Afirma Sigler, que desde una perspectiva multidimensional de la seguridad, el papel de la OSCE en la seguridad europea seguirá siendo importante tras la ampliación de la OTAN. El autor examina los instrumentos y mecanismos con que la OSCE aborda la prevención de crisis y conflictos, especialmente las actividades desarrolladas en Bosnia, Chechenia, el Báltico y el Cáucaso. La OSCE, que intenta reforzar la cooperación en temas de seguridad, es una organización única para abordar los retos actuales y futuros para la seguridad del continente, incluyendo situaciones en algunas zonas de la antiguaUnión Soviética. Su tamaño –54 miembros– su capacidad de innovar y su flexibilidad, y su toma de decisiones consensuada hacen que la OSCE sea efectiva en temas como la temprana prevención de conflictos, Derechos Humanos, asuntos sociales, desarrollo económico, preocupaciones medioambientales y acuerdos de control de armamentos.No obstante, Sigler señala que el papel de la OSCE en temas de seguridad viene limitado por las características de las actividades de mantenimiento de la paz, ya que éstas requieren el acuerdo político previo de las partes implicadas en un conflicto.

  6. The Ultimate Stumbling Block? The Common Foreign and Security Policy, and Accession of the European Union to the European Convention on Human Rights

    DEFF Research Database (Denmark)

    Butler, Graham

    2016-01-01

    The protection of human rights within Europe diverges between two systems. On the one hand, there are 28 Member States of the European Union; and on the other are 47 states, including 19 other non-EU states that are a party to the Convention. For states that wish to become Member States of the EU...

  7. Securitatea statelor europene: anomie vs asimetrie in strategii (The security of the European states: anomy versus asymmetry in strategies

    Directory of Open Access Journals (Sweden)

    Titel Iulian IOVA

    2015-12-01

    Full Text Available The summary analysis of the security programmatic documents reveals the presence of some new elements of the security environment called asymmetric risks, unconventional risks or new type risks. All these don’t offers clues about the their nature and impact on the stability of states. The only common opinion relates to their novelty. In the same time, asymmetric risks are seen as a number of studies, even military ones, which are not developed in detail. I thought, in the same measure, that should be interesting and useful an approach which aim is to offer a deep explanation about this phenomenon. The utility is given by the possibility of using our study’s conclusions in the design and development of the security strategies, including a sectoral vision that takes into consideration the real changes in the security environment and which ensures a coherent working mode of the security system in front of these new types of risks.

  8. Restrictions on European Union Citizens’ Freedom of Movement and Residence in the Country on Grounds of Public Policy, Public Security and Public Health

    Directory of Open Access Journals (Sweden)

    Junevičius Algis

    2016-02-01

    Full Text Available The free movement of persons is one of the most successful European Union projects, serving as a majorly important factor promoting the European integration processes. The adoption of the Treaty on the European Union and the creation of EU citizenship implemented significant changes: the status of EU citizens and their right to move and reside freely within the territory of the Member States can no longer be interpreted in the way it was before the adoption of the Treaty on the European Union. There are no requirements for EU citizens within the Treaty to pursue professional or independent activities or to work under an employment contract in order to access provided rights. However, the right of free movement is not unlimited. The administrations of the Member State governments are authorized to impose restictions on the free movement of citizens. In the light of these facts, this article examines exceptions in the field of free movement of persons and indentifies concepts of public policy, public security and public health. Special attention is given to so-called rule limitation of restrictions and to the mechanism of protection against expulsion from the country. The article concludes by saying that the institutions of Member State governments have the right to evaluate threats within the territory of the country and to decide on the content of public security by themselves. However, their discretion can not be used as an instrument to treat the conduct of other Member State citizens in a worse way than that of their own local citizens.

  9. 17 October 2013 - C. Ashton High Representative of the European Union for Foreign Affairs and Security Policy, Vice-President of the European Commission visiting the ATLAS cavern with ATLAS Collaboration Spokesperson D. Charlton; visiting the LHC tunnel at Point 1 with Technology Department Head F. Bordry and signing the Guest book with CERN Director-General R. Heuer.

    CERN Document Server

    Maximilien Brice

    2013-01-01

    17 October 2013 - C. Ashton High Representative of the European Union for Foreign Affairs and Security Policy, Vice-President of the European Commission visiting the ATLAS cavern with ATLAS Collaboration Spokesperson D. Charlton; visiting the LHC tunnel at Point 1 with Technology Department Head F. Bordry and signing the Guest book with CERN Director-General R. Heuer.

  10. The European Arrest Warrant in the Italian legal system. Between mutual recognition and mutual fear within the European area of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Franco Impalà

    2005-12-01

    Full Text Available Italy was the last Member State to transpose the Framework Decision on the European Arrest Warrant. The Italian law entered into full force on 14 May 2005, a full sixteen months later than the appointed date. Conversely, whilst the Framework Decision aimed to speed up extradition between Member States, the Italian implementation law seems to complicate things, providing for dozens of new legal obstacles to surrender. In fact, the execution of an EAW in Italy threatens to become something highly unpredictable. The responsibility for this outcome is shared by the national and the European legislator. Perhaps the latter underestimated the seriousness of the conflict between Third Pillar law and domestic constitutional systems which aim to protect their acquis in the field of fundamental rights. Considering that many Member States seem to be struggling with similar problems, the first part of this article is devoted to describing the current scenario and analysing possible solutions at the supranational level, such as the establishment of a coherent system regulating the allocation of penal competences among Member States. In the next part, the problem of the Framework Decision’s incompatibility with the Italian Constitution will be discussed, and in the final part the Italian implementation law is analysed in more detail.

  11. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    total defense expenditure figures were calculated using the European Central Bank ( ECB ) fixed rates to the euro in 1999 where possible, or the...earliest available annual average exchange rate provided by the ECB . For 2007 figures, where necessary, the ECB annual average exchange rates of the

  12. New Data Security Requirements and the Proceduralization of Mass Surveillance Law after the European Data Retention Case

    NARCIS (Netherlands)

    Zuiderveen Borgesius, F.; Arnbak, A.

    2015-01-01

    This paper discusses the regulation of mass metadata surveillance in Europe through the lens of the landmark judgment in which the Court of Justice of the European Union struck down the Data Retention Directive. The controversial directive obliged telecom and Internet access providers in Europe to r

  13. How Can France’s New NATO Policy Be Explained vis-a-vis European Security Cooperation?

    Science.gov (United States)

    2010-05-21

    PERFORMING ORGANIZATION REPORT NUMBER Dr. Charles Pentland, Director, Queen’c Centre for International Relations Queen’s University Robert Sutherland...States Army Dr. Charles Pentland Director, Queen‟s Centre for International Relations Disclaimer The views expressed in the...President George Pompidou initiated this divergence from Gaullism by lifting the French veto, allowing the U.K. into the European Community in 1973

  14. «GREEN» LOGISTICS AS A TOOL TO ENSURE ENVIRONMENTAL SECURITY AND INSTITUTIONAL INNOVATION SUBSOIL EUROPEAN ARCTIC

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2016-01-01

    Full Text Available This article is an overview of the major logistics and technology solutions to be implemented to streamline the subsoil use in the European Arctic. The theme of this work is very urgent, because Russia, despite the high resource base is underdeveloped institutional framework and resource extraction is characterized by the maximum level of loss of potential gross value of the hydrocarbon potential.The purpose of this article is to study Russian priorities at national and regional level, related to mining, through the use of «green» logistics as an instrument for environmental safety and institutional innovation subsoil of the European Arctic.Methodology. The methodological basis of this article are comparative, economic and statistical analysis methods.The results of this paper have become the solutions to problems, to achieve this goal, in particular: a substantiated conclusion that the Arctic is a world heritage and «climate laboratory» of the planet, so the development of the resource, industrial, transport and logistics potential of the region need to be based on «green» technologies; The article describes four environmentally-oriented direction (creating material and technical base, the formation of a safe icebreaker fleet, the development of new navigation and communication systems, power supply, which will enable to master the industrial, transport and logistics potential of the Arctic with minimal anthropogenic load.Conclusions. The following basic conclusions were as follows: first, subarctic and arctic areas are world heritage, so the development of deposits on them should be in the interest of the world community on a non-discriminatory  basis; secondly, hydrocarbon reserves, concentrated in the European Arctic, currently can not be extracted without environmental impacts, access to these resources is limited due to lack of development of the transport component, therefore, should be used aggressive techniques of extraction of

  15. Harmonization of domestic legislation in the field of civil law with the European Union law: Securing of claims by means of fiduciary agreements

    Directory of Open Access Journals (Sweden)

    Pajtić Bojan

    2012-01-01

    Full Text Available This paper analyses fiduciary agreements, which, as a form of contract, that is the means of securing obligation and legal claims, are regulated by provisions of specific laws and codifications in some of the European Union countries. Even the Montenegrin legislator enacted a special law governing these legal matters, however in the Serbian law fiduciary agreements fall into the category of innominate contracts. Fiducia originates in the Roman Law and constitutes the first common form of the pledge law. The Latin term fiducia means 'trust', since these legal matters were, first of all, based on the trust between contractual parties. This paper addresses the institution of 'trust' as it is the Anglo-Saxon counterpart of the fiduciary agreement. Etymologically, 'trust' has the same meaning as the term fiducia - trust. Due to their advantages, fiduciary agreements are not even uncommon in the domestic legal practice, while there are certain, as we have already announced, theoretical, but also practical concerns arguing admissibility of this legal matter. These arguments mainly come down to the thesis (mentioned above that entering into the fiduciary agreement results in violation of the ban on performance of contract lex commissoria in the pledge law. Nevertheless, I provided explanation that differences between contracts of pledge and fiduciary agreements clearly point to the conclusion that fiduciary agreements may not be treated as a pledge, hence they are admissible, that is, they are concluded on the principle of contractual freedom as an imperative norm of the Law on Obligations. Fiduciary agreements (in relation to the realistic means of security offer to the creditor a higher level of security, reduce the period of payment of his claims, also providing practical benefits for the debtor himself. The paper presents the reasons supporting the view that it would be advantageous for the Serbian legislator, in the process of harmonization of the

  16. Hungary-Ukraine energy cooperation and its contribution to the security of supply in the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Kiss, P.

    2007-07-01

    The European Union (EU) will be increasingly dependant upon non-EU primary energy resources as domestic resources are depleted. Ukraine can play a pivotal role in future supply to the EU through its neighbor Hungary. Ukraine is the largest country in the world by volume of gas transit. Through its pipeline, the transit gas deliveries amount annually to 140 billion m{sup 3}, including 120 billion m{sup 3} to countries of Central and Western Europe. The country also has an under-utilized 750 kV electricity transmission line that reaches into Hungary. These assets make Eastern Hungary a key location for a Combined Cycle Gas Turbine (CCGT). A plant of this type would be able to provide electricity generation for the Central Eastern Europe (CEE) region. The heat generated by the plant could also be used in local industrial and agricultural production, thereby providing an additional impetus for regional development initiatives. Hungary is open for foreign investment from the West, but also from investors in the Ukraine and Russia. The construction of the CCGT plant and the related regional development is a great opportunity to strengthen the cooperation of Ukraine, the EU and Hungary for the common benefit of the entire region. (auth)

  17. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  18. Balancing security and liberty within the European human rights framework. A critical reading of the Court’s case law in the light of surveillance and criminal law enforcement strategies after 9/11

    Directory of Open Access Journals (Sweden)

    Paul J.A. de Hert

    2005-07-01

    Full Text Available Literature concerning human rights protection by the European Court on Human Rights after 9/11 is very often coloured by optimism. Some authors hold that judicial control by the European Court on national anti-terrorism measures is very strict, especially compared to U.S. judicial review. Others suggest the existence of a strict privacy test developed by the European Court as a bulwark again anti-terrorism measures that give too much discretion to law enforcement authorities. In this paper we discuss the ‘classical’ European framework with regard to ‘hard’ anti-terrorism measures and the privacy framework that is relevant for new, ‘softer’ anti-terrorism measures. it is argued that this optimistic reading of the European human rights framework in the area of security especially with regard to the latter is flawed and based on a misunderstanding of the case law of the European Court. This analysis leaves little room for optimism about judicial review of the legislator in Europe and urges for an attitude of self-restraint.

  19. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    to evolve and military forces are modernized. As we consider the way ahead, it may be useful to examine the thoughts of Hans Morgenthau , one 49 of...the most celebrated scholars of international rela- tions in the 20th century. Morgenthau observed the following three points when considering...Russia and the West must avoid emotional rheto- ric. Both sides must rely on the kind of careful analysis Morgenthau suggests in order to discover if a

  20. Turkey and European Security Institutions

    Science.gov (United States)

    2009-03-01

    relationships between Turkey, the United States, the Kurds, and Europe. As a source often critical of Turkey and the United States ( Noam Chomsky ...Turkish model , as it is this author’s experience that Turkish military personnel are less likely than their American counterparts to state their...field and other propaganda items (although lately this has disappeared from the website). 68

  1. A Reflection on European Security

    Directory of Open Access Journals (Sweden)

    Cameron R. Hume

    1997-12-01

    Full Text Available En la conferencia final de las Jornadas, Cameron Hume examina el interés histórico de Estados Unidos en la seguridad europea y revisa algunas de las más importantes cualidades de la relación transatlántica, que encuentra sus orígenes en el Plan Marshall. La creación de la OTAN en 1949 proporcionó una institución que ayudaría a crear un medio para la expansión de las instituciones libres. Hoy en día, seis años después del fin de la Guerra Fría, la compleja agenda de seguridad del continente europeo implica nuevos retos tantopara Estados Unidos como para las instituciones europeas, como por ejemplo la ampliación de la OTAN. Hume señala que existen vínculos demográficos, políticos y económicos que impelen a Estados Unidos hacia Asia y América Central y del Sur, y provocan cambios en las percepciones estadounidenses sobre la seguridad europea. También subraya las dificultades inherentes a la aparición de un poder supranacional en la Unión Europea en temas de política exterior, que tendrá que decidir en asuntos como el uso de la fuerza parasalvaguardar la seguridad del continente. Dado que la imprevisibilidad es inevitable, Hume se muestra favorable a una aproximación colectiva a los futuros problemas de seguridad,fundada en el diálogo con Rusia y con países asiáticos y Mediterráneos, que enfatice la cooperación –no la competición– y no sea una simple toma de posturas. Esta aproximación debiera tener suficiente energía para aceptar cambios en ambos lados del Atlántico eidentificar objetivos a largo plazo.

  2. Prague, NATO, and European Security.

    Science.gov (United States)

    2007-11-02

    policies of the present Czech government led by Prime Minister Vaclav Klaus . Clearly many serious issues connected with the Czech Republic’s entry...Prague’s motives and policies merit examination.1 Precisely because many, including Prime Minister Vaclav Klaus , claim the Czech Republic is Central Europe’s...and the United States, and has, through 1995, rejected calls for regional integration. Klaus has called the Visegrad organization of Poland, Hungary

  3. Prioritization strategies for pandemic influenza vaccine in 27 countries of the European Union and the Global Health Security Action Group: a review

    Directory of Open Access Journals (Sweden)

    Haas Walter

    2007-09-01

    Full Text Available Abstract Background Although there is rapid progress in vaccine research regarding influenza pandemic vaccines it is expected that pandemic influenza vaccine production can only start once the pandemic virus has been recognized. Therefore, pandemic vaccine capacity will be limited at least during the first phase of an influenza pandemic, requiring vaccine prioritization strategies. WHO recommends developing preliminary priorities for pandemic vaccine use. The goal of this review is to provide a thorough overview of pandemic vaccine prioritization concepts in the 27 European Union (EU member states and the four non-EU countries of the Global Health Security Action Group. Methods Between September and December 2006 data was collected for each country through two data sources: (i the national influenza pandemic plan; (ii contacting key persons involved in pandemic planning by email and/or phone and/or fax Results Twenty-six (84% countries had established at least one vaccine priority group. Most common reported vaccine priority groups were health care workers (HCW (100%, essential service providers (ESP (92% and high risk individuals (HRI (92%. Ranking of at least one vaccine priority group was done by 17 (65% of 26 countries. Fifteen (88% of these 17 countries including a ranking strategy, decided that HCW with close contact to influenza patients should be vaccinated first; in most countries followed and/or ranked equally by ESP and subsequently HRI. Rationales for prioritization were provided by 22 (85% of 26 countries that established vaccine priority groups. There was large variation in the phrasing and level of detailed specification of rationales. Seven (32% of 22 countries providing rationales clearly associated each vaccine priority group with the specific rationale. Ten (32% of the 31 countries studied countries have consulted and involved ethical experts to guide decisions related to vaccine prioritization. Conclusion In the majority of

  4. INDECT Advanced Security Requirements

    CERN Document Server

    Uruena, Manuel; Martinez, Maria; Niemiec, Marcin; Stoianov, Nikolai

    2010-01-01

    This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features for integrated technologies such as Virtual Private Networks (VPNs), Cryptographic Algorithms, Quantum Cryptography, Federated ID Management and Secure Mobile Ad-hoc networking are described together with their expected use in INDECT.

  5. EU Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hong Jianjun

    2007-01-01

    The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.

  6. An Evaluation of the Intensity of Radical Islam in the Balkans and the Assessment of Its Level of Threat for European Security

    Science.gov (United States)

    2011-12-01

    not solve anything or often, generate new problems. This monograph covers all aspects and views, from biased Islamophobia and an irrational fear of...of the official welfare programs, and second, they are initiating Islamophobia among the Europeans that later help them convert “moderate” Muslims to...support him, but often he is accused of Islamophobia .65 The challenge that European leaders are facing is how to confront radical Islam and at the

  7. Europol’s Cybercrime Centre (EC3), its Agreements with Third Parties and the Growing Role of Law Enforcement on the European Security Scene

    DEFF Research Database (Denmark)

    Vendius, Trine Thygesen

    2015-01-01

    The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community approach” the EC3 is concluding partnerships with member s......, this not least in view of the EC3’s mandate to conclude strategic agreements with a fairly high degree of autonomy....

  8. Global security in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Elvira Sánchez Mateos

    2002-06-01

    Full Text Available In the last decade, the WEU, NATO and specially the European Union (in the framework of the Barcelona process initiated security dialogues with countries East and South of the Mediterranean Basin. Those processes are far to achieve significant progress. Some arguments help to explain the present situation: on the one hand, European countries and organizations lack clear strategic goals and consistent policies. On the other, difficulties to create a security dialogue in the Mediterranean, which is a precondition to generateboth a common language and security culture, are the result of differences between the European and the Arab security cultures. Nevertheless, the geopolitical environment, the Euro-Mediterranean process itself and the development of the European Union demanda strategic revision on how to implement the objectives of the Barcelona Declaration, reformulating the idea of Euro-Mediterranean Partnership towards a new concept of shared security that integrates Southern interests and concerns.

  9. The European Commission's ability to deal with wicked problems: an in-depth case study of the governance of food security

    NARCIS (Netherlands)

    Candel, J.J.L.; Breeman, G.E.; Termeer, C.J.A.M.

    2016-01-01

    The European Commission's ability to cope with wicked problems is generally viewed as inadequate because of its hierarchical and inflexible modus operandi. Recent research suggests, however, that the Commission may be better equipped to deal with wicked problems than is commonly assumed. To elucidat

  10. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban t

  11. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  12. European Sovereign Bond-Backed Securities – a Proposal to Mitigate Risks Arisen from the Lack of an Euro Area Common Fiscal Policy

    Directory of Open Access Journals (Sweden)

    Munteanu Bogdan

    2017-01-01

    Full Text Available “European Sovereign Bond-Backed Securities” explores the complexities of having a fiscal unionfor Euro Area. All measures taken for fiscal integration are elements that need cohesion in order tobreak the vicious circle of unsustainable public debt affecting the balance sheets of banks anddeepening the need for rescue, which signals a further deterioration in asset valuation and marketsshrinking, worsening further the economic conditions. The need for a synthetic bond obtained bysecuritization of Euro Area governments’ debts emerges as viable proposal to break this public debt– private debt circle. Furthermore, it explores the “impossible trinity” (Mundell-Flemming and thetranslation into the Euro Area. The conclusions point to the need for institutionalized and officialapproach of introducing such derivative products like European Sovereign Bond-Backed Securitiesin the quest for safe assets, aiming to break the circle of debt (effect by substituting the absence of acommon fiscal policy (cause.

  13. Strategic Planning for Comprehensive Security in the European Union’s Military Operations: EUFOR RD Congo, EUFOR Tchad/RCA, and EUNAVFOR Somalia

    Science.gov (United States)

    2010-06-01

    403–409; Stefan Brune, “Controversial Peacekeeping Operations – Europe, France and Chad,” WeltTrends, no. 64 (2009), 19–23; Felix Arteaga , The...Defence Research Establishment, 2008), 46–48. 138 Arteaga , The Chad Conflict, United Nations (MINURCAT) and the European Union (EUFOR), 1– 3. 48...Skepsis űber den Vorstoss,” Frankfurter Allgemeine Zeitung, sec. Politik, 18 June 2007. 143 Arteaga , The Chad Conflict, United Nations (MINURCAT

  14. Comparison of the Security Strategies of the United States and the European Union: Is There a Common Approach in Combating Terrorism?

    Science.gov (United States)

    2005-05-26

    transportation . Globalization clearly offers terrorist groups some extraordinary capabilities to communicate and coordinate their efforts. Globalization also...The Information Revolution and Post-Modern Warfare” (Carlisle: Strategic Studies Institute, April 2000), 6. 9 Christoph Eichborn, “Pro Bono Publico ...Hard Choices: National Security and the War on Terrorism.” Current History (December 2002) : 409-413 Eichborn, Christoph. “Pro Bono Publico – No

  15. Protection promotion and cooperation in the European semiconductor industry

    DEFF Research Database (Denmark)

    Martin, Stephen

    1996-01-01

    in the European market. Using strategies that involve world-wide cooperation, European firms are beginning to carve out secure places for themselves in what is now a world market. Joint ventures have been critical in bringing European firms up to world performance levels, but extra-European as well as intra......-European cooperation has been essential...

  16. The European Union’s Policy Regarding Peace and Security in Sub-Saharan Africa Since the End of the Cold War: Concepts and Implementation

    Science.gov (United States)

    2007-06-01

    ue.eu.int/ueDocs/cms_Data/docs/pressdata/EN/ discours /78600.pdf (accessed May 22, 2007). 53 Laurie Nathan, “‘The four Horsemen of the Apocalypse...Development (NEPAD); of what Relevance is the Politique Africaine?” Conflict, Security and Development 5, no. 2 (August 2005): 227-246. Allen...8, 2004. http://ue.eu.int/ueDocs/cms_Data/docs/pressdata/EN/ discours / 78600.pdf (accessed May 22, 2007). ———. Contribution by the High

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. Is European Defense a Bridge too Far?

    Science.gov (United States)

    2006-03-08

    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  19. The European Union Response to Regional Conflicts

    Science.gov (United States)

    2013-03-01

    into force of the Lisbon Treaty. (Cuadernos de Estrategia, 145-B. Spanish Institute for Strategic Studies, 2010), 18. 4 Felix Arteaga , The European...Management in the Neighborhood and Beyond. 2008. 14 Felix Arteaga , The European Security and Defense Policy after the entry into force of the...Felix Arteaga , The European Security and Defense Policy after the entry into force of the Lisbon Treaty. (Cuadernos de Estrategia, 145-B. Spanish

  20. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  1. Green paper - towards a European strategy for the security of energy supply, technical document; Livret vert sur la securite de l'approvisionnement en energie, document technique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  2. Denmark and the European Union

    DEFF Research Database (Denmark)

    Manners, Ian

    2011-01-01

    Over the past two decades Morten Kelstrup’s work has been at the centre of three important intellectual innovations in political science – the study of the EU as a regional political system; European security studies; and small states in European integration. Kelstrup’s best known books (Buzan, K...... of this book, two of Kelstrup’s most important intellectual contributions come from his work on Denmark’s relations with the European Union, and his use of systems theory to understand the EU.......Over the past two decades Morten Kelstrup’s work has been at the centre of three important intellectual innovations in political science – the study of the EU as a regional political system; European security studies; and small states in European integration. Kelstrup’s best known books (Buzan...

  3. Evropejskaja ideja v Central'noj Evrope i Skandinavii kak chast' politiki bezopasnosti i mirnogo sosushhestvovanija v ramkah poslevoennogo planirovanija [The European idea in Central Europe and Scandinavia as a part of the security and peaceful co-existence policy in the framework of the postwar planning

    Directory of Open Access Journals (Sweden)

    Chernyshev Yevgeny

    2011-01-01

    Full Text Available This article is dedicated to the development of European unity in Central Europe and Scandinavia as a mechanism of collective security and intergovernmental cooperation development. The cultural and historical features of Central Europe and Scandinavia emphasize the need for a comparative study into the European idea. This article considers the tendencies and factors which affected the development of the European idea in the framework of the post-war planning. This research sets out to compare and identify similar or analogous features and elements of the theoretical bases of movements for European unity in Central and Northern Europe. The author comes to the conclusion about the correlation between the “Europe of regions” model and the European unity concept. The ideas of Scandinavian and Central European integration rested on national, cultural and historical connections of the neighbouring countries were expected to constitute such formations, which contradicted and were opposed to by the theoretical framework of Western European integration. On the other hand, regional integration implied that a federation or union of the neighbouring states could be considered a step towards a more universal organisation, which would not mean the isolation of Scandinavia and Central Europe from the rest of the world. The theoretical and practical significance of this work lies in the comparative approach to the analysis of the phenomena which have been considered individually in the framework of historiography. It is the major contribution of the article to the research on history of ideas and European diplomacy. Moreover, the subject of research is immediately connected to the problem of security in the Baltic region and the Soviet factor, as well as political stereotypes produced in this field. The author employed historical comparative and inductive types of the historical typological method.

  4. A European Navy: Can it Complete European Political and Economic Integration?

    Science.gov (United States)

    2012-06-01

    Security Nexus : More Coherence Under Lisbon, in Occasional Paper no. 89 (European Union Institute for Security Studies [ISS], 2011). 18 Wallace Thies...Switzerland: Geneva Centre for Security Policy, 2005), 17. 45 Frederic Fransen. The Supranational Politics of Jean Monnet: Ideas and Origins of the European...Studies. May 19, 2012. http://www.ceps.eu/book/eu-defence-policy-after-chicago-going-smart (accessed June 4, 2012). 54 Fransen, Frederic . The

  5. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  6. Beyond the security paradox: Ten criteria for a socially informed security policy.

    Science.gov (United States)

    Pavone, Vincenzo; Ball, Kirstie; Degli Esposti, Sara; Dibb, Sally; Santiago-Gómez, Elvira

    2017-04-01

    This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data gathered at 12 citizen summits in nine European countries. The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy. These criteria not only reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens' priorities. They also cast light on an interesting paradox: although people feel safe in their daily lives, they believe security could, and should, be improved.

  7. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  8. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  9. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  10. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  11. Capitalizing on emergence: The 'new' civil security market in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2014-01-01

    In recent years, the European Union has supported the development of a new civil security market, capable of providing security technology for new and global security challenges. This article analyses the emerging growth market for civil security in relation to contemporary notions of potential cris

  12. Bulgaria in European Security and Defense Policy

    Science.gov (United States)

    2013-03-01

    influence of the West and cultural globalization. The major global religions are Christianity (2 billion adherents) Islam (1 billion) and Hinduism (0.7...Modernization has created a new generation of technological understanding and adapted religious movements like evangelism in America, " Hinduism

  13. European Approaches to Homeland Security and Counterterrorism

    Science.gov (United States)

    2006-07-24

    actual terrorist incident, a Cabinet-level emergency crisis management body — known as COBR (for the Cabinet Office briefing room in which it meets...is convened to coordinate the government’s immediate emergency response; COBR brings together the Prime Minister and other Cabinet ministers and... COBR , and the armed forces would have no jurisdiction outside of supporting the civil powers. The Ministry of Defense and the armed forces are also

  14. Creating a European SCADA Security Testbed

    NARCIS (Netherlands)

    Christiansson, H.; Luiijf, H.A.M.

    2008-01-01

    Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical infrastructure assets. However, over the past two decades, they have evolved from closed, proprietary systems to open networks comprising commodity platforms running common operating systems an

  15. The Revitalisation of NATO and European Security

    Directory of Open Access Journals (Sweden)

    Nicholas Williams

    1997-12-01

    Full Text Available Los esfuerzos para construir una Identidad Europea de Seguridad y Defensa (IESDrecibieron un impulso importante tras la experiencia yugoslava, que revitalizó la OTAN y mostró a los países europeos sus limitaciones. Estas se evidenciaron especialmente tras la decisión, adoptada en 1996 en Berlín por los ministros de asuntos exteriores delos países de la Alianza, de construir la IESD dentro del marco OTAN. Williams revisa los futuros retos de la IESD a la luz de la ampliación de la OTAN, el fortalecimiento del Partenariado para la Paz y el Acta Fundacional firmada por Rusia. También repasa la iniciativa de diálogo entre la OTAN y algunos países del Mediterráneo, señalando al menos tres factores que pueden afectar su evolución: el propio mensaje de la OTAN, que indica a la vez la voluntad de cooperar con esos países y la amenaza que representala proliferación de armas de destrucción masiva en el Mediterráneo; la apariencia de que la OTAN está construyendo estructuras militares en su flanco sur; y la evidente triplicidad entre la UEO, la UE y la OTAN en el debate sobre acuerdos de seguridad en el Mediterráneo.

  16. Task-Sharing for European Security

    Directory of Open Access Journals (Sweden)

    Dennis Sandole

    1997-12-01

    Full Text Available Sandole describe los esfuerzos compartidos de la OSCE, la OTAN, la UE y el Consejo de Europa para llegar a acuerdos de seguridad común con los países del extinto Pacto de Varsovia. Estos esfuerzos apuntan a una reorientación del paradigma de seguridad en el continente, que el autor denomina “Nuevo Sistema Europeo de Paz y Seguridad” (NEPSS.En este sistema, lo que Sandole identifica como “sistemas integrados de redes de resolución de conflictos” debieran incluir actores gubernamentales y no gubernamentales, en los niveles locales, subregionales, regionales, nacionales e internacionales, que interactuarán con el objetivo de alcanzar una paz positiva, basada en estrategias de idealpolitik –y no una paz negativa, como en el caso de Bosnia, conseguida por la fuerza. No obstante, según el autor, en casos de genocidio o limpieza étnica, los imperativos de realpolitik debieran ser tomados en consideración.

  17. East European Security After the Cold War

    Science.gov (United States)

    1993-01-01

    successor, Georges Pompidou , encouraged the idea of a "special Franco-Soviet relationship." Eastern Europe hardly played a role in his policy. Instead...Kiev, Warns Bonn not to Press Reunification Issue" New York nme& December 7, 1989. and Jacques Almaric. ’La r~unification au centre des entre- tiens

  18. European Security in an Evolving World

    Science.gov (United States)

    2011-06-18

    successful tests in May 1998.    Coming shortly after similar tests by  India , Dr Khan’s work helped seal Pakistan’s place as the world’s  seventh...about NATO’s future will be addressed, to include its                                                          34  Cort  Kirkwood, “Sarkozy Joins Cameron

  19. Bourdieu, International Relations and European Security

    DEFF Research Database (Denmark)

    Berling, Trine Villumsen

    2012-01-01

    Despite promising attempts to apply the sociology of Pierre Bourdieu to International Relations (IR), the field could still profit from unexplored potential in his thinking for understanding pivotal theoretical and empirical puzzles. This article takes the failure to fully grasp the paradigmatic...

  20. Challenges of European Security: Redrawing the Line?

    Science.gov (United States)

    1994-06-01

    the West, the East (CEE), and Russia (FSU), it must be remembered that each of these groupings represents distinct states with distinct histories and...86). Of course, each country’s ability to overcome negative aspects of this inheritance varies based on its unique cultures and history . For example...region and Catalonia in Spain, and Northern Ireland. Fortunately, there are also examples of solutions, like Switzerland and the Alto Adige (South Tyrol

  1. Mining in the European Arctic

    NARCIS (Netherlands)

    van Dam, Kim; Scheepstra, Annette; Gille, Johan; Stępień, Adam; Koivurova, Timo

    2014-01-01

    The European Arctic is currently experiencing an upsurge in mining activities, but future developments will be highly sensitive to mineral price fluctuations. The EU is a major consumer and importer of Arctic raw materials. As the EU is concerned about the security of supply, it encourages domestic

  2. Selective Europeanization

    DEFF Research Database (Denmark)

    Hoch Jovanovic, Tamara; Lynggaard, Kennet

    2014-01-01

    political contexts at the European level. We further show how the “translation” of international norms to a domestic context has worked to reinforce the original institutional setup, dating back to the mid-1950s. The translation of European-level minority policy developed in the 1990s and 2000s works most...

  3. European Whiteness?

    DEFF Research Database (Denmark)

    Blaagaard, Bolette

    2008-01-01

    Born out of the United States’ (U.S.) history of slavery and segregation and intertwined with gender studies and feminism, the field of critical whiteness studies does not fit easily into a European setting and the particular historical context that entails. In order for a field of European...

  4. European Institutions?

    NARCIS (Netherlands)

    Meacham, Darian

    2016-01-01

    The aim of this article is to sketch a phenomenological theory of political institutions and to apply it to some objections and questions raised by Pierre Manent about the project of the European Union and more specifically the question of “European Construction”, i.e. what is the aim of the Europea

  5. European structuralism

    OpenAIRE

    Willems, Klaas

    2014-01-01

    European structuralism is a paradigm for the study of language developed by prominent European linguists during the inter-war period and the first decades after World War II that radically rejected the prevailing atomism of 19th century (particularly neo-grammarian) linguistics and language psychology.

  6. European Whiteness?

    DEFF Research Database (Denmark)

    Blaagaard, Bolette

    2008-01-01

    Born out of the United States’ (U.S.) history of slavery and segregation and intertwined with gender studies and feminism, the field of critical whiteness studies does not fit easily into a European setting and the particular historical context that entails. In order for a field of European...

  7. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  8. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  9. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  10. Pre-Trial Detention and Control Orders Under British Anti-Terror Legislation Post 9/11: Balancing a Need for Security with the European Convention on Human Rights – An Overview

    Directory of Open Access Journals (Sweden)

    Sascha-Dominik Bachmann

    2010-02-01

    Full Text Available Contemporary British anti-terror legislation has been characterised by an extensive use of extra-ordinary detention measures: the Terrorism Act 2000 and Terrorism Act 2006 contain provisions, which enable the extended pre-charge detention of terror suspects beyond the limits of normal criminal procedure. The now repealed provisions of Part IV of the Anti-terrorism, Crime and Security Act 2001 allowed the indefinite detention of foreign national terror suspects on a quasi-judicial basis. Its successor, the Prevention of Terrorism Act 2005, enables the use of Control Orders, effectively a form of house arrest characterised by restrictions on an individual’s liberty. In short, these measures have in common the extensive limitation of the individual’s right to liberty under Article 5 of the European Convention on Human Rights. Whilst the judiciary have curtailed the most abhorrent manifestations of such extraordinary measures, as detailed, the legal framework as it exists today, still raises ECHR compliancy issues. Legal reformation should be sought to end such an impasse by amending at the very least the statutory framework already in place. Ideally anti-terror detention provisions should be brought back within the sphere of criminal law and in compliance with the ECHR. La législation contemporaine anti-terroriste britannique a été caractérisée par l’utilisation considérable de mesures extraordinaires de détention : la Terrorism Act 2000 et la Terrorism Act 2006 contiennent des dispositions qui permettent la détention prolongée préalable à l’accusation de personnes soupçonnées de terrorisme au-delà des limites de la procédure criminelle normale. Les dispositions, maintenant abrogées, de la Partie IV de la Anti-terrorism, Crime and Security Act 2001 permettaient la détention indéfinie de ressortissants étrangers soupçonnés de terrorisme sur une base quasi-judiciaire. Son successeur, la Prevention of Terrorism Act 2005

  11. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  12. European Insecurity: Managing Changing Relations at Home and Abroad : Interviews with Dr. Margriet Drent and Dr. Bibi van Ginkel of the Security and Conflict Programme of the Netherlands Institute of International Relations ‘Clingendael’

    NARCIS (Netherlands)

    Fraser, J.A.

    2012-01-01

    Interviews with Dr. Margriet Drent and Dr. Bibi van Ginkel of the Security and Conflict Programme of the Netherlands Institute of International Relations 'Clingendael' Dr. Margriet Drent is a Senior Research Fellow at the Security and Conflict Programme of the Netherlands Institute of International

  13. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  14. European visit

    CERN Multimedia

    2006-01-01

    The European Commissioner for Science and Research, Janez Potočnik, (on the right) visited the CMS assembly hall accompanied by Jim Virdee, Deputy Spokesman of CMS (on the left), and Robert Aymar, Director-General of CERN. The European Commissioner for Science and Research, Janez Potočnik, visited CERN on Tuesday 31 January. He was welcomed by the Director-General, Robert Aymar, who described the missions and current activities of CERN to him, in particular the realisation of the LHC with its three components: accelerator, detectors, storage and processing of data. The European Commissioner then visited the CMS assembly hall, then the hall for testing the LHC magnets and the ATLAS cavern. During this first visit since his appointment at the end of 2004, Janez Potočnik appeared very interested by the operation of CERN, an example of successful scientific co-operation on a European scale. The many projects (30 on average) that CERN and the European Commission carry out jointly for the benefit of res...

  15. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  16. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  17. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. The European Crisis Management: An Organizational Narrative

    Directory of Open Access Journals (Sweden)

    Patrícia Kaplánová

    2016-12-01

    Full Text Available The debate of scholars in the field of international relations in last years has put the European Union’s role into the consideration. The European Foreign and Security Policy has positioned itself through its development to the constructive and normative line of research of world politics. With this respect, this article examines a character of crisis management of the European Common Foreign Policy based on the institutional development. Besides the European Union does not possess a unified foreign and security policy, regardless one army and single institutional mechanism, the recent crisis management actions have shaped the policies into a comprehensive nature. The paper overviews briefly the history of Common Foreign and Security Policy as well as Common Security and Defence Policy and focuses on crisis management of civilian and military missions. The author claims that the development has a significant impact on a character of crisis management analyzed from the institutional and financial capacities of the European Security and Defence Policy. Consequently, the character of crisis management performs complex mechanisms of responsive, political/administrative, legal, economic and human help to crisis-affected territories in the world. Respectfully, the character of crisis management has thus more pre-crisis nature of a resilience.

  19. European Peacebuilding

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen

    2015-01-01

    on the belief that conflicts between former belligerents can be transformed through association processes thought to bring peace to unstable regions. Examining whether this is actually the case, this contribution traces European peacebuilding from the early integration of post-World War Two economies in Western......This contribution argues that the peace that has emerged between and increasingly within European states is a historical achievement. A variety of different peace initiatives have brought Europe to where it is today, but a particularly significant player in this process has been and still...

  20. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  2. European Cinema

    NARCIS (Netherlands)

    Elsaesser, Thomas

    2005-01-01

    In the face of renewed competition from Hollywood since the early 1980s and the challenges posed to Europe's national cinemas by the fall of the Wall in 1989, independent filmmaking in Europe has begun to re-invent itself. European Cinema: Face to Face with Hollywood re-assesses the different debate

  3. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  6. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  7. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  8. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  9. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  10. NO RUMO DA "COMUNITARIZAÇÃO" DA SEGURANÇA E DEFESA DA UNIÃO EUROPEIA MEDIANTE A COOPERAÇÃO ESTRUTURADA PERMANENTE? HEADING FOR THE APPLICATION OF THE "COMMUNITY METHOD" TO SECURITY AND DEFENCE OF THE EUROPEAN UNION BY MEANS OF PERMANENT STRUCTURED COOPERATION?

    Directory of Open Access Journals (Sweden)

    ABEL LAUREANO

    2012-12-01

    Full Text Available Resumo: O Tratado de Lisboa (na linha do malogrado Tratado Constitucional veio, como término de várias iniciativas entretanto ocorridas, prever o mecanismo da cooperação estruturada permanente. Procura-se, com esse mecanismo, viabilizar o advento duma vanguarda de Estados-Membros, eventualmente apta a formar o embrião dum futuro sistema autóctone de defesa da União Europeia. A cooperação estruturada permanente representa um passo no sentido da "comunitarização" da segurança e defesa da União Europeia, quedando-se contudo indiscutivelmente apartada do arquétipo comunitário. Só o futuro mostrará se a cooperação estruturada permanente poderá vir a dotar a União Europeia com uma política de segurança e defesa assente no "método comunitário".Abstract: The Treaty of Lisbon, in line with the failed Constitutional Treaty and in the sequence of several initiatives which had taken place, came to provide for the mechanism of permanent structured cooperation. The goal of this mechanism is to enable the arising of a vanguard of Member States, eventually ready to form the embryo of a future European Union's exclusive defence system. Although permanent structured cooperation represents a step towards the application of the "community method" to security and defence of the European Union, it doesn't still fit in that pattern. Only future can tell, if permanent structured cooperation is likely to provide the European Union with a security and defence policy based on the "community method".

  11. European Secuirty in the XXI Century

    Directory of Open Access Journals (Sweden)

    Narcís Serra

    2000-05-01

    Full Text Available In the author’s view, the great transformations at this century’s end consist in the following: the world is no longer Euro-centric, technological progress has generated globalization –which, in turn, has reduced the capacities of the nation-state– and a new egocentric and asocial individualism has been born. Globalization, arriving at the same time as the dismantling of the Communist regimes and the disintegration of the Soviet Union, has created –in matters of security, defense, risks, crisis situations– new threats and a revolution in military affairs. For this series of reasons, to talk of European security can not be limited to a simple harmonization of issues, rather it should mean reevaluating the role that Europe has to play in the world. From a European perspective, non-combat means are needed to guarantee security and, also, to tackle the issue of European fragmentation, whose solution requires very complex architecture mechanisms. In Serra’s estimate, work must be done in two directions: extending the benefits of democratic consolidation, market economy and security, while, at the same time, finding a compromise between the transatlantic link with the United States and the creation of a European security dimension. On the one hand, European security and defense needs to be more efficient, using the latest technologies and, on the other hand, it needs to demonstrate more political will in at least two ways: first, in the integration of the European defense efforts; and, second, in drawing up a position for Europe in the world in the spirit of federalism-institutionalism proposing itself, Europe, as a political unit with a political role, which improves the levels of citizenship and stands behind world governability.

  12. ADMINISTRATIVE POLICE ISSUES AT EUROPEAN LEVEL

    Directory of Open Access Journals (Sweden)

    Dana VULPAȘU

    2014-05-01

    Full Text Available Administrative police, fundamental form of public administration, which aims to ensure public order and the protection of human rights, through prevention, knows no uniform conceptualization in the European states. However, it appears in various forms in national systems and is sustained and strengthened by EU policies whose objectives aim at the establishment of an area of freedom, security and justice with respect for fundamental rights and the different legal systems and traditions of the Member States and to ensure a high level of security through measures of preventing crime, racism and xenophobia. This article aims to show how the concept of administrative police is reflected in the European Union, the complementary and coordinating role of the latter, and the need for a uniform legal framework in European national systems which can allow the shaping of a European model.

  13. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  14. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  15. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  16. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  17. Citizen Security

    OpenAIRE

    Beatriz Abizanda

    2011-01-01

    This is a presentation for the Caribbean Regional ConSoc Retreat held on June 16, 2011 in Kingston, Jamaica. This document outlines crime and violence as major roadblocks to development in the Caribbean; citing statistics and providing examples of the economic costs to the region. This presentation then goes on to describe the IDB's strategy with regard to citizen security and highlights IDB Funded security programs in the region. The presentation also identifies Civil Society as a potentiall...

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Securing Security Governance in Post-conflict Situation : A Framework of Conflict Prevention through ECOWARN in West African Region

    OpenAIRE

    Yamane, Tatsuo

    2013-01-01

    This article focuses on an analytical approach of “security governance” in light of post-conflict situation and aims to examine a system of conflict prevention in the West African region from a viewpoint of the approach. The security governance initially developed security studies of International Relations especially for the regional governance in the field of European security. On that basis of making and developing the new perspective for the region, it currently goes to expand the subject...

  20. Security aspects of space operations data

    Science.gov (United States)

    Schmitz, Stefan

    1993-01-01

    This paper deals with data security. It identifies security threats to European Space Agency's (ESA) In Orbit Infrastructure Ground Segment (IOI GS) and proposes a method of dealing with its complex data structures from the security point of view. It is part of the 'Analysis of Failure Modes, Effects Hazards and Risks of the IOI GS for Operations, including Backup Facilities and Functions' carried out on behalf of the European Space Operations Center (ESOC). The security part of this analysis has been prepared with the following aspects in mind: ESA's large decentralized ground facilities for operations, the multiple organizations/users involved in the operations and the developments of ground data systems, and the large heterogeneous network structure enabling access to (sensitive) data which does involve crossing organizational boundaries. An IOI GS data objects classification is introduced to determine the extent of the necessary protection mechanisms. The proposal of security countermeasures is oriented towards the European 'Information Technology Security Evaluation Criteria (ITSEC)' whose hierarchically organized requirements can be directly mapped to the security sensitivity classification.

  1. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  2. A European Solution to Islamic Extremism in Western Europe

    Science.gov (United States)

    2006-04-14

    any circumstances. Germany recently passed a law granting the Defense Minister authority to shoot down a hijacked plane , but the law suspended while... Carrera , “The EU’s Fight against International Terrorism: Security Problems, Insecure Solutions.” Centre for European Policy Studies, Policy Brief, Number...Balzacq, Thierry and Sergio Carrera , “The EU’s Fight against International Terrorism: Security Problems, Insecure Solutions.” Centre for European Policy

  3. The European Union's Eastward Enlargement

    Directory of Open Access Journals (Sweden)

    Hanns-D. Jacobsen

    1997-08-01

    Full Text Available In July 1997 the Commission of the European Union presented its Agenda 2000. This document not only suggested to start accession talks with some East and Central European countries (CEEC in early 1998 but it also provided proposals for a restructuring of EU expenditures. On this background this contribution discusses the state of readiness of the Central and East European countries to become EU members over the next few years and the Union's capacity to absorb up to ten CEEC over the next decade or so. This study concludes that the European Union has become an anchor of stability to the CEEC that guarantees both democracy and economic security--much more than could be expected only a couple of years ago. The Union's readiness to accept the membership of CEEC has, in a decisive way, contributed to their societal, political and economic stabilization. There is almost a contest among the CEEC on which one is going to meet the accession criteria first and best. The enlargement process, however, is connected to problems the resolution of which realistically postpone its successful conclusion at least into the year 2005. The main reasons are (1 the welfare gap between the EU area and the CEEC, (2 the need for more institutional and economic changes in the CEEC to make them ready for acces-sion, and, most importantly, (3 the necessity for the European Union to prepare herself for accession by a comprehensive financial reform and fundamental institutional changes.

  4. EUROPEANIZATION OF ROMANIAN FOREIGN POLICY

    Directory of Open Access Journals (Sweden)

    Liliana Popescu

    2010-12-01

    Full Text Available The paper discusses various aspects of the Europeanization of Romanian foreign policy: elite socialization, bureaucratic reorganization, institutional and policy adaptation to the requirements and exigencies of EU’s Common Foreign and Security Policy (CFSP, projection of national interests onto CFSP agenda and decisions. There is very little written in the literature on the subject of Romanian foreign policy Europeanization. From this standpoint this article fills a gap and indicates an area of research in need to be explored. The paper is using a series of Romanian Ministry of Foreign Affairs (MFA documents related to its organizational changes as well as a number of interviews with diplomats. It is trying to test in the case of Romania a few relevant theses written by significant authors with reference to the Europeanization of other Member States. It draws a number of conclusions – most of them confirming important theses on Europeanization. It ends by remarking the uneven character and the short length of the Romanian foreign policy Europeanization.

  5. The European Union's Eastward Enlargement

    Directory of Open Access Journals (Sweden)

    Hanns-D. Jacobsen

    1997-08-01

    Full Text Available In July 1997 the Commission of the European Union presented its Agenda 2000. This document not only suggested to start accession talks with some East and Central European countries (CEEC in early 1998 but it also provided proposals for a restructuring of EU expenditures. On this background this contribution discusses the state of readiness of the Central and East European countries to become EU members over the next few years and the Union's capacity to absorb up to ten CEEC over the next decade or so. This study concludes that the European Union has become an anchor of stability to the CEEC that guarantees both democracy and economic security--much more than could be expected only a couple of years ago. The Union's readiness to accept the membership of CEEC has, in a decisive way, contributed to their societal, political and economic stabilization. There is almost a contest among the CEEC on which one is going to meet the accession criteria first and best. The enlargement process, however, is connected to problems the resolution of which realistically postpone its successful conclusion at least into the year 2005. The main reasons are (1 the welfare gap between the EU area and the CEEC, (2 the need for more institutional and economic changes in the CEEC to make them ready for acces-sion, and, most importantly, (3 the necessity for the European Union to prepare herself for accession by a comprehensive financial reform and fundamental institutional changes.

  6. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  7. What Price Sovereignty? The Two Faces of Engagement and the Paradox of Power: A Comparison of the Security and Grand Strategies of the United States and the European Union

    Science.gov (United States)

    2012-01-01

    according to James Harper, various actors in successive Roosevelt Administrations had competing views for how to handle “the European Question.” 37...Europe. 14 Culture and politics do not change independently. 55 During the post–war occupation of Germany, according to Petra Goedde, the power...15-335. 55 Petra Goedde, GIs and Germans: Culture, Gender, and Foreign Relations, 1945-1949 (New Haven: Yale University Press, 2003), xvii. 56

  8. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  9. East Asian Regionalism within the Context of Regional Security Competition:A Comparative Analysis with European. and Northern American Regionalism%区域安全竞争中的东亚区域主义——基于对欧洲/北美区域主义的比较分析

    Institute of Scientific and Technical Information of China (English)

    王传兴

    2011-01-01

    区域主义的启动和深化受区域内外安全环境的影响。欧洲区域主义的启动和深化与其内外安全环境之间呈正相关关系,因而它得以历经冷战而不衰,并在冷战后进一步强化。比较而言,北美区域主义的深化与其内外安全环境总体上都是负相关关系,因而北美区域主义至今基本上仍仅限于经济领域。与北美区域主义类似,东亚区域主义的深化与东亚区域内外安全环境也基本上是负相关关系,但不同的是,由于东亚区域的内部安全环境是竞争性的,因此东亚区域的"共同体感觉"虽然呈日益强化之势,但总体上说是脆弱的。东亚区域主义的深化不仅受区域内部安全竞争的挑战,还受到区域外部的竞争性安全环境———区域间大国和全球大国安全竞争———的制约。%The development of regionalism is impacted by a region's internal and external security environment.European Regionalism was rooted in and positively expanded as a result of both Europe's internal and external security environments.As a result,rather than fading in the wake of the Cold War,European regionalism actually grew stronger.In comparison,the internal and external security environments in Northern America both served as a damper on the establishment and progress of its regionalism.As a result,regionalism within Northern America today is basically limited to regional economic configurations.Similar to the Northern America case,the internal and external security environment in East Asia has negatively impacted the development of regionalism.Unlike North America though,because of security competition within the East Asia region,awareness of a collective East Asian community,while increasing remains relatively weak.As a result,efforts to deepen East Asian regionalism are generally dampened by the region's internal security challenges.At the same time,the development of East Asian regionalism also faces

  10. Future Options for Swedish Security Policy

    Science.gov (United States)

    2007-11-02

    14 General European Dogan Harris Kelleher Larrabee Lynn-Jones Murray Roper Asmus Barry Dornbusch Driscoll Feldtstein Flockhart...no. 6 (November/December 1997): 60. 21 Dornbusch , 114-116. 22 Feldstein, 61. 23 Ibid. 24 Ibid., 12. 25 Ham, 531. 26 Ibid. 27 Kelleher, 3...1993): 71-89. Dornbusch , Rudi. ’TEuro Fantasies." Foreign Affairs. Vol. 75, No. 5 (September/October 1996): 110-124 Driscoll, R. F. "European Security

  11. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  12. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  13. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in this

  14. Secured transactions

    NARCIS (Netherlands)

    Beale, H.

    2008-01-01

    In this paper I describe the work that is currently under way, within the Network of Excellence charged with creating a draft Common Frame of Reference, to draft rules on security over moveable assets. After a brief introduction, I deal with two broad questions: (1) the general aims and scope of the

  15. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no state

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  18. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  19. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  20. European bond markets: do illiquidity and concentration aggravate price shocks?

    NARCIS (Netherlands)

    Boermans, M.A.; Frost, Jon; Steins Bisschop, Sophie

    2016-01-01

    We study the effects of market liquidity and ownership concentration of European bonds on price volatility during periods of market stress. Specifically, using security-by-security data from euro area investors we examine if market illiquidity and concentrated holdings explain the large price shocks

  1. The European Union and sub-Saharan Africa

    DEFF Research Database (Denmark)

    Kluth, Michael Friederich

    2013-01-01

    This article argues that aspirations of maintaining a dominant influence over sub-Saharan security issues has spurred the French and British leadership of European Union (EU) foreign and security policy integration, just as it has informed military capability expansions by the armed forces...

  2. Food security vs. nutrition security.

    Science.gov (United States)

    Venugopal, K R

    1999-01-01

    This article presents the status of food security versus nutrition security in India. Food security is defined as the availability and the access of food to all people; whereas nutrition security demands the intake of a wide range of foods which provides the essential needed nutrients. It is estimated that the average dietary intake in India is 2280 calories. In 9 major states, the average was less than 2400 calories, suggesting poverty. In a 1988-90 survey, only 10% of the children, and about 50% of the adults, were considered to have a normal nutritional status. The rest suffered from different levels of Chronic Energy Deficiency. In addition, contradictions have also developed within policies in India that seek to address these issues. Recognizing that agriculture is the key to poverty eradication, India recently drafted the Agriculture Policy. The Policy focuses on rain-fed farming, unemployment, and malnutrition in rural areas, revitalizing the cooperatives, and increasing the involvement of nongovernmental organizations. However, there are certain issues of concern in the Policy with the most damaging aspect seen in the promotion of existing inequalities in the rural sector.

  3. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  4. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  5. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    , but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following....... Moreover, they estimated that armed defence was a priori hopeless and possibly even dangerous as it might attract unnecessary attention by a would-be belligerent. Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During...... the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral...

  6. Image Security

    Science.gov (United States)

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  7. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  8. ECLIPSE, an Emerging Standardized Modular, Secure and Affordable Software Toolset in Support of Product Assurance, Quality Assurance and Project Management for the Entire European Space Industry (from Innovative SMEs to Primes and Institutions)

    Science.gov (United States)

    Bennetti, Andrea; Ansari, Salim; Dewhirst, Tori; Catanese, Giuseppe

    2010-08-01

    The development of satellites and ground systems (and the technologies that support them) is complex and demands a great deal of rigor in the management of both the information it relies upon and the information it generates via the performance of well established processes. To this extent for the past fifteen years Sapienza Consulting has been supporting the European Space Agency (ESA) in the management of this information and provided ESA with ECSS (European Cooperation for Space Standardization) Standards based Project Management (PM), Product Assurance (PA) and Quality Assurance (QA) software applications. In 2009 Sapienza recognised the need to modernize, standardizing and integrate its core ECSS-based software tools into a single yet modularised suite of applications named ECLIPSE aimed at: • Fulfilling a wider range of historical and emerging requirements, • Providing a better experience for users, • Increasing the value of the information it collects and manages • Lowering the cost of ownership and operation • Increasing collaboration within and between space sector organizations • Aiding in the performance of several PM, PA, QA, and configuration management tasks in adherence to ECSS standards. In this paper, Sapienza will first present the toolset, and a rationale for its development, describing and justifying its architecture, and basic modules composition. Having defined the toolset architecture, this paper will address the current status of the individual applications. A compliance assessment will be presented for each module in the toolset with respect to the ECSS standard it addresses. Lastly experience from early industry and Institutional users will be presented.

  9. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  10. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  11. Balancing Flexibility and Security in Europe

    DEFF Research Database (Denmark)

    Russell, Helen; Leschke, Janine; Smith, Mark

    ) and 5 (2010) of the European Social Survey (ESS). The study asks how flexibility, security and welfare state configurations interact to influence overall levels of objective security (for example fixed-term contracts, unemployment), subjective job and employment security (employability) among various......This paper examines the relationship between so-called “flexicurity” systems and outcomes on insecurity and well-being for young people (15-34 years) in Europe during the great recession. A key tenet of this approach is that greater flexibility of labour supply is underpinned by a welfare system......, there is a risk that young people tend to experience greater job insecurity – objectively and subjectively – without the benefit of income security or employment security. We focus on objective and subjective insecurity and well-being drawing on data from the work, family and well-being modules in rounds 2 (2004...

  12. STRATEGIC ENERGY SOURCES AND TRENDS OF ALTERNATIVE ENERGIES IN THE EUROPEAN UNION

    OpenAIRE

    Dutu, Mihai

    2009-01-01

    The present dynamic security environment forced organizations or countries to radically restructure their objectives and strategies. In the last years, the European Union energy strategy has been in the process of a profound objectives transformation. The paper deals with the problem of the energy security in the European Union and the role of renewable energies to security supply in the context of the global energetic crisis, and the role of multiple factors which destroy the equilibrium amo...

  13. Third Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2009-01-01

    On June 4th, 2009, the third Dutch Process Control Security Event took place in Amsterdam. The event, organised by the Dutch National Infrastructure against Cybercrime (NICC), attracted both Dutch process control experts and members of the European SCADA and Control Systems Information Exchange (Eur

  14. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.-P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (E

  15. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.-P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering

  16. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.-P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (E

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Information Security

    OpenAIRE

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W. Ph.

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  19. Evolution of approaches to economic security problems in Europe

    OpenAIRE

    Kuznetsov, Alexey; Toganova, Natalia; Gutnik, Anna

    2010-01-01

    The report, written by the experts of the Center for European Studies of IMEMO RAN – Dr. Alexey Kuznetsov, Natalia Toganova and Anna Gutnik – analyzes the evolution of the approaches to the problems of economic security in Europe. The report is prepared for the Commission of the Euro-Atlantic Security Initiative (EASI). The authors analyze the reasons why some economic problems in Europe cause the attention as the security problems. The report presents a study on transformation of the appr...

  20. Protecting animals and enabling research in the European Union

    DEFF Research Database (Denmark)

    Olsson, I. Anna S.; Pinto da Silva, Sandra; Townend, David

    2016-01-01

    European playing field. Starting in 2002, a process of revising European animal experimentation legislation was undertaken, with one of its key aims being to ensure high standards of welfare for laboratory animals across Europe. This resulted in Directive 2010/63/EU, which has regulated this activity......In 1986, European Directive 86/609/EEC, regulating the use of animals in research, was one of the first examples of common legislation to set standards for animal protection across the Member States of the former European Economic Community, now the European Union, with the aim of securing a level...... objectives of the directive, particularly with a focus on securing the same high standards of animal protection across member countries. The analysis focuses on three separate issues: (1) minimum standards for laboratory animal housing and care, (2) restrictions on the use of certain animal species, and (3...

  1. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  2. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  3. The new architecture of the European Union

    Directory of Open Access Journals (Sweden)

    Radivojević Zoran

    2011-01-01

    Full Text Available The Lisbon Treaty has brought significant changes into the architecture of the European Union. The most important novelty, however, is the establishment of a full unity of the Union structure achieved by creating new and strengthening the existing elements. The new elements of this unity are the disappearance of the European Community, the 'independence' of the European Atomic Energy Community, constituting the European Union as a single entity and the introduction of EU values. At the same time, the Lisbon Treaty has strengthened the existing elements of the common institutional mechanisms, rules on amending the founding treaties and EU membership. However, constituting the Union as a single entity which has replaced and succeeded the European Communities has not abolished the EU elements of diversity. In the areas that differed, even before the adoption of the Lisbon Treaty, from the community pillar, there remain significant differences in the nature and the scope of competences of the Union institutions. This mainly regards the common foreign and security policy, which now includes the defense policy, where the existing model of inter-state cooperation has been only slightly interfered with. In contrast, in the field of police and judicial cooperation in criminal matters, which has become part of a larger Area of Freedom, Security and Justice, the inter-state model of cooperation has been abandoned in some of its most important elements. However, the implementation of some of the important elements of the supranational model has been postponed.

  4. EUROPEAN AUSTERITY WITHOUT GROWTH? EUROPEAN GROWTH WITHOUT EUROPEAN DEMOCRACY?

    Directory of Open Access Journals (Sweden)

    Montani Guido

    2011-07-01

    Full Text Available The European project is facing a crisis. Citizens no longer understand what the EU is about. Young people and the new ruling class have forgotten the clear message of the European project launched just after the Second World War "No wars ever again among Europeans." The founding fathers of the European Union are mentioned in history textbooks, but today Europe is felt as an irritating bureaucracy. In Europe, peace and economic stability are considered as a natural state, a gift from above. Why keep a useless EU alive? The state of the European Union is swiftly degenerating. In almost all the member states, the anti-European forces are gaining ground. Populism is not a new ideology and is not necessarily European: let's recall Peronism. In today's Europe populism is the new manifestation of nationalism. In Italy the Lega Nord is in Berlusconi's eurosceptic government. In France, the National Front is endangering UMP's hegemony. In Belgium the rows between the Flemish and the Walloons threatens the state's unity. In the Netherlands, Hungary, the Czech Republic, Austria and Finland, populist forces are either in the government or strongly influencing the government. National-populism is different from the nationalism of the past. De Gaulle's nationalism was an ideology founded on the "grandeur" of France's history and on a certain idea of Europe, which was "l'Europe de patrie", a kind of European unity accepting French leadership in world politics. Today national-populism is a form of micro-nationalism: it opposes the European project but without having a serious alternative. This is why populism is dangerous. Its real goal is not only the breaking down of the European Union but also the disintegration of the old nation states into micro-ethnic states, as what happened in former Yugoslavia.

  5. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  6. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  7. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  8. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  9. SECURITY SYSTEMS FOR MARITIME HARBOUR

    Directory of Open Access Journals (Sweden)

    Georgică SLĂMNOIU

    2010-11-01

    Full Text Available Infrastructure protection objectives are at the top of the agenda of those responsible in the European Union. Currently Romania is one of the countries on its eastern border of the Union and this has special implications in terms of security measures that are required to be implemented. Ships and harbours are important current conflict stage. An integrated system of protection of harbours must be prepared in advance in order to continuously provide information that will increase the overall performance of the intervention forces.

  10. Secure multiparty computation goes live

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan Bjerre

    2009-01-01

    Commision. Tomas Toft’s work was partially performed at Aarhus University. In Holland, he was supported by the research program Sentinels, financed by Technology Foundation STW, the Netherlands Organization for Scientific Research (NWO), and the Dutch Ministry of Economic Affairs.......In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. This work was supported by the Danish Strategic Research Council and the European...

  11. ECONOMIC CHALLENGES FOR EUROPEAN DEFENCE

    Directory of Open Access Journals (Sweden)

    Maria CONSTANTINESCU

    2016-12-01

    Full Text Available The issue of a common European Union (EU defence is on the frontline of political and media discussions, in light of the recent evolutions in the security and defence environment. The main challenge in this respect is related to the realism and feasibility of moving beyond political declarations towards a more concrete implementation of a common defence policy, considering the numerous political, military and economic factors involved. The aim of this paper is to analyse the challenges faced by the concept of a common European defence from an economic point of view, considering the evolution of the defence expenditures in the EU member states, compared to the wider European and the global trend. Also, the paper will focus on the impact the economic crisis and the ensuing austerity measures had on the member states and on their cooperation in developing a common approach on defence, with a view on the ways ahead and recommendations on overcoming the difficult challenges in this respect.

  12. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  13. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  14. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  15. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  16. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  17. Computer Security: Geneva, Suisse Romande and beyond

    CERN Multimedia

    Computer Security Team

    2014-01-01

    To ensure good computer security, it is essential for us to keep in close contact and collaboration with a multitude of official and unofficial, national and international bodies, agencies, associations and organisations in order to discuss best practices, to learn about the most recent (and, at times, still unpublished) vulnerabilities, and to handle jointly any security incident. A network of peers - in particular a network of trusted peers - can provide important intelligence about new vulnerabilities or ongoing attacks much earlier than information published in the media. In this article, we would like to introduce a few of the official peers we usually deal with.*   Directly relevant for CERN are SWITCH, our partner for networking in Switzerland, and our contacts within the WLCG, i.e. the European Grid Infrastructure (EGI), and the U.S. Open Science Grid (OSG). All three are essential partners when discussing security implementations and resolving security incidents. SWITCH, in...

  18. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  19. Institutionalizing information security.

    OpenAIRE

    2008-01-01

    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became promi...

  20. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  1. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  2. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  3. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  4. The European Union and Russian energy politics. External energy relations and interdependency between the European Union and Russia

    Energy Technology Data Exchange (ETDEWEB)

    Akca Prill, Melek

    2012-07-01

    The European Union and Russia Energy Politics aims to analyse the energy relationships, energy foreign policy and energy dialogue between the European Union Member States and the Russian Federation. To understand the recent developments in Russian - European Union energy relations better, the study aims to assert the disciplines and approaches of international relations in the example of Russia and the European Union systems of government. The important question here, whether diversification of energy supplier or energy supply routes is possible. If there is a possibility to diversify the supplier, is this then too costly to build, operate and rely on new pipeline routes? More crucial issue is, whether Russia is a reliable energy supplier in terms of European Energy Security approach. Throughout these assumptions, the role and vision of European Union Member States, the possible energy exporter countries, their policies and contributions are going to be discussed.

  5. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  6. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  7. European Honors Council

    NARCIS (Netherlands)

    Dr. Marca Wolfensberger

    2016-01-01

    In M. Wolfensberger (Chair), Models of support. Break out session conducted at the Utrecht Honours Conference 2016: Honours Futures, June 2-3 Utrecht. The European Honors Council (EHC) is a new European network around the subject of talent development in European higher education.

  8. European Network Against Racism:

    DEFF Research Database (Denmark)

    Nielsen, Helene Pristed

    From the point of view of social movement theory, ENAR (European Network Against Racism) is a strange creature. Partly being an outcome of the European Year Against Racism celebrated in 1997, ENAR was created in 1998 explicitly as an interlocutor with the European Commission in terms of its...

  9. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  11. European Energy Law. Report VII

    Energy Technology Data Exchange (ETDEWEB)

    Hammer, U.; Roggenkamp, M.M. (eds.)

    2010-04-15

    The European Energy Law Report VII presents in four parts an overview of the most important legal developments in the field of EU and national energy and climate change law as discussed at the 2009 European Energy Law Seminar. The first part examines recent developments in EU climate change regulation. It includes an overview of the revision of the EU Directive governing CO2 emissions trading and a more detailed analysis of the new allocation regime, including the auctioning of emission rights. This is followed by an analysis of the competitiveness of the new EU emissions trading Directive and recent developments in the US regarding emissions trading. The second part focuses on the energy liberalisation process and the Third Energy Package. Following an overview of recent developments in EU competition law and the impact of the Sector Inquiry on the energy sector, this part concentrates particularly on the new Internal Energy Market Directives and most particularly on the legality of the unbundling provisions. Subsequently, the focus is on the role of the TSOs. After an analysis of the need for an increased cooperation of the German TSOs, another chapter discusses the need for more consolidation in the European gas transmission market and the role of regulation therein. Is there a new role for nuclear energy? In order to secure long term energy supply, the focus turns again to nuclear energy. The third part of this report discusses two elements of nuclear liability. First, it analyses the issue of the possible privatisation of the nuclear sector and its impact on long term liability. Although the focus is on the UK nuclear sector, a comparison is made with some other regulatory regimes. Next, the role of nuclear energy is discussed as an instrument to reduce CO2 emissions and, more particularly as a means to reach the 20-20-20 targets. The question is raised whether the international rules on civil liability provide sufficient protection to victims of nuclear

  12. Data security breaches and privacy in Europe

    CERN Document Server

    Wong, Rebecca

    2013-01-01

    Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems a

  13. The New Policy of Nordic Security

    Directory of Open Access Journals (Sweden)

    Luis M. Mora Fernandez-Rua

    1996-02-01

    Full Text Available During the Cold War period, the security policy of the Nordic countries was based on what Arne Olav Brundtland had called nordic balance. After the fall of the Berlin Wall in 1989 and the end of the East-West confrontation, this concept has been reformulated, among other factors, by the decision taken by Sweden and Finland torenounce their traditional policies of neutrality and their joining the European Union. In this new international context, the Nordic countries have redefined the strategies and the instruments of their security policy with a view to creating a space of multidimensionalcooperation at all levels.

  14. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  15. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  16. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  17. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  18. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  19. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  20. Network Security Scanner

    OpenAIRE

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  1. Turkey's Accession to the European Union in terms of impact on the EU's security and defense policies: potential and drawbacks A adesão da Turquia à União Europeia em termos de impacto nas políticas de segurança e defesa: potencial e limitações

    Directory of Open Access Journals (Sweden)

    Maria do Céu Pinto

    2010-07-01

    Full Text Available This study explores the impact of Turkey's likely entry in the European Union (EU in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.O presente artigo analisa o impacto da possível adesão da Turquia à União Europeia (UE em termos da política externa, de segurança e defesa. O artigo começa por analisar as capacidades da Turquia, especialmente as suas capacidades militares e de que forma estas poderiam fornecer à UE os recursos de defesa de que necessita. De seguida, examina as divergências nas relações da Turquia-UE, criando obstáculos ao desenvolvimento da cooperação NATO-UE em matéria de gestão de crises. O artigo avalia ainda as consequências para a UE decorrentes da localização estratégica da Turquia. Analisa-se até que ponto a UE e a Turquia poderão ter interesses convergentes em algumas destas zonas, especialmente no Oriente Médio.

  2. Europe’s New Security Vocation

    Science.gov (United States)

    2002-01-01

    Flanagan PUBLICATION DIRECTORATE Director and Editor, Joint Force Quarterly: Robert A. Silano General Editor, NDU Press: William R. Bode Supervisory Editor...thanks go as well to Robert A. Silano , Director of Publications, for his professional- ism and friendship. Thanks are also due to the editorial staff of...supervision of Mr. Silano . 1 Chapter One Introduction T he idea of a European Security and Defense Identity (ESDI) has been a feature of the transatlantic

  3. THE COMPETITION POLICY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Dumitriţa Florea (Ionescu

    2012-09-01

    Full Text Available The idea of European unity dates back to antiquity, the time when the Roman Empire alsopursued such a goal. Attempts to unify European countries have appeared constantly in history, but theirsuccessful culmination crystallized only after the Second World War.Basically, the two wars have led to the downfall of Europe and the loss of its centenary political andmilitary position. The experience of these wars has led the states to initiate a defense mechanism of peace,security and international cooperation - resulted in creating an organization of universal jurisdiction -TheLeague of Nations. However, the successor of this organization, The United Nations - was one thatmanaged thorough its collective security system represented by the Security Council, to ensure andmaintain universal / global peace until now (Stelian Scăunaş, 2005.The creation of the European Union is based on four founding treaties: The Treaty establishingThe European Coal and Steel Community (ECSC - adopted in Paris on April 18, 1951, entered into forcein 1952 - treaty concluded for a period of 50 years and that has terminated in 2002, The Treatyestablishing the European Economic Community (EEC, The Treaty establishing the European AtomicEnergy Community (EAEC or EURATOM, both signed in Rome on March 25, 1947 and entered into forcein 1958 as the Treaties of Rome, and The Treaty on the European Union, which was adopted at Maastrichton 7th of February 1992 and entered into force in 1993. To these institution treaties we can add themodifying treaties of the founding treaties, including: The Merger Treaty - adopted in Brussels on 8 April1965, entered into force in 1967; The Single European Act - signed in Luxembourg and Hague in 1986,entered into force in 1987; The Amsterdam Treaty - signed on October 2, 1997, entered into force in 1999,The Treaty of Nice - signed on February 26, 2001, entered into force in 2003, The Lisbon Treaty signed in2007 and entered into force on December 1st

  4. Beyond Intergovernmentalism: The Europeanization of Restrictive Measures?

    Directory of Open Access Journals (Sweden)

    Francesco Giumelli

    2013-07-01

    Full Text Available The functioning of the European Union (EU has been explored extensively in recent years. The dominant prism through which to look at the EU is still one of locus: i.e. whether decisions are made in the capitals of its member states or in Brussels. This debate is contained in the dualism between intergovernmentalism and supranationalism, but drawing the boundaries between the two concepts is still undone. This article attempts to contribute to solving this problem by investigating the restrictive measures policy of the EU in order to identify three conditions under which intergovernmentalism should be used. First, when EU institutions are dependent on EU member states for information and expertise; second, when decision-making powers rest mainly in EU capitals; and three, when there are no exclusive fora for decision-making in Brussels. The study of the restrictive measures of the European Union does not meet any of these three conditions; therefore the article argues that the concept of supranational intergovernmentalism offers useful insights to understand the EU security governance of CFSP sanctions. The article is divided into four parts. The first introduces the debate on security governance and justifies the selection of this specific approach to the study of sanctions. The second part presents the restrictive measures policy of the European Union and justifies its pertinence to the field of security. The third part of the article investigates the emerging patterns in security governance by testing the three conditions on the decision-making process for EU restrictive measures. Finally, the conclusion summarises the main argument and indicates ways forward in the study of EU sanctions from a governance perspective.

  5. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  6. Update of European bioethics

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2015-01-01

    This paper presents an update of the research on European bioethics undertaken by the author together with Professor Peter Kemp since the 1990s, on Basic ethical principles in European bioethics and biolaw. In this European approach to basic ethical principles in bioethics and biolaw, the princip......This paper presents an update of the research on European bioethics undertaken by the author together with Professor Peter Kemp since the 1990s, on Basic ethical principles in European bioethics and biolaw. In this European approach to basic ethical principles in bioethics and biolaw......, the principles of autonomy, dignity, integrity and vulnerability are proposed as the most important ethical principles for respect for the human person in biomedical and biotechnological development. This approach to bioethics and biolaw is presented here in a short updated version that integrates the earlier...

  7. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  8. Climate change and European cleaner coal technology (CCT)

    Energy Technology Data Exchange (ETDEWEB)

    Luque Cabal, V.

    2003-07-01

    The debate on the Green Paper 'Towards a European strategy for the security of energy supply' concluded that the deployment of clean coal-technologies (CCTs) contributes very positively to the security of energy supply. This paper reports some of the contributions to the debate. It goes on to summarise 6 successful projects demonstrating advanced CCTs that have been financed through the EU programmes THERMIE or ENERGIE or by the European Investment Bank. These include the demonstration projects at the CHP plant in Cottbus and the supercritical plant at Schwarze Pumpe. A table lists the efficiency and the technologies used at recent European coal-fired power plants. The challenge of mitigating climatic change and increasing the use of clean energy are two of the fundamental objectives of the European Union. The European Climate Change Programme (ECCP) Working Groups have identified measures to enable Kyoto Protocol targets to be achieved. These include, in the period 2001-2010, increasing the thermal efficiency of coal-fired power plants and beyond the Kyoto horizon, CO{sub 2} capture and sequestration. The final section of the paper considers the potential market for CCT in Europe today and stresses the importance of CCTs in achieving environmental objectives which the European Union is ready to launch in the context of the Kyoto Protocol. The paper was presented by the Deputy Head of the European Commission's Coal and Oil Unit. 5 figs., 3 tabs.

  9. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism.......Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  10. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  11. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  12. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  13. Europeanization and transnational states

    DEFF Research Database (Denmark)

    Jacobsson, Bengt; Lægreid, Per; Pedersen, Ove K.

    This work investigates what happens to an organized political unit when it becomes part of a larger entity and, in particular, how increased European integration and the tentative moves towards a transnational state will affect the European Union's nation state. Europeanization and the transforma...... in central government agencies. It concludes that the consequences of Europeanization can be described as the growth of a transnational administration where identities as well as loyalties are created in processes that transcend the borders of states.......This work investigates what happens to an organized political unit when it becomes part of a larger entity and, in particular, how increased European integration and the tentative moves towards a transnational state will affect the European Union's nation state. Europeanization...... and the transformation of states provides an extensive comparative survey of the central governments in four Scandinavian countries and analyses the ways in which the European Union has influenced the day-to-day work of their state administrations. It includes coverage of: Denmark, a long-standing member of the European...

  14. The European Arrest Warrant

    Directory of Open Access Journals (Sweden)

    Minodora-Ioana Balan-Rusu

    2012-05-01

    Full Text Available In the paper it is generally examined the institution of the European arrest warrant according to the latest changes and additions through the adoption of a new European legislative act. The paper is a continuation of research in the area of judicial cooperation in criminal matters in the European Union. It may be useful to the judicial bodies with the responsibilities of issuing and executing a specific European arrest warrant and to academics and students in law schools. The research results, the essential contribution, the originality consist of the general examination of the institution, the critical remarks and proposals for amending and completing certain provisions insufficiently clear.

  15. Europeanization and Transnational States

    DEFF Research Database (Denmark)

    Pedersen, Ove Kaj; Jacobsson, Bengt; Lægreid, Per

    This work investigates what happens to an organized political unit when it becomes part of a larger entity and, in particular, how increased European integration and the tentative moves towards a transnational state will affect the European Union's nation state. Europeanization and the transforma...... in central government agencies. It concludes that the consequences of Europeanization can be described as the growth of a transnational administration where identities as well as loyalties are created in processes that transcend the borders of states.......This work investigates what happens to an organized political unit when it becomes part of a larger entity and, in particular, how increased European integration and the tentative moves towards a transnational state will affect the European Union's nation state. Europeanization...... and the transformation of states provides an extensive comparative survey of the central governments in four Scandinavian countries and analyses the ways in which the European Union has influenced the day-to-day work of their state administrations. It includes coverage of: Denmark, a long-standing member of the European...

  16. GUEST LECTURE European Security in the 21st Century - New ...

    African Journals Online (AJOL)

    Speech delivered at the South African Defence College, Pretoria, 23 February 1998. 138. Scientia ... peace and freedom and in harmony with all our neighbours. In Europe, the ... Cyprus, the fragile peace process in the Middle East also have.

  17. Global Climate and the Security of the European Union

    Science.gov (United States)

    2012-03-15

    precipitation suggest that climatic zones could shift several hundred kilometers towards the poles over the next fifty years. The report indicates...Romania, Slovakia, Slovenia and the Northern part of France,  Mediterranean Countries (MCEU) – Cyprus, Greece, Italy, Malta , Portugal, Spain, and the...global climate change. Precipitation is expected to decrease and draughts to increase. Egypt, Jordan, Lebanon and the Palestinian Territory will mostly

  18. Bezopasnost v portahh Jevropõ = Security in European ports

    Index Scriptorium Estoniae

    2004-01-01

    Ülevaade 18-20. veebruarini 2004 Tallinnas toimunud Rahvusvahelise Sadamate Assotsiatsiooni (International Association of Ports and Harbours) nõupidamisest "Europe - Africa", millel käsitleti Euroopa sadamate julgeoleku küsimusi

  19. Bezopasnost v portahh Jevropõ = Security in European ports

    Index Scriptorium Estoniae

    2004-01-01

    Ülevaade 18-20. veebruarini 2004 Tallinnas toimunud Rahvusvahelise Sadamate Assotsiatsiooni (International Association of Ports and Harbours) nõupidamisest "Europe - Africa", millel käsitleti Euroopa sadamate julgeoleku küsimusi

  20. European Security Environment in the Context of Globalization

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2012-08-01

    Full Text Available The most important consequence of the Cold War was that "it leaped the pressure cookerlid of the planet." There were issued, thus the determining energies in the globalization accelerationand its assertion as the current main feature of the international system. Cold War demonstrated,firstly, the rule of the West in its ideological confrontation with communism. Although the massivemilitary expenditures of NATO countries had their importance in deterring a possible Sovietaggression, which brought to its knees "The Evil Empire"; it was the antithesis between communistdemagogy and the political, social and economic performance from the West. Constantly under thethreat of a nuclear Armageddon, the Cold War "was a global, systemic, long-term conflict, betweentwo power blocks sustained by incompatible ideologies. It was a global war, accompanied by warsaround by the inference of the entire world. It was a "one-dimensional" confrontation, well organized,guided by the written and unwritten principles, accepted by the main opponents and by their allies.The fact that the international system in the years after 1989 was dominated by the U.S. military wasa good thing, its effect being the reduction of chances that, in a period of profound changes, a warbetween great powers would take place. Post-Cold War period, although it was registered a number ofwars, especially civil ones, cannot be said in any case that it was characterized by a major risk of awar between great powers.

  1. The European Union’s Energy Security Challenges

    Science.gov (United States)

    2007-05-07

    countries, particularly Germany, occurred in early January 2007. This time, Russian oil pipeline operator Transneft shut down the Druzhba oil...oil production has not reached pre-war levels, and there is fear that terrorist groups could target pipelines and production facilities throughout...energy investments; free trade in energy materials, products and equipment; freedom of energy transit through pipelines and grids; promoting energy

  2. The Future of NATO and an Evolving European Security Interest

    Science.gov (United States)

    2010-03-03

    2009, p.56 30 Benjamin S. Lambeth, “NATO’s Air War for Kosovo: A strategic and Operational Assessment, Santa Monica, RAND 2001, pp. xiii -xxiv 31...Klaus Nauman, General German Army ret., Former Chief MC NATO, “Sicherheit ohne die USA? Die NATO in der Perzeption Europas “, Berichte und Studien – Die...das größere Europa ?“, Hans Arnold, Raimund Krämer, “Sicherheit für das größere Europa “, Bonn 2002, p. 355 46 François N.Heisbourg. “Europe’s

  3. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  4. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Biometrics and ID Cards — Enablers for Personal Security

    Science.gov (United States)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  6. A European Res publica

    Directory of Open Access Journals (Sweden)

    Ola Zetterquist

    2011-05-01

    Full Text Available The article analyses the fundamental constitutional enigma of the European Union (EU, namely whether the EU can be considered as a (from its Member States separate and independent constitutional legal order. The EU is often referred to as a legal order sui generis, i.e. of a unique character that defies traditional definitions. More specifically, the notion of an independent and separate EU is at odds with the idea of the sovereign state. The notion of the EU as a legal order sui generis is too much influenced by the models of the sovereign state and sovereignty (in the vein of Thomas Hobbes. The key component in the Hobbesian idea of sovereignty is freedom as non-interference. A sovereign state is consequently a state that is free from, i.e. not interfered with by, external actors like, for example, the EU. Put differently, either the EU is sovereign or the Member States are sovereign. By shifting the perspective to a neo-Roman republican understanding of freedom as non-domination the constitutional picture of the EU will become more nuanced. Res publica is best understood as what citizens hold in common and above their narrow self-interest. According to a republican notion of the constitution the purpose of the law is to eliminate the possibility of arbitrary domination. For that reason, not all interference is to be considered as a restriction of freedom but only those restrictions that cannot be justified according to the res publica. Viewed through the republican prism it can be argued that the EU represents an important advancement in securing freedom as non-domination without implying that the EU must become a state. The fundamental enigma can thus be rephrased as a clash between two diverging concepts of freedom. Whereas the EU will always be at odds with the idea of sovereignty (however framed it will be much easier to reconcile with the republican ideal. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=1837332

  7. A review of the European offshore wind innovation system

    NARCIS (Netherlands)

    Wieczorek, A.J.; Negro, S.O.; Harmsen, R.; Heimeriks, G.J.; Luo, L.; Hekkert, M.P.

    2013-01-01

    Offshore wind has the potential of becoming an important pillar of the future European energy system. It can contribute to policy objectives on climate change, energy security, green growth and social progress. However, the large potential of offshore wind does not automatically lead to a large shar

  8. Exploring the emotional appeal of green and social Europe myths among pan-European Union organisations

    DEFF Research Database (Denmark)

    Lynggaard, Kennet

    2016-01-01

    This paper aims to advance European integration research by exploring the emotional appeal of political myths in day-to-day EU politics with a special focus on the reception and reproduction of myths among pan-European Union non-governmental organisations. I investigate myths associated with ‘EUR...... policy positions and continually mobilise desires around utopian ideals to secure organisational survival....

  9. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  10. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  11. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  12. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  13. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  14. Importance of Cyber Security

    National Research Council Canada - National Science Library

    Rajesh Kumar Goutam

    2015-01-01

    ... to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information...

  15. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  16. Privatising security and war

    Directory of Open Access Journals (Sweden)

    José L Gómez del Prado

    2011-03-01

    Full Text Available State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  17. THE ROLE OF THE EUROPEAN EXTERNAL ACTION SERVICE IN THE EU’S INSTITUTIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    DAN VATAMAN

    2012-05-01

    Full Text Available European External Action Service (EEAS is a new institution of the European Union, whose foundation was laid by the Treaty of Lisbon with the role to support the High Representative of the Union for Foreign Affairs and Security Policy in fulfilling his mandate and, also to assist the President of the European Council, European Commission, President and other Commissioners to exercise their powers in international relations. Since the establishment of the European External Action Service (EEAS is relatively recent, this article tries to highlight the crucial role of the European External Action Service (EEAS in the European Union's institutional system and its contribution to strengthening the coherence and increasing impact and visibility of European Union action at international level and thus the one of the Member States.

  18. Understanding global security

    OpenAIRE

    Hough, Peter

    2013-01-01

    Fully revised to incorporate recent developments, this third edition of Understanding Global Security analyzes the variety of ways in which peoples lives are threatened and / or secured in contemporary global politics. The traditional focus of Security Studies texts: war, deterrence and terrorism are analyzed alongside non-military security issues such as famine, crime, disease, disasters, environmental degradation and human rights abuses to provide a comprehensive survey of how and why peopl...

  19. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  20. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  1. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  2. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  3. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  4. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  5. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  6. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  7. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  8. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  9. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  10. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    large and diverse cyber threats that range from unsophisticated hackers to technically com- petent intruders using state-of-the-art intrusion...targets, and programs • Consistent with the organization’s overall security threat and risk management strategy and the nature and scale of its...the security manage- ment system • Establishing meaningful security met- rics and measures of effectiveness • Ensuring security -related threats , criti

  11. European Home Energy

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.

    2009-01-01

    An important aim of the european energy performance of buildings directive is to improve the overall energy efficiency of new homes......An important aim of the european energy performance of buildings directive is to improve the overall energy efficiency of new homes...

  12. European works councils

    DEFF Research Database (Denmark)

    Knudsen, Herman Lyhne

    2003-01-01

    The theme adressed by this paper is the opportunities for European Works Councils (EWCs) of gaining influence on corporate decisions in multinational companies.......The theme adressed by this paper is the opportunities for European Works Councils (EWCs) of gaining influence on corporate decisions in multinational companies....

  13. European Home Energy

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.

    2009-01-01

    An important aim of the european energy performance of buildings directive is to improve the overall energy efficiency of new homes......An important aim of the european energy performance of buildings directive is to improve the overall energy efficiency of new homes...

  14. Theorizing European societies

    NARCIS (Netherlands)

    Ossewaarde, M.R.R.

    2013-01-01

    Explores key sociological concepts and theory in relation to European crises, identity, inequality and social order. It offers a firm understanding of the modernization of Europe and everyday European life, while not neglecting the historical context. Essential reading for students of sociology in E

  15. Railway separation: European diversity

    NARCIS (Netherlands)

    Van de Velde, D.M.; Röntgen, E.F.

    2009-01-01

    The European railway sector currently exhibits a wide variety of institutional configu- rations as a result of the reforms initiated by European legislation. This chapter de- scribes the situation in the Netherlands, Germany, Switzerland, Great-Britain and France, providing a good coverage of the

  16. European works councils

    DEFF Research Database (Denmark)

    Knudsen, Herman Lyhne

    2004-01-01

    The theme addressed by this artcle is the opportunities for European Works Councils of gaining influence on corporate decisions in multinational companies.......The theme addressed by this artcle is the opportunities for European Works Councils of gaining influence on corporate decisions in multinational companies....

  17. The European Programme Manager

    DEFF Research Database (Denmark)

    Larson, Anne; Bergman, E.; Ehlers, S.;

    The publication is a result of a cooperation between organisations in six European countries with the aim to develop a common European education for programme managers. It contains of a description of the different elements of the education together with a number of case-studies from the counties...

  18. The European Geoparks Network

    Institute of Scientific and Technical Information of China (English)

    NickolasZouros

    2004-01-01

    The European Geoparks Network was established in June 2000 by four regions of different European Countries--France, Germany, Spain and Greece--with similar natural and socioeconomic characteristics. These four regions are rural areas, with a particular geological heritage, natural beauty and high cultural potential, all facing problems of slow economic development,

  19. European media law

    NARCIS (Netherlands)

    Castendyk, O.; Dommering, E.; Scheuer, A.

    2008-01-01

    European Union legislation concerning electronic communications media is firmly established as an essential part of the law in the field in Europe. From relevant provisions of the European Convention of Human Rights and the EC Treaty to numerous directives, the most recent being the Audiovisual Medi

  20. Institutionalization through Europeanization

    DEFF Research Database (Denmark)

    Givskov, Cecilie

    2013-01-01

    to the question of Europeanization. The main argument is that the EC’s ongoing push for the Pan-European idea, through pressures and enabling structures, have contributed to the promotion of a process of institutionalization with re-nationalization and affirmation of national film-cultural diversity as its main...

  1. European works councils

    DEFF Research Database (Denmark)

    Knudsen, Herman Lyhne

    2003-01-01

    The theme adressed by this paper is the opportunities for European Works Councils (EWCs) of gaining influence on corporate decisions in multinational companies.......The theme adressed by this paper is the opportunities for European Works Councils (EWCs) of gaining influence on corporate decisions in multinational companies....

  2. European works councils

    DEFF Research Database (Denmark)

    Knudsen, Herman Lyhne

    2004-01-01

    The theme addressed by this artcle is the opportunities for European Works Councils of gaining influence on corporate decisions in multinational companies.......The theme addressed by this artcle is the opportunities for European Works Councils of gaining influence on corporate decisions in multinational companies....

  3. European Union representation at the United Nations : towards more coherence after the Treaty of Lisbon

    NARCIS (Netherlands)

    Jin, Xi

    2014-01-01

    This dissertation explores the effects of the Treaty of Lisbon (ToL) on the coherence of the external representation of the European Union (EU) in the field of Common Foreign and Security Policy (CFSP) at two main UN bodies, i.e., the UN General Assembly (UNGA) and the Security Council (UNSC). It th

  4. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  5. Secure Disk Mixed System

    Directory of Open Access Journals (Sweden)

    Myongchol Ri

    2013-01-01

    Full Text Available We propose a disk encryption method, called Secure Disk Mixed System (SDMS in this paper, for data protection of disk storages such as USB flash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitations of existing disk encryption methods and to control security performance flexibly according to the security requirement of system.

  6. Homeland Security and Information.

    Science.gov (United States)

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  7. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  8. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  9. Indicators for energy security

    NARCIS (Netherlands)

    Kruyt, B.; van Vuuren, D.P.; de Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability,

  10. Quantum secure circuit evaluation

    Institute of Scientific and Technical Information of China (English)

    CHEN Huanhuan; LI Bin; ZHUANG Zhenquan

    2004-01-01

    In order to solve the problem of classical secure circuit evaluation, this paper proposes a quantum approach. In this approach, the method of inserting redundant entangled particles and quantum signature has been employed to strengthen the security of the system. Theoretical analysis shows that our solution is secure against classical and quantum attacks.

  11. Crayons and security

    OpenAIRE

    Sue Dwyer

    1999-01-01

    Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  12. Crayons and security

    Directory of Open Access Journals (Sweden)

    Sue Dwyer

    1999-04-01

    Full Text Available Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  13. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an impl

  14. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an impl

  15. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  16. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion. In contrast, a hybrid-secure protocol provides different security guarantees depending on the set of corrupted parties and the computational powe...

  17. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  18. The Europeanization of Eurosceptics?

    DEFF Research Database (Denmark)

    Dutceac Segesten, Anamaria; Bossetta Jr, Michael Joseph

    of a Europeanized network of anti-European voices for European integration and democracy. We plan to operationalize our research question through the use of webcrawling (i.e. Issue Crawler) and social media analytic softwares (Twitonomy and Bluenod). Using these softwares we will be able to discern whether......NB: For those interested in our use of the Issuecrawler in this paper, please see our more recent web science paper entitled "Tracing Eurosceptic Party Networks via Hyperlink Network Analysis and #FAIL!ng: Can Web Crawlers Keep up with Web Design?", where we outline the limitations we uncovered...... while using the Issuecrawler. The purpose of this paper is to investigate the, perhaps paradoxical, phenomenon of Europeanization of Eurosceptic parties and the role the internet played in this process during the campaign for the European Parliament elections of May 2014. We exemplify this phenomenon...

  19. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  20. Innovation in Justice and Security by Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Myzafer ELEZI

    2013-11-01

    Full Text Available The Lisbon Treaty is a legal package which includes previous treaties, starting from the year 1957, following the Treaty of Rome and the Treaty of Nice in 2001, summarized in a single text that introduces a number of changes of the way how the European Union works, in order to make it more efficient for its citizens. This Treaty converts the European Union for the first time in a single entity, unifying pillars of its activities which are as follows: the European Communities, Common Foreign and Security Policy, and Judicial Cooperation in Criminal Matters, which so far only the European Communities had the status of judicial person. It modifies the Treaty of European Union, created by the European Union and the Treaty created by the European Community, which is in power, but do not replace them. The new Treaty gives the EU the legal framework, and necessary tools to face the future challenges and to respond to its citizen’s perspectives. The Conference will introduce all the innovations that the Treaty of Lisbon brings not only in the field of security and foreign policy of the EU, but also in those related to police and judicial cooperation regarding criminal matters.

  1. German Energy Security and Its Implications on Regional Security

    Science.gov (United States)

    2016-12-01

    SECURITY AND ITS IMPLICATIONS ON REGIONAL SECURITY by Philemon Sakamoto December 2016 Thesis Advisor: Robert E. Looney Second Reader...DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE GERMAN ENERGY SECURITY AND ITS IMPLICATIONS ON REGIONAL SECURITY 5. FUNDING NUMBERS 6...and overall regional security and stability. Using a liberal framework, it illustrates how policies established to improve energy security may act

  2. Information security fundamentals

    CERN Document Server

    Blackley, John A; Peltier, Justin

    2004-01-01

    Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply thes

  3. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  4. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  5. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  6. Network Security Using Firewalls

    Directory of Open Access Journals (Sweden)

    Radu Lucaciu

    2008-05-01

    Full Text Available As networks increase in size and complexity, security products are growing in sophistication and security threats are becoming more ingenious. The usage of security solutions has become inevitable for all modern organisations. There is no perfect security, but the idea is to make a network so hard to access, that it doesn’t worth trying. One of the crucial components that contribute to this security are firewalls. It is important to prevent undesired data before it ever gets into the target system. This is the job of firewalls and the article covers this topic.

  7. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  9. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  10. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  11. Medical database security evaluation.

    Science.gov (United States)

    Pangalos, G J

    1993-01-01

    Users of medical information systems need confidence in the security of the system they are using. They also need a method to evaluate and compare its security capabilities. Every system has its own requirements for maintaining confidentiality, integrity and availability. In order to meet these requirements a number of security functions must be specified covering areas such as access control, auditing, error recovery, etc. Appropriate confidence in these functions is also required. The 'trust' in trusted computer systems rests on their ability to prove that their secure mechanisms work as advertised and cannot be disabled or diverted. The general framework and requirements for medical database security and a number of parameters of the evaluation problem are presented and discussed. The problem of database security evaluation is then discussed, and a number of specific proposals are presented, based on a number of existing medical database security systems.

  12. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  13. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  14. Working towards a European Geological Data Infrastructure

    Science.gov (United States)

    van der Krogt, Rob; Hughes, Richard; Pedersen, Mikael; Serrano, Jean-Jacques; Lee, Kathryn A.; Tulstrup, Jørgen; Robida, François

    2013-04-01

    The increasing importance of geological information for policy, regulation and business needs at European and international level has been recognized by the European Parliament and the European Commission, who have called for the development of a common European geological knowledge base. The societal relevance of geoscience data/information is clear from many current issues such as shale gas exploration (including environmental impacts), the availability of critical mineral resources in a global economy, management and security with regard to geohazards (seismic, droughts, floods, ground stability), quality of (ground-)water and soil and societal responses to the impacts of climate change. The EGDI-Scope project responds to this, aiming to prepare an implementation plan for a pan-European Geological Data Infrastructure (EGDI), under the umbrella of the FP7 e- Infrastructures program. It is envisaged that the EGDI will build on geological datasets and models currently held by the European Geological Surveys at national and regional levels, and will also provide a platform for datasets generated by the large number of relevant past, ongoing and future European projects which have geological components. With European policy makers and decision makers from (international) industry as the main target groups (followed by research communities and the general public) stakeholder involvement is imperative to the successful realization and continuity of the EGDI. With these ambitions in mind, the presentation will focus on the following issues, also based on the first results and experiences of the EGDI-Scope project that started mid-2012: • The organization of stakeholder input and commitment connected to relevant 'use cases' within different thematic domains; a number of stakeholder representatives is currently involved, but the project is open to more extensive participation; • A large number of European projects relevant for data delivery to EGDI has been reviewed

  15. Policy-making in the European Union

    CERN Document Server

    Pollack, Mark A; Young, Alasadair R

    2015-01-01

    Constantly evolving, and with far-reaching implications, European Union policy-making is of central importance to the politics of the European Union. From defining the processes, institutions and modes through which policy-making operates, the text moves on to situate individual policies within these modes, detail their content, and analyse how they are implemented, navigating policy in all its complexities. The first part of the text examines processes, institutions, and the theoretical and analytical underpinnings of policy-making, while the second part considers a wide range of policy areas, from economics to the environment, and security to the single market. Throughout the text, theoretical approaches sit side by side with the reality of key events in the EU, including enlargement, the ratification of the Lisbon Treaty, and the financial crisis and resulting euro area crisis, exploring what determines how policies are made and implemented. In the final part, the editors consider trends in EU policy-makin...

  16. CONVERGENCE IN THE EUROPEAN SOCIAL POLICY

    Directory of Open Access Journals (Sweden)

    Mariana Iovitu

    2012-07-01

    Full Text Available The European Union has developed a series of strategies that aim to limit the consequences of non-employment (due to the continuing crisis. These strategies aim by the objectives and mechanisms specific to the eco-social area, to improve the access to employment, social services, professional education and a more efficient European fund management. All this are subordinated to the coupling policy public-private in terms of partnerships both at a national level and European level. The problem is related to differences manifested between the social objectives at the national level and those imposed by the European context. The differences come from different degrees of economic development of the member states, economic development which is reflected on the living standards. The convergence between the social policies is based on the economic convergence, which represents the only way to ameliorate the discrepancies between the united nations of Europe. Social Europe dream or certainty? The answer can be found in the words of Jean Monnet: “we are not bringing together states, we are uniting people”. The efforts to define the four types of actions regarding the free movement of labor force and the correlation of the social security schemes, ensuring equal opportunities, respecting labor rights and the fight against discrimination can be found in the results obtained on these priorities.

  17. Level of Europeanization and Policy Outcomes

    Directory of Open Access Journals (Sweden)

    Mauro Tebaldi

    2013-06-01

    Full Text Available The European Union (EU is a decision-making, polycentric political community, with double-layer boundaries and constitutionally and procedurally plural decisions. Likewise, it may be assumed that the existence and the peculiar functioning of European-level policy-making governance, the increase in number of its structures, and its multilevel character may result in a new policy regime. The institutionalization-Europeanization level of the organizational field may become indispensable in determining which type of policy network and what styles of policy are established, or in influencing the degree of responsiveness and accountability, quality and intensity of interaction between the actors involved, the degree of territorial and functional consistency established in the Member States, and the decision-making skills of the EU itself. The aim of this work is to develop and evaluate basic assumptions, by means of an exploratory survey, focusing on the policy outcomes (as dependent variable of the institutionalization-Europeanization of the common security policy (as independent variable.

  18. European distributed seismological data archives infrastructure: EIDA

    Science.gov (United States)

    Clinton, John; Hanka, Winfried; Mazza, Salvatore; Pederson, Helle; Sleeman, Reinoud; Stammler, Klaus; Strollo, Angelo

    2014-05-01

    The European Integrated waveform Data Archive (EIDA) is a distributed Data Center system within ORFEUS that (a) securely archives seismic waveform data and related metadata gathered by European research infrastructures, and (b) provides transparent access to the archives for the geosciences research communities. EIDA was founded in 2013 by ORFEUS Data Center, GFZ, RESIF, ETH, INGV and BGR to ensure sustainability of a distributed archive system and the implementation of standards (e.g. FDSN StationXML, FDSN webservices) and coordinate new developments. Under the mandate of the ORFEUS Board of Directors and Executive Committee the founding group is responsible for steering and maintaining the technical developments and organization of the European distributed seismic waveform data archive and the integration within broader multidisciplanry frameworks like EPOS. EIDA currently offers uniform data access to unrestricted data from 8 European archives (www.orfeus-eu.org/eida), linked by the Arclink protocol, hosting data from 75 permanent networks (1800+ stations) and 33 temporary networks (1200+) stations). Moreover, each archive may also provide unique, restricted datasets. A webinterface, developed at GFZ, offers interactive access to different catalogues (EMSC, GFZ, USGS) and EIDA waveform data. Clients and toolboxes like arclink_fetch and ObsPy can connect directly to any EIDA node to collect data. Current developments are directed to the implementation of quality parameters and strong motion parameters.

  19. Assessing the European Parliament’s Democratic Credentials

    Directory of Open Access Journals (Sweden)

    Stephen Vitkovitch

    2015-12-01

    Full Text Available Doubts persist about the democratic legitimacy and role of the European Parliament in EU decision-making – this article takes a critical look at the body’s democratic credentials. An analysis of voter turnout and the impact the ‘Spitzenkandidaten process’ had on the second-order nature of European elections suggests that the European Parliament suffers from lower turnout than national counterparts, and that the 2014 European elections remained a second-order affair, in spite of the Parliament’s efforts. Existing data and analysis show that while the European Parliament to does a reasonable job translating citizens’ views in relation to left/right issues, the Parliament is more supportive of EU integration than citizens – new data gathered suggest the lack of congruence is pronounced. The European Parliament’s institutional framework set by the Treaties affects its choices, its more limited role in certain areas may lead it to adopt policy positions that are at odds with citizens’ views and security. Ultimately, the European Parliament does not enhance the democratic nature of the EU. The adoption of a more intergovernmental approach to EU decision-making at the expense of the European Parliament would help improve the democratic credentials of EU decision making, and as a minimum further expansion of the Parliament’s powers should be avoided.

  20. SOCIAL SECURITY OF TURKISH ATHLETES

    Directory of Open Access Journals (Sweden)

    Barış ÖZTUNA

    2015-07-01

    Full Text Available Law No. 5510 realized within the social security reform aims providing a structure which presents equal scope and quality of social security service other all citizens. According to Labor Law No 4857, unionization of sportsmen in Turkish legal environment is possible, sport clubs and sportsmen are continuing to live without so many rights and obligations but they didn’t. Aim of this study; to prove sportsmen of location of the labour law and to mark off. The purpose of the study is explained according to Law No. 4857 and Law No. 5510 Turkish athletes. Profesional athletes deemed to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. But amateur athletes don't seem to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. According to the law 5774 regarding to be called as an g overnment athlete, within the adults category of the sports that are accepted as olympic, paralympic and deaflympic; pension is paid to the amateur athletes who became first, second or third at Olymic games, World or European Champions as an individual or team sports and to the national team coaches and assistant coaches of the athletes’ who became Olympic or World Champion as a team.

  1. Democratic Citizenship: European referents

    Directory of Open Access Journals (Sweden)

    María PUIG GUTIÉRREZ

    2011-09-01

    Full Text Available Let’s sense beforehand in this article a tour concerning the educational European policies that favors the development of a democratic citizenship. The aim that we chase is to understand the way in which nowadays it is being interpreted and stimulated the Citizenship education from European Union. for it we offer a conceptual delimiting of «Citizenship education» and later, we show an analysis of the principal documents and materials elaborated principally by the Council of Europe that mark the way followed by European Union as for education for Democratic Citizenship (EDC.

  2. Symbolism in European Integration

    DEFF Research Database (Denmark)

    Manners, Ian

    2011-01-01

    Ernst Haas observed over fifty years ago that ‘United Europe' is a resilient, adaptable, unifying, and yet unspecified symbol'. It is precisely this adaptability and ambiguity that has ensures the continuing importance of European studies as a means of understanding ‘the remarkable social...... of social transformation involved' (Calhoun 2003: 18). This article will consider the role of symbolism in European integration as part of answering Craig Calhoun's call for a means of transcending specific regimes of analysis in order to advance European studies....

  3. European 'Stabilisation through Association'

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen

    ’s success in repeatedly reconciling a divided continent and complemented its efforts to build peace beyond its borders. But does the EU (continue to) deserve such praise? This contribution examines European peacebuilding from the early inte-gration of post-World War Two economies, through the uniting......In 2012 the Nobel Committee awarded the European Union (EU) its Peace Prize. It commemorated the building and sustaining of peace between Europeans, a process in which the Nobel Committee proposed that the EU and its predecessors had played an important part. It explicitly commen-ded the Union...

  4. European journals on microbiology.

    Science.gov (United States)

    Ronda, C; Vázquez, M

    1997-12-01

    A survey on the scientific journals dealing with microbiology published in Europe has been carried out. Eighteen European countries publish microbiological journals with the United Kingdom. Netherlands and Germany leading in number of journals on this specialty. Most of the European journals on microbiology are published bimonthly (27%), and English is the most common language used (54%). Most of these journals (86%) are included in some database, but only 36 (25%) are indexed in the six databases studied. Out of the 146 journals registered, 71 (49%), published in 11 European countries, are included in the 1995 Journal Citation Reports (ISI, Philadelphia).

  5. The European Union and Military Conflict Management

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen

    This book provides the first comprehensive review of the European Union’s role in military conflict management beyond its borders and makes an important contribution to debates on the EU’s role in global security governance. The EU has launched five military operations within the framework of its...... Common Security and Defence Policy with the explicit purpose to help manage violent conflicts beyond its borders. This book develops a definition and a set of criteria for success in military conflict management and applies this new analytical framework in a comparative case study of the five EU military...... operations undertaken in Macedonia, Bosnia and Herzegovina, the Democratic Republic of Congo, Chad and the Central African Republic. Having evaluated their success the book goes on to explore the conditions under which military conflict management operations conducted by international organizations...

  6. REPUTATIONAL AND OPERATIONAL RISKS IN EUROPEAN BANKS

    Directory of Open Access Journals (Sweden)

    Roxana HERGHILIGIU

    2014-06-01

    Full Text Available In the past 20 years operational and reputational risk has become more intriguing due to the public scandals of rogue tranding in banks like Barings Bank, Allied Irish Banks, Enron. The purpose of this study is to find the connections between operational risk and reputational risk. Our research shows that there may be a loss of reputation due to operational loss events. Moreover, every type of operational risk, from internal fraud, external fraud, legal and liability losses, processing errors, information security breaches, inappropriate business practice, physical security breaches conduct to a loss of reputation. The limitations of this paper are represented by the fact that do not have enough data to show the real impact of the reputation risk to the financial results of the European Banks.

  7. The European Union and Military Conflict Management

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen

    This book provides the first comprehensive review of the European Union’s role in military conflict management beyond its borders and makes an important contribution to debates on the EU’s role in global security governance. The EU has launched five military operations within the framework of its...... operations undertaken in Macedonia, Bosnia and Herzegovina, the Democratic Republic of Congo, Chad and the Central African Republic. Having evaluated their success the book goes on to explore the conditions under which military conflict management operations conducted by international organizations...

  8. Extended eTVRA vs. Security Checklist: Experiences in a Value-Web

    NARCIS (Netherlands)

    Morali, Ayse; Zambon, Emmanuele; Houmb, Siv Hilde; Sallhammar, Karin; Etalle, Sandro

    2008-01-01

    Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a Common Criteria evaluation. To support security evaluation, the European Telecommunications Standards Ins

  9. Extended eTVRA vs. Security Checklist: Experiences in a Value-Web

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Houmb, S.H.; Sallhammar, Karin; Etalle, Sandro

    2008-01-01

    Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a Common Criteria evaluation. To support security evaluation, the European Telecommunications Standards

  10. Extended eTVRA vs. Security Checklist: Experiences in a Value-Web

    NARCIS (Netherlands)

    Morali, A.; Zambon, Emmanuele; Houmb, S.H.; Sallhammar, Karin; Etalle, Sandro

    2009-01-01

    Security evaluation according to ISO 15408 (common criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a common criteria evaluation. To support security evaluation, the European Telecommunications Standards

  11. Job guarantee as model for diminishing social security costs

    NARCIS (Netherlands)

    Dr. Louis Polstra; Kees Mosselman

    2016-01-01

    After the second world war the western European states have built up a socalled welfare state with decent and civilized social security arrangements never shown in history. Since the eighties and especially since the worldwide financial crisis these welfare states are struggling with unexpected high

  12. The Intimate Relationship Between Security, Effectiveness and Legitimacy

    DEFF Research Database (Denmark)

    Pedersen, Morten Jarlbæk

    2015-01-01

    The so-called Schengen compensatory measures such as the Schengen Information System (SIS) or the European Dactylographic System (Eurodac) have been the centre of much attention. However, the research on these security measures has focused almost solely on their effect on liberty, human rights, a...

  13. Job guarantee as model for diminishing social security costs

    NARCIS (Netherlands)

    Mosselman, Kees; Polstra, Louis

    2016-01-01

    After the second world war the western European states have built up a socalled welfare state with decent and civilized social security arrangements never shown in history. Since the eighties and especially since the worldwide financial crisis these welfare states are struggling with unexpected high

  14. Modeling Homeland Security: A Value Focused Thinking Approach

    Science.gov (United States)

    2013-02-21

    BIB -1 viii List of Figures Page Figure 2-1: Organization of the Department of Homeland Security...richard.deckro@afit.edu. BIB -1 Bibliography 1. Advisory Panel to Assess Domestic Response Capabilities For Terrorism Involving Weapons of...House, 2002. BIB -2 13. CERN: European Organization for Nuclear Resources. “Affinity Diagram.” Technical Support Division. November 2002

  15. Human Security Agendas

    Institute of Scientific and Technical Information of China (English)

    Alan Hunter

    2012-01-01

    Ⅰ.IntroductionThe need for governments and international organisations to gain a better understanding of "security" is ever more urgent.For example in the conflict in Libya in early 2011,many security dilemmas were visible:the protection of Libyan civilians,the security of the regime,whether and how the UN or NATO should intervene,whether Europe would be threatened with a massive refugee flow,how to protect or evacuate foreign citizens (including Chinese),how to secure food and medical supplies in the midst of armed conflict.Such events may be termed "complex emergencies" which often raise legal, military and humanitarian issues simultaneously.International law and practice do not provide clear guidelines on such situations,and responses can be random,contingent on a variety of factors.Traditional concepts of security,for example protection of national borders,are certainly still relevant and legally enforceable,but more sophisticated concepts are needed to respond to security dilemmas in today's globalised world.Human security as a concept was first developed within the UN system in the 1990s,and set out,for example,in Human Security Now [1] The first section of this paper tracks the development of Human Security discourse,and also examines the broadening of the "security"concept in recent years.The second section reports on institutions with a specific interest in Human Security,for example within the UN system and in universities.The third section acknowledges some critiques of the Human Security paradigm.The last section reports on new directions that may enrich the Human Security agenda.

  16. European Molecular Biology Laboratory

    CERN Multimedia

    1973-01-01

    On 10 May an Agreement was signed at CERN setting up a new European Laboratory. It will be concerned with research in molecularbiology and will be located at Heidelberg in the Federal Republic of Germany.

  17. Causality in Europeanization Research

    DEFF Research Database (Denmark)

    Lynggaard, Kennet

    2012-01-01

    Discourse analysis as a methodology is perhaps not readily associated with substantive causality claims. At the same time the study of discourses is very much the study of conceptions of causal relations among a set, or sets, of agents. Within Europeanization research we have seen endeavours...... to develop discursive institutional analytical frameworks and something that comes close to the formulation of hypothesis on the effects of European Union (EU) policies and institutions on domestic change. Even if these efforts so far do not necessarily amount to substantive theories or claims of causality......, it suggests that discourse analysis and the study of causality are by no means opposites. The study of Europeanization discourses may even be seen as an essential step in the move towards claims of causality in Europeanization research. This chapter deals with the question of how we may move from the study...

  18. CERN welcomes European science

    CERN Multimedia

    2002-01-01

    On 3 and 4 October CERN will host a special workshop for Marie Curie fellows. This programme is a key plank in the EU's strategy for creating a European research area.     With thousands of scientists from all over the continent working together, CERN is already an exemplary European science showcase. On 3 and 4 October, the Laboratory will contribute further to unifying all European science by hosting a special workshop for EU-funded Marie Curie fellows. This scheme gives young researchers from around the continent the mobility to go to wherever Europe's best facilities in their chosen field happen to be. The event that will take place at CERN, entitled 'Special workshop of Marie Curie Fellows on research and training in physics and technology', organised together with the European Commission, is a continuation of a series of workshops with the aim, among others, of promoting young researchers, supporting their training and mobility, and facilitating the interdisciplinary dissemination of knowledge. Dur...

  19. European Southern Observatory

    CERN Multimedia

    1970-01-01

    Professor A. Blaauw, Director general of the European Southern Observatory, with George Hampton on his right, signs the Agreement covering collaboration with CERN in the construction of the large telescope to be installed at the ESO Observatory in Chile.

  20. MOOCs, the European way

    NARCIS (Netherlands)

    Sloep, Peter

    2014-01-01

    How the European approach to MOOCs is largely that of a pedagogical innovation whereas the initial US xMOOCs were largely seen as a vehicle to make education cheaper, to export American quality education to developing countries

  1. The European University Landscape

    DEFF Research Database (Denmark)

    Daraio, Cinzia; Bonaccorsi, Andrea; Geuna, Aldo

    2011-01-01

    This paper provides a new and systematic characterization of 488 universities, from 11 European countries: Finland, France, Germany, Hungary, Italy, Netherlands, Norway, Portugal, Spain, Switzerland and UK. Using micro indicators built on the integrated Aquameth database, we characterize...

  2. MOOCs, the European way

    NARCIS (Netherlands)

    Sloep, Peter

    2014-01-01

    How the European approach to MOOCs is largely that of a pedagogical innovation whereas the initial US xMOOCs were largely seen as a vehicle to make education cheaper, to export American quality education to developing countries

  3. Energy perspectives of the France by 2020-2050. European orientations; Perspectives energetiques de la France a l'horizon 2020-2050. Orientations europeennes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-09-15

    The authors recall the absence in 2007 of a real european energy policy and present the new energy Plan of the european commission, fight against the climatic change, reinforce the security of the energy supply, maintain the competitiveness of the european economy. This plan is then discussed. (A.L.B.)

  4. European Agricultural Statistics

    OpenAIRE

    Smith, Timothy J.

    1997-01-01

    This bulletin is a supplement to the Europe Team's Situation and Outlook Series and expands upon material traditionally presented as an appendix in the annual Europe Report. This report presents an extensive statistical database on European agriculture. The geographic scope covers most of the countrias of Europe, including the 15 member states of the European Union (Austria. Belgium. Denmark, Finland, France, Germany, Greece, Ireland, Italy. Luxembourg, Netherlands, Portugal, Spain, Sweden, a...

  5. European Robotics Challenges

    OpenAIRE

    Halt, Lorenz; Bubeck, Alexander

    2014-01-01

    The European Robotics Challenges (EuRoC) aims at strengthening collaboration and cross-fertilization between the industrial and the research community by launching three industrially-relevant challenges in European robotics with applicability to the factory of the future. To qualify for admission, potential challengers are asked to solve a simulated task. The aim of this talk is to describe the development of a simulated human-robot collaboration task using ROS/gazebo. Furthermore several bac...

  6. European Physical Society awards

    CERN Multimedia

    2004-01-01

    The winners of the 2004 Accelerator Prizes, awarded by the European Physical Society's Interdivisional Group on Accelerators (EPS-IGA), have been announced. Vladmir Shiltsev (Fermilab) and Igor Meshkov (JINR, Joint Institute of Nuclear Research, Dubna) will be presented with their awards during the 9th European Particle Accelerator Conference, EPAC'04, on 8 July 2004 in Lucerne. Both physicists will also give a talk about their work. More details on: http://epac.web.cern.ch/

  7. Anti-Terrorism Resolutions: The Security Council’s Threat to the UN System

    OpenAIRE

    Fraser Galloway

    2011-01-01

    The United Nations Security Council’s anti-terrorism regime constitutes a serious threat to the legitimacy and unity of the United Nations system as a whole. Recent European Court of Justice jurisprudence emphasises that Security Council resolutions which breach human rights norms will not be enforced by member states. The Security Council has insufficient internal checks to ensure that it passes resolutions which sufficiently respect human rights norms. Judicial review is therefore required ...

  8. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  9. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  10. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... of security experiences in design. The methods: Mobile probing, Prompted exploration workshops, and Acting out security involve potential future users in the process of designing IT security sensitive IT artifacts. Mobile probing collects narratives of user encounters with IT security. Prompted exploration...... of a research through design process. An everyday mobile digital signature solution has been designed, and the design problem, the design process, and the design results are presented in this dissertation. Several of my empirical findings show that the way users experience security does matter. Users...

  11. Securing Wireless Sensor Networks: Security Architectures

    Directory of Open Access Journals (Sweden)

    David Boyle

    2008-01-01

    Full Text Available Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established.

  12. European energy law. Basic texts. 3. ed.; Basistexte zum Europaeischen Energierecht

    Energy Technology Data Exchange (ETDEWEB)

    Baur, Juergen F.; Bremme, Christopher; Heitling, Tim (eds.)

    2011-07-01

    The third, revised edition retains the well-established text structure. It contains excerpts from the EU treaties, i.e. the Treaty on the European Union and the Treaty on the Functioning of the European Union. It also presents the fundamentals of the Council Regulation for the Management of the Internal Market, the electricity and gas regulations, the regulation on cross-border exchanges of electricity and access to gas transmission networks, and the regulation establishing the ACER agency, the key element of European energy regulation. Further, there are the European regulations on security of electricity and gas supply and on energy efficiency. Important interpretative notes by the European Commission are contained in the book as well; they are presented here only in English as in the original. Finally, the book contains the legislation on European cartel law and European public procurement law. (orig./RHM)

  13. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  14. Information security culture.

    OpenAIRE

    2008-01-01

    The current study originated from the realisation that information security is no longer solely dependent on technology. Information security breaches are often caused by users, most of the time internal to the organisation, who compromise the technology-driven solutions. This interaction between people and the information systems is seemingly the weakest link in information security. A people-oriented approach is needed to address this problem. Incorporating the human element into informatio...

  15. Information security factors systematization

    OpenAIRE

    Янченко, Вадим Николавевич; Ивченко, Александр Владимирович; Залога, Вильям Александрович; Дынник, Оксана Дмитриевна

    2015-01-01

    In this article the necessity of solving the theoretical and practical task, aimed on development the methodological basis for elaboration and implementation of information security management system, has been considered. Based on research results of scientific works and the requirements in the field of information security management the universal multilevel system of information security factors of organizations (enterprises) in the wood properties form was offered by using quality control ...

  16. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  17. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  18. Vehicle Tracking and Security

    Science.gov (United States)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  19. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  20. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  1. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  2. Laser security systems

    Science.gov (United States)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  3. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  4. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  5. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  6. Nanotechnology and Global Security

    National Research Council Canada - National Science Library

    Adrian M Ionescu

    2016-01-01

    .... This paper provides an introduction to nanotechnology as a strategic research and industry field, presents trends with key potential impact and examines related policy and security implications...

  7. Lecture 1: General Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  8. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  9. Software Security Requirements Gathering Instrument

    OpenAIRE

    2011-01-01

    Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured software is through gathering security requirements. This paper describes Software Security Requirements Gathering Instrument (SSRGI) that helps gather security requirements from the various stakeholders. This will guide the developers to gather security requirements along with th...

  10. Cyberspace security: How to develop a security strategy

    CERN Document Server

    Raggad, Bel G

    2007-01-01

    Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

  11. Speaker's presentations. Energy supply security; Recueil des interventions. Securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    Pierret, Ch

    2000-07-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  12. Habermas on European Constitution and European Identity

    Directory of Open Access Journals (Sweden)

    Éva Biró-Kaszás

    2010-12-01

    Full Text Available For the last two decades or so philosophers have been reflecting on a set of practical and political concerns in connection with the new political structural arrangements beyond the nation-state. In this article two essays by Jürgen Habermas shall be examined. An attempt shall be made to tackle Habermas’ philosophical concepts of personal and collective identity as well as the role that a constitution may play in building the post-national constellation. It has been shown that Habermas has normative answers. Firstly, according to him, the fragile balance between the legal order and the particular cultures and traditions of a community has to be protected by the constitutional state. For that reason the political culture has to be “decoupled” from the majority culture. Secondly, the democratically structured attempt to achieve shared meaning has to find the delicate balance between the context-transcending universal normative claims and the claims of particular individual and collective life. Thirdly, it is possible to expand legally mediated civil solidarity trans-nationally, across Europe – we may recognize this development as the emergence of European identity –, since the process of democratic will-formation of citizens may get loose from the structures provided by the state if both shared democratic political cultures as well as a European-wide public sphere exist. The European Constitution may have a catalytic function in materialization of these conditions. It has been shown that in his deliberations Habermas tried to find a reflective equilibrium between the normative and the empirical.

  13. CERN's future secured

    CERN Multimedia

    2003-01-01

    The CERN Council held its 123rd session on 13 December under the chairmanship of Professor Maurice Bourquin. The election of the next Director General, the Baseline Plan for 2003-2010 and a new status for non-European states were among the items agreed. In addition, the European Investment Bank has agreed a loan of 300 million EUR to complete the LHC.

  14. LABOUR TAXATION IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Sabau-Popa Liviu Mihai

    2011-07-01

    Full Text Available This article proposes an analysis, which we consider extremely useful in the current economic context, of the evolution of labour income fiscality, more precisely, the effect of the public debt growth on the tax wedge for the labour income. The share of fiscal revenues from direct taxes, indirect taxes and social contributions is relatively close in the old member states of the European Union in comparison with the new member states, which register a lower level of income from direct taxes. The low level of income from direct taxes is compensated by more significant shares of the social contributions or indirect taxes. The main motivations of cross-border migration are: a successful career in a multinational corporation, high variations of the tax rate, of the salary income between states and, last but not least, the level of the net salary. To this day, there are no plans to harmonize across the European Union the legislation regarding the taxes wages and the social security contributions. Still, the European Union had in view the coordination of the national tax systems to make sure that the employees and the employers do not pay several times the social contributions in their movement across the community space. Despite the fact that some states tax the labour income at a low level, the labour fiscality remains high in the European Union in comparison with other industrialized economies, probably also due to the fact that the majority of the member states have social market economies. The increase of the fiscality level for the labour income determines the decrease of the employment rate and the raise of the unemployement rate. The solution to guarantee a higher employment rate, which is a target of the European Union Strategy Europe 2020 could be the relaxation of the labour income fiscality by transferring the tax wedge on the labour income towards property or energy taxation.

  15. Scenario analysis of gas crisis using the European Gas Assessment Model (EUGas)

    OpenAIRE

    RODRIGUEZ GOMEZ NURIA; ZACCARELLI NICOLA; PAMBOUR KWABENA; BOLADO LAVIN Ricardo

    2014-01-01

    The European Gas Assessment model (EUGas) is a country level model of the European gas transmission pipeline network which is being developed by JRC-IET (Joint Research Centre – Institute for Energy and Transport). The model aims at supporting Directive 2008/114/EC on “the identification and designation of European Critical Infrastructure (ECI)” and Regulation 994/2010 on “measures to safeguard security of gas supply”. The hydraulic model of the European gas network is developed using a combi...

  16. Sharing Information: Report on the LIBER Library Security Network (LSN Since 2002

    Directory of Open Access Journals (Sweden)

    Erland Kolding Nielsen

    2008-09-01

    Full Text Available On 2 July 2002, the Executive Board of LIBER, in line with the Copenhagen Principles of 14 May 2002, endorsed the establishment of a Library Security Network to facilitate the exchange of confidential security information among European national, university and other important research libraries with valuable collections. The Network came into being at the end of 2002. It has now been running for more than five years. The objective was, and is, to create a safe information and communication network, based on e-mail, for European library directors and security managers. This paper aims to review the experience: Has the system worked? Has it helped in terms of preventing crime, in solving crimes, in raising security awareness among the member institutions? Furthermore, the aim is to contribute to a revision in the broader perspective of a European context: Is it enough? Should it work otherwise? Are there other channels of information? Should the Network be expanded?

  17. The European arrest warrant

    Directory of Open Access Journals (Sweden)

    Đurđić Vojislav

    2012-01-01

    Full Text Available The paper portrays the new European Union extradition system, established by the Framework Decision on the European arrest warrant and the surrender procedures between Member States of 2002. In the introductory remarks, the author explains the formation and development of the traditional extradition procedure, depicts relevant legal sources, and points to its flaws, which boil down to tardiness and inefficiency. The main author's standpoint is that the European arrest warrant is based on mutual trust in the member-states' legal systems, and that it depoliticizes the extradition procedure by transforming interstate cooperation into cooperation between member - states' law enforcement authorities. On these grounds, the author determines the nature of this new legal institute, that introduces radical changes into the paradigm of the classical extradition, and explains its main features as well as the scope of application. Further on, the paper explores the conditions for issuance of the European arrest warrant, which are proscribed by negative formulations - as absolute and relative obstacles for extradition. Finally, the author explains the standardized formal elements of the European arrest warrant content, which should make its application easier and more expeditious.

  18. Towards a European Defense Identity Compatible with NATO

    Directory of Open Access Journals (Sweden)

    Rafael Estrella

    1997-12-01

    Full Text Available The European Security and Defense Identity (ESDI is a common but not defined goal, due to disagreements among Europeans on its political content. Reasons to explain this are related to the resistance to the idea of a European defense authority, fears of German hegemony, and the conviction that Europe is uncapable of defending herselfwithout the assistance of the United States. Estrella states that, with the end of the Cold War, some arguments opposing ESDI lost weight. However, the evolution and restructuring of NATO is not the product of European initiative, but rather an element of the U.S.strategy in Europe. Moreover, while the U.S. has a global strategy, Europe has not yet defined its security interests neither globally nor regionally. The author reviews the steps undertaken by NATO and the WEU towards further collaboration and the development of a European identity. He wonders whether there is enough political will either in Europe or the U.S. to overcome archaic views on trans-atlantic relations and narrow concepts about the future of Europe.

  19. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  20. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  1. Hydrological extremes and security

    Science.gov (United States)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  2. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  3. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  4. Securing personal network clusters

    NARCIS (Netherlands)

    Jehangir, Assed; Heemstra de Groot, Sonia M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  5. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  6. Google - Security Testing Tool

    OpenAIRE

    Staykov, Georgi

    2007-01-01

    Using Google as a security testing tool, basic and advanced search techniques using advanced google search operators. Examples of obtaining control over security cameras, VoIP systems, web servers and collecting valuable information as: Credit card details, cvv codes – only using Google.

  7. Generalized Software Security Framework

    Directory of Open Access Journals (Sweden)

    Smriti Jain

    2011-01-01

    Full Text Available Security of information has become a major concern in today's digitized world. As a result, effective techniques to secure information are required. The most effective way is to incorporate security in the development process itself thereby resulting into secured product. In this paper, we propose a framework that enables security to be included in the software development process. The framework consists of three layers namely; control layer, aspect layer and development layer. The control layer illustrates the managerial control of the entire software development process with the help of governance whereas aspect layer recognizes the security mechanisms that can be incorporated during the software development to identify the various security features. The development layer helps to integrate the various security aspects as well as the controls identified in the above layers during the development process. The layers are further verified by a survey amongst the IT professionals. The professionals concluded that the developed framework is easy to use due to its layered architecture and, can be customized for various types of softwares.

  8. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  9. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  10. Secure Link Middleware

    Science.gov (United States)

    2008-08-01

    Secure Link middleware as specified by the circled ‘sld’, sld . Using a network traffic analyzer (e.g., tcpdump) at router bulldog and tiger, ARL...or nfs (remote accessing file systems) to be securely operated and used among networked computer systems without any bulldog (router3) bear (router2

  11. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  12. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  13. Security the human factor

    CERN Document Server

    Kearney, Paul

    2010-01-01

    This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

  14. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  15. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  16. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  17. European Analytical Column

    DEFF Research Database (Denmark)

    Karlberg, B.; Grasserbauer, M.; Andersen, Jens Enevold Thaulov

    2009-01-01

    The European Analytical Column has once more invited a guest columnist to give his views on various matters related to analytical chemistry in Europe. This year, we have invited Professor Manfred Grasserbauer of the Vienna University of Technology to present some of the current challenges...... for European analytical chemistry. During the period 2002–07, Professor Grasserbauer was Director of the Institute for Environment and Sustainability, Joint Research Centre of the European Commission (EC), Ispra, Italy. There is no doubt that many challenges exist at the present time for all of us representing...... a major branch of chemistry, namely analytical chemistry. The global financial crisis is affecting all branches of chemistry, but analytical chemistry, in particular, since our discipline by tradition has many close links to industry. We have already noticed decreased industrial commitment with respect...

  18. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  19. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  20. Energy security in Yemen

    Energy Technology Data Exchange (ETDEWEB)

    Torosyan, Emil

    2009-09-15

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  1. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  3. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  4. Nuclear power. A key contributor to a decarbonised European Union

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-12-15

    The European energy sector is currently facing a new set of challenges in the light of the COP21 Paris agreement, the Energy Union initiative and new market design projections. Nuclear energy sector understands the post COP21 constellation as a unique opportunity for all low carbon technologies which will be basic for transition towards COP21 commitments. A new policy outlook for Europe is needed in order to provide low carbon capacity, lead to the modernisation of technical processes and contribute to the prosperity of Europeans. The benefits of nuclear are highlighted for a low carbon future and for the security of supply and recommend actions for supporting new investments.

  5. Bring European finance ministries kicking and screaming into geopolitics

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2017-01-01

    The issue of burden-sharing will be a hot topic at the Munich Security Conference, a major annual event that kicks off this week. In Europe the political mechanics of defense budget hikes work differently than in the United States, where it is Congress that holds the purse strings. Across...... the Atlantic, it is the ministries of finance that play the central role in controlling budgets — defense and otherwise. This means that real progress on raising European defense spending will require convincing the finance ministers and their top civil servants of the new realities of European geopolitics...

  6. THE EUROPEAN UNION IS READJUSTING ITS CENTRAL ASIAN STRATEGY

    OpenAIRE

    Laumulin, Murat

    2011-01-01

    As soon as the Soviet Union fell apart, Central Asia, together with the rest of the post-Soviet expanse, became part of so-called political Europe, that is, it was drawn into the EU’s sphere of interests on the strength of the OSCE membership of all the post-Soviet states. The European Union’s strategy and policy in Central Asia are not directly related to the region’s military-strategic security, although they can indirectly affect it through (1) European institutions such as the OSCE, the E...

  7. Making European Muslims

    DEFF Research Database (Denmark)

    education, and government policy intersect in the lives of young Muslims and inform their developing religious beliefs and practices. Mark Sedgwick’s introduction provides a framework for theorizing Muslimness in the European context, arguing that Muslim children must navigate different and sometimes......Making European Muslims provides an in-depth examination of what it means to be a young Muslim in Europe today, where the assumptions, values and behavior of the family and those of the majority society do not always coincide. Focusing on the religious socialization of Muslim children at home...

  8. European Values and Globalization

    Directory of Open Access Journals (Sweden)

    Heinz Theisen

    2011-03-01

    Full Text Available Good Governance, Social Market Economy, Culture and Education are the decisive elements for Human Development. We need a third way between the extremes of the Utopian Global Free Market and a new nationalism. A Social Market Economy and the European Model of a Union could be such third way. For a new Social Market Economy we need a renaissance of the European dialectics between culture and society, idealism and materialism, religion and enlightenment, solidarity and profitability. The balancing of those poles is deeply rooted in our best traditions. 

  9. European mobility cultures

    DEFF Research Database (Denmark)

    Haustein, Sonja; Nielsen, Thomas A. Sick

    2016-01-01

    More targeted European policies promoting green travel patterns require better knowledge on differing mobility cultures across European regions. As a basis for this, we clustered the EU population into eight mobility styles based on Eurobarometer data. The mobility styles - including, for example......-economic resources. In a second step, the 28 EU member countries were clustered into six country clusters based on their representation of mobility styles. The country clusters indicate the existence of considerably different mobility cultures across the EU. Sub-regions can be identified that have highly different...

  10. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  11. Security Dialogues: Building Better Relationships between Security and Business

    OpenAIRE

    Ashenden, D.; Lawrence, D.

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff. Published in IEEE Security and Privacy (2016) vol 14/3 pp 82-87 (http://doi.ieeecomputers...

  12. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  13. Russia and the European Union: Wasteful Competition

    Directory of Open Access Journals (Sweden)

    Timofei Bordachev

    2014-05-01

    Full Text Available ince the collapse of the Soviet Union, Russia’s potential to contribute politically and economically to the stability of the Russia–European Union Shared Neighbourhood has been systematically undervalued. The regional integration initiated by the governments of Belarus, Kazakhstan and Russia has created a new institutional and ideological reality. However, the increased risk of political and economic competition with the European Union threatens to split the region into separate competing blocs, potentially limiting further regional development. One of the negative factors is the long-term decline of the institutional tools that the EU can apply to sustain its presence in the region. As a consequence of previously used unilateral mechanisms, current European regional policy is ineffective. Because no prospects of membership can be offered to the countries in the Shared Neighbourhood, regulatory convergence with the EU depends increasingly on individual political regimes. This principle prevents a multilateral regional framework from emerging. The process is aggravated further by the increased role of irrational factors in EU regional policy, as opposed to security interests, since the mid 2000s. However, since the beginning of Eurasian integration, the Shared Neighbourhood has entered a new phase of political and economic development, where irrational competition can only jeopardize the strategic goals of Russia and the EU. In the long term, both actors are interested in creating a coherent regional subsystem, based on multilateral formats of regional cooperation.

  14. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism.

    Science.gov (United States)

    Maltby, Tomas

    2013-04-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution's pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy.

  15. DEMOGRAPHIC SECURITY: THEORY, METHODOLOGY, EVALUATION

    Directory of Open Access Journals (Sweden)

    Mikhail V. Karmanov

    2015-01-01

    Full Text Available The paper analyzes the theoretical aspects of demographic security. Reviewed and analyzed the point of view of various scholars to the definition of demographic security. The main directions of statistical analysis of demographic security.

  16. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  17. Secure Cloud Architecture

    Directory of Open Access Journals (Sweden)

    Kashif Munir

    2013-02-01

    Full Text Available Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activitiesfrom illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.

  18. Applying the Legal Security Principle in Administrative Law

    Directory of Open Access Journals (Sweden)

    Vasilica NEGRUŢ

    2015-08-01

    Full Text Available The objective of the paper is founded on a very current topic and of real interest. Using content analysis, through a descriptive study research, this study aims at identifying the content of the legal security principle and the way in which the courts in Romania, the public authorities achieve a proper application of this European principle. For this purpose, it was achieved an analysis of specific objectives aiming at, in particular, the requirements of legal security principle and the way in which they manifest in the national law. We appreciate that, although it does not beneficiate of an express assignment in the Romanian legislation, being a creation of jurisprudence, the legal security principle is in the current context, a fundamental principle of state law, which should give every citizen the opportunity to evolve into a secured, predictable legal environment.

  19. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  20. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep