WorldWideScience

Sample records for policy frames security

  1. The securitisation of pandemic influenza: framing, security and public policy.

    Science.gov (United States)

    Kamradt-Scott, Adam; McInnes, Colin

    2012-01-01

    This article examines how pandemic influenza has been framed as a security issue, threatening the functioning of both state and society, and the policy responses to this framing. Pandemic influenza has long been recognised as a threat to human health. Despite this, for much of the twentieth century it was not recognised as a security threat. In the decade surrounding the new millennium, however, the disease was successfully securitised with profound implications for public policy. This article addresses the construction of pandemic influenza as a threat. Drawing on the work of the Copenhagen School, it examines how it was successfully securitised at the turn of the millennium and with what consequences for public policy.

  2. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  3. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  4. Framing health and foreign policy: lessons for global health diplomacy

    Directory of Open Access Journals (Sweden)

    Labonté Ronald

    2010-08-01

    Full Text Available Abstract Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are

  5. Framing health and foreign policy: lessons for global health diplomacy.

    Science.gov (United States)

    Labonté, Ronald; Gagnon, Michelle L

    2010-08-22

    Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are present in discourse but do

  6. District Leaders' Framing of Educator Evaluation Policy

    Science.gov (United States)

    Woulfin, Sarah L.; Donaldson, Morgaen L.; Gonzales, Richard

    2016-01-01

    Purpose: Educator evaluation systems have recently undergone scrutiny and reform, and district and school leaders play a key role in interpreting and enacting these systems. This article uses framing theory to understand district leaders' interpretation and advancement of a state's new educator evaluation policy. Research Methods: The article…

  7. "Choice Set" for health behavior in choice-constrained settings to frame research and inform policy: examples of food consumption, obesity and food security.

    Science.gov (United States)

    Dover, Robert V H; Lambert, Estelle V

    2016-03-16

    Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. We suggest that health choice, such as food consumption, is based on more than the capacity and volition of individuals to make "healthy" choices, but is dialogic and adaptive. In terms of food consumption, there will always be choice-constrained conditions, along a continuum representing factors over which the individual has little or no control, to those for which they have greater agency. These range from food store geographies and inventories and food availability, logistical considerations such as transportation, food distribution, the structure of equity in food systems, state and non-government food and nutrition programs, to factors where the individual exercises a greater degree of autonomy, such as sociocultural foodways, family and neighborhood shopping strategies, and personal and family food preferences. At any given food decision-making moment, many factors of the continuum are present consciously or unconsciously when the individual makes a decision. These health behavior decision-making moments are mutable, whether from an individual perspective, or within a broader social or policy context. We review the construct of "choice set", the confluence of factors that are temporally weighted by the differentiated and relationally-contextualized importance of certain factors over others in that moment. The choice transition represents an essential shift of the choice set based on the conscious and unconscious weighting of accumulated evidence, such that people can project certain outcomes. Policies and interventions should avoid

  8. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  9. Framing and the health policy process: a scoping review.

    Science.gov (United States)

    Koon, Adam D; Hawkins, Benjamin; Mayhew, Susannah H

    2016-07-01

    Framing research seeks to understand the forces that shape human behaviour in the policy process. It assumes that policy is a social construct and can be cast in a variety of ways to imply multiple legitimate value considerations. Frames provide the cognitive means of making sense of the social world, but discordance among them forms the basis of policy contestation. Framing, as both theory and method, has proven to generate considerable insight into the nature of policy debates in a variety of disciplines. Despite its salience for understanding health policy debates; however, little is known about the ways frames influence the health policy process. A scoping review using the Arksey and O'Malley framework was conducted. The literature on framing in the health sector was reviewed using nine health and social science databases. Articles were included that explicitly reported theory and methods used, data source(s), at least one frame, frame sponsor and evidence of a given frame's effect on the health policy process. A total of 52 articles, from 1996 to 2014, and representing 12 countries, were identified. Much of the research came from the policy studies/political science literature (n = 17) and used a constructivist epistemology. The term 'frame' was used as a label to describe a variety of ideas, packaged as values, social problems, metaphors or arguments. Frames were characterized at various levels of abstraction ranging from general ideological orientations to specific policy positions. Most articles presented multiple frames and showed how actors advocated for them in a highly contested political process. Framing is increasingly an important, yet overlooked aspect of the policy process. Further analysis on frames, framing processes and frame conflict can help researchers and policymakers to understand opaque and highly charged policy issues, which may facilitate the resolution of protracted policy controversies. © The Author 2016. Published by Oxford

  10. Cyber security policy guidebook

    CERN Document Server

    Bayuk, nifer L; Rohmeyer, l; Sachs, cus; Schmidt, frey; Weiss, eph

    2012-01-01

    This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue. It documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. Without using technical jargon, the book emphasizes the importance of critical and analytical thinking when making policy decisions.  It also equips the reader with descriptions of the impact of specific policy ch

  11. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...

  12. Russian National Security Policy: Perceptions, Policies, and Prospects

    National Research Council Canada - National Science Library

    Crutcher, Michael

    2001-01-01

    .... The workshop examined that policy in terms of factors influencing Russian national security policy formulation, Russia's perceptions of the world and itself, current Russian security and foreign...

  13. Developments in Icelandic Security Policy

    Directory of Open Access Journals (Sweden)

    Alyson J.K. Bailes

    2014-12-01

    Full Text Available Iceland has been slow in developing a national security concept, for reasons that include a long period of reliance on US protection post-World War Two, and divided internal views over this defence solution. Since the withdrawal of all US stationed forces in 2006, Iceland’s security partnerships have diversified and attempts have been made to frame security in more multi-functional terms. The Risk Assessment Report of 2009 made important progress in itemizing non-military threats and risks. On this basis, a cross-party parliamentary committee was invited to start work in 2012 on guidelines for a security strategy. Its report, published in March 2014, establishes a large area of consensus on ‘softer’ security issues and on remaining in NATO, with a few dissenting voices on the latter. Its main omission is a proper treatment of economic and financial security, still tied to the divisive issue of EU membership. Meanwhile, Iceland’s recent security experience in 2014 has helped to highlight the reality of both harder and softer security challenges. The government can now proceed to draft a full official security strategy, to be laid before parliament possibly in 2015.

  14. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  15. Framing and Claiming: How Information-Framing Affects Expected Social Security Claiming Behavior

    Science.gov (United States)

    Brown, Jeffrey R.; Kapteyn, Arie; Mitchell, Olivia S.

    2017-01-01

    This paper provides evidence that Social Security benefit claiming decisions are strongly affected by framing and are thus inconsistent with expected utility theory. Using a randomized experiment that controls for both observable and unobservable differences across individuals, we find that the use of a “breakeven analysis” encourages early claiming. Respondents are more likely to delay when later claiming is framed as a gain, and the claiming age is anchored at older ages. Additionally, the financially less literate, individuals with credit card debt, and those with lower earnings are more influenced by framing than others. PMID:28579641

  16. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...

  17. Contrasting frames in policy debates on climate change adaptation

    NARCIS (Netherlands)

    Dewulf, A.

    2013-01-01

    The process by which issues, decisions, or events acquire different meanings from different perspectives has been studied as framing. In policy debates about climate change adaptation, framing the adaptation issue is a challenge with potentially farreaching implications for the shape and success of

  18. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  19. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  20. Security Policy Alignment: A Formal Approach

    NARCIS (Netherlands)

    Pieters, Wolter; Dimkov, T.; Pavlovic, Dusko

    2013-01-01

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks,

  1. Food Security Framings within the UK and the Integration of Local Food Systems

    Science.gov (United States)

    Kirwan, James; Maye, Damian

    2013-01-01

    This paper provides a critical interpretation of food security politics in the UK. It applies the notion of food security collective action frames to assess how specific action frames are maintained and contested. The interdependency between scale and framing in food security discourse is also scrutinised. It does this through an examination of…

  2. PESANTREN ON THE FRAME OF GOVERNMENT POLICIES

    Directory of Open Access Journals (Sweden)

    Moh Kosim

    2016-02-01

    Full Text Available This article tries to describe government policies toward pesantren, as the Islamic intistitution, which has been existing from the early  Independence of Indonesia period to present times, and its implications on the progresses of pesantren. This study uses library research on related documents of government policies and the result shows that the government policies tend to indicate to be a positive development. In the beginning of old and new orders, government policies were simply in form of unofficial claim above the role of pesantren in accelerating the nation intelligence. Since the release of decree of UU No. 2/1989 pesantren has been approved and legitimated as the subsystem of national education, though, pesantren keeps and maintains its characterisitc. As UU  No. 20/2003 legitimated and followed by relating policies –especilally PP No. 55/1997, PMA No. 13/2014, and PMA No. 18/2014 – pesantren has been totally awarded as part of national educational system, in turn, such of the institution has more freedom in portraying Islamic values by enhancing its characteristic as the institution focusing on tafaqquh fî al-dîn (an attempt to a totally Islamic understandings and developing the other competences based on the characteristic of each pesantren.Copyright (c 2016 by KARSA. All right reservedDOI: 10.19105/karsa.v23i2.724 

  3. Staffing Policy for Solving the Information Security

    Directory of Open Access Journals (Sweden)

    A. I. Tolstoy

    2012-06-01

    Full Text Available Determining staffing policy implementation of information security tasks is given. The basic requirements that must be taken into account when developing policies are defined. The policy framework is determined and recommendations for the design of such policies are formulated. Requirements for the implementation of the policy are defined.

  4. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  5. A frame-critical policy analysis of Canada's response to the World Food Summit 1998-2008.

    Science.gov (United States)

    Mah, Catherine L; Hamill, Catherine; Rondeau, Krista; McIntyre, Lynn

    2014-01-01

    The 2012 visit to Canada of Olivier De Schutter, the United Nations Special Rapporteur on the Right to Food, led to a public rebuff by Canadian governmental officials. This paper adapts the frame-critical policy analysis of Schön and Rein (1994), to explore the rhetorical basis for this conflict. This examination is offered as an illustrative example of how food insecurity is framed as a public policy problem in a high-income nation and how this framing has changed over time. We analyze Canada's decade of sequential responses to the 1996 World Food Summit, spanning 1998-2008, in the form of Canada's Action Plan on Food Security, and its subsequent Progress Reports. We conducted a qualitative policy analysis, adapting the frame-critical approach first delineated by Schön and Rein (1994). This analysis uses a social constructionist approach to map out the relationships between tacit understanding of policy by particular actors, explicit rhetoric in the public domain, and action in this policy area over time. We identify three key ways in which competing rhetorical frames arise over time: frame shifts (e.g., a shift away from language highlighting the right to food and health); frame blending (e.g., discussion about poverty becomes obscured by complexity discourse); and within-frame incongruence (e.g., monitoring for health indicators that are unrelated to policy solutions). Together, these frames illustrate how the conflict embodied in the UN Special Rapporteur's visit has been deeply woven into the policy discourse on food insecurity in Canada over time. Frame-critical analysis is instructive for exposing and also predicting tensions that impede forward progress on difficult policy issues. Accordingly, such analyses may be helpful in not only dissecting how policy can become 'stuck' in the process of change but in active reframing towards new policy solutions.

  6. Framing the policy debate over spirits excise tax in Poland.

    Science.gov (United States)

    Zatoński, Mateusz; Hawkins, Benjamin; McKee, Martin

    2016-12-23

    Industry lobbying remains an obstacle to effective health-oriented alcohol policy. In 2013, an increase in excise tax on spirits was announced by the Polish government. This article presents a qualitative analysis of the public debate that ensued on the potential economic, health and social effects of the policy. It focuses on how competing groups, including industry actors, framed their position and sought to dominate the debate. Online archives of five Polish national newspapers, two spirits trade associations, and parliamentary and ministerial archives were searched. A thematic content analysis of the identified sources was conducted. The overall findings were compared with existing research on the framing of the Minimum Unit Pricing (MUP) debate in the UK. A total of 155 sources were analysed. Two main frames were identified: health, and economic The spirits industry successfully promoted the economic frame in their own publications and in the media. The debate was dominated by arguments about potential growth of the grey market and losses in tax revenue that might result from the excise tax increase. The framing of the debate in Poland differed from the framing of the MUP debate in the United Kingdom. The Polish public health community was unsuccessful in making health considerations a significant element of the alcohol policy debate. The strategies pursued by UK health advocates offer lessons for how to make a more substantial impact on media coverage and promote health-oriented legislation. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. How issue frames shape beliefs about the importance of climate change policy across ideological and partisan groups.

    Science.gov (United States)

    Singh, Shane P; Swanson, Meili

    2017-01-01

    We use an experiment to examine whether the way in which climate change is framed affects individuals' beliefs about its importance as a policy issue. We employ frames that emphasize national security, human rights, and environmental importance about the consequences of climate change. We find no evidence that issue frames have an overall effect on opinions about the importance of climate change policy. We do find some evidence that the effect of issue frames varies across ideological and partisan groups. Most notably, issue frames can lead Republicans and those on the political right to view climate change policy as less important. We conclude by discussing our findings relative to extant literature and considering the implications of our findings for those who seek to address the issue of climate change.

  8. How issue frames shape beliefs about the importance of climate change policy across ideological and partisan groups

    Science.gov (United States)

    2017-01-01

    We use an experiment to examine whether the way in which climate change is framed affects individuals’ beliefs about its importance as a policy issue. We employ frames that emphasize national security, human rights, and environmental importance about the consequences of climate change. We find no evidence that issue frames have an overall effect on opinions about the importance of climate change policy. We do find some evidence that the effect of issue frames varies across ideological and partisan groups. Most notably, issue frames can lead Republicans and those on the political right to view climate change policy as less important. We conclude by discussing our findings relative to extant literature and considering the implications of our findings for those who seek to address the issue of climate change. PMID:28727842

  9. European Security Organizations in the Post-Cold-War Security Environment. The New Frame of European Security

    National Research Council Canada - National Science Library

    Bugai, Veaceslav

    2006-01-01

    .... In particular, it gives an over view of the transformations that occurred within NATO and OSCE in the post-Cold War period, which have created and developed new security mechanisms and policies for dealing with crises...

  10. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    . This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques......Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way...

  11. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  12. Russia's energy policy: A framing comment

    Energy Technology Data Exchange (ETDEWEB)

    Aslund, A. [Institute for International Economics, Washington, DC (United States)

    2006-05-15

    A prominent specialist on the Russian economy provides a framing comment on two preceding papers entitled 'Russia's Energy Policy' (by Vladimir Milov, Leonard Coburn, and Igor Danchenko) and 'Russia's Energy Policy: A Divergent View' (by Matthew J. Sagers). The author argues that Russia's current energy policy should be viewed as an outcome of competition between three overlapping programs. In this context, he identifies three policy models - the old Soviet, the liberal or oligarchic, and the most recent state capitalist. The latter is currently supported by President Putin, who prioritizes diversification of the country's economy at the expense of diminished investments in the oil and gas sector.

  13. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  14. Japan's National Security: Structures, norms, and policies

    International Nuclear Information System (INIS)

    Katzenstein, P.J.; Okawara, N.

    1993-01-01

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s

  15. SECURITY POLICIES APPROACHED BY VALUE ANALYSIS CONCEPTS

    Directory of Open Access Journals (Sweden)

    Florina Oana Varlanuta

    2006-01-01

    Full Text Available This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy. In this context, the purpose is to introduce the use of end user (customer value concept in the process of Security policy framework design.

  16. Food Security Policy in a Stochastic World

    OpenAIRE

    Adelman, Irma; Berck, Peter

    1989-01-01

    Food security may be increased by variance-reducing strategies, by food aid, or by development strategies. This paper uses a Korea CGE model, subjected to random fluctuation in world-prices and domestic food productivity, to evaluate these policies. We find that poverty-reducing development strategies are the most effective food-security strategies.

  17. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  18. Public values for energy futures: Framing, indeterminacy and policy making

    International Nuclear Information System (INIS)

    Butler, C.; Demski, C.; Parkhill, K.; Pidgeon, N.; Spence, A.

    2015-01-01

    In the UK there are strong policy imperatives to transition toward low carbon energy systems but how and in what ways such transitional processes might be realised remains highly uncertain. One key area of uncertainty pertains to public attitudes and acceptability. Though there is wide-ranging research relevant to public acceptability, very little work has unpacked the multiple questions concerning how policy-makers can grapple with and mitigate related uncertainties in efforts to enact energy systems change. In this paper, public acceptability is identified as an indeterminate form of uncertainty that presents particular challenges for policy making. We build on our existing research into public values for energy system change to explore how the outcomes of the project can be applied in thinking through the uncertainties associated with public acceptability. Notably, we illustrate how the public values identified through our research bring into view alternative and quite different problem and solution framings to those currently evident within UK policy. We argue that engagement with a wide range of different framings can offer a basis for better understanding and anticipating public responses to energy system change, ultimately aiding in managing the complex set of uncertainties associated with public acceptability. - Highlights: • We argue that public acceptability represents an indeterminate form of uncertainty. • This means alternative approaches to decision-making are required. • We introduce a public value set for energy system change. • We use this as a basis for interrogating current UK policy approaches to transitions. • Incorporating public values in policy can help tackle uncertainty about acceptability.

  19. Policy Attribute Framing: A Comparison between Three Policy Instruments for Personal Emissions Reduction

    Science.gov (United States)

    Parag, Yael; Capstick, Stuart; Poortinga, Wouter

    2011-01-01

    A comparative experiment in the UK examined people's willingness to change energy consumption behavior under three different policy framings: energy tax, carbon tax, and personal carbon allowances (PCA). PCA is a downstream cap-and-trade policy proposed in the UK, in which emission rights are allocated to individuals. We hypothesized that due to…

  20. Framing, Engagement, and Policy Change: Lessons for the ACA.

    Science.gov (United States)

    Karch, Andrew; Rosenthal, Aaron

    2017-04-01

    Supporters of the Patient Protection and Affordable Care Act (ACA) sometimes speculate that public attitudes toward the law will shift if proponents succeed in focusing attention on its more popular components, but the scholarly literature on framing effects provides ample reason to question their assertion. This article contends that engagement, an alternative rhetorical strategy where advocates address the same policy dimensions as their opponents, is a more promising approach. Extending the engagement literature to the elite context in which most ACA-related decisions are made, it argues that elite-level engagement necessitates the additional task of linking policy change to opponents' broader philosophical and policy goals. Current debates surrounding the application of sales taxes to electronic commerce-a policy arena that seems far removed from health care policy but overlaps with the ACA in ways that make it an appropriate source of lesson drawing-illustrate the potential of an engagement strategy. Recently, many conservative lawmakers who previously opposed policy change have instead embraced online sales taxes as a mechanism for additional tax cuts. Analogous connections may facilitate the diffusion of ACA provisions that presently receive hostile receptions in Republican-leaning states. Copyright © 2017 by Duke University Press.

  1. Securities Market Journal: Editorial Policies

    African Journals Online (AJOL)

    The Securities Market Journal (SMJ) is one of the tools used by the Commission to enlighten and educate the public on transport issues in the capital market. It is also a reference material for students and researchers on the capital market issues as well as providing the general public with more broad based knowledge on ...

  2. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  3. European Energy Policy and Its Effects on Gas Security

    Science.gov (United States)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  4. The role of discourse and linguistic framing effects in sustaining high carbon energy policy-An accessible introduction

    International Nuclear Information System (INIS)

    Scrase, J. Ivan; Ockwell, David G.

    2010-01-01

    This paper seeks to provide an accessible introduction to the relevance to energy policy of a fundamental insight from the policy sciences. This concerns the role that the linguistic framing of policy problems and solutions can play in sustaining the dominance of existing policy positions. The paper introduces a discourse perspective to understanding the policy process and uses it to analyse four central goals pursued in energy policy: access, security, efficiency and environmental acceptability, drawing on examples from UK policy documents. It introduces readers to how, as well as requiring technical and economic solutions, a transition to a low carbon energy system will also require a 'reframing' of energy policy problems and solutions in a way that either connects with, or overrides the powerful discourses that shape energy policy today.

  5. Framing GM Crops as a Food Security Solution

    Science.gov (United States)

    Dibden, Jacqui; Gibbs, David; Cocklin, Chris

    2013-01-01

    The spectre of a food security crisis has raised important questions about future directions for agriculture and given fresh impetus to a long-standing debate about the potential contribution of agricultural biotechnology to food security. This paper considers the discursive foundations for promotion of agricultural biotechnology, arguing that…

  6. Formal policies for flexible EHR security.

    Science.gov (United States)

    Blobel, Bernd; Pharow, Peter

    2006-01-01

    State of the Art methodologies for establishing requirements and solutions to securing applications are based on narrative descriptions about the use of available system, sometimes also dedicated to system components. Even nowadays new developments to ruling application security services by the use of predicate logic suffer from being administered manually. Therefore, security and privacy requirements cannot be properly met resulting in restrictions and fears for allowing the use of sensitive data and functions. Because of the sensitivity of personal health information and especially of genetic data with its wider implications beyond the original subject of care, weaknesses in guaranteeing fine-grained security and privacy rules lead to less acceptance or even the avoidance of essential information transfer and use. To overcome the problem, security and privacy have to become properties of the architectural components of the respective health information system. Embedding security into the systems architecture allows for negotiating and enforcing any security and privacy services related to principals, their roles, their relationships, further contextual information as well as other regulations summarized in formally modeled policies. The paper introduces the evolving paradigm of the model-driven architecture, first time also comprehensively deployed for security and privacy services in bio-genetic and health information systems.

  7. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  8. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security, which is the entry point for computer security information at CERN. FILE SERVICES COMPUTING RULE The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules.

  9. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security which is the entry point for computer security information at CERN. File Services Computing Rule The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules

  10. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  11. Food security policies in India and China

    DEFF Research Database (Denmark)

    Yu, Wusheng; Elleby, Christian; Zobbe, Henrik

    2015-01-01

    Food insecurity is a much more serious concern in India than China. In addition to income and poverty differences, we argue in this paper that differences in food policies can further explain the different food security outcomes across the two countries. First, India mostly uses price-based input...... adopting a widely criticized public distribution system and China mainly using direct income transfers and other social safety nets. Third, although both committed considerable fiscal resources to insulating their respective domestic markets, especially during recent food price spikes, India’s heavy...... dependence on price-based measures causes relatively larger and more volatile fiscal burdens, thereby likely making it more vulnerable in dealing with similar events in the future. These findings have important implications for food policy and food security in the two countries in the future....

  12. Alignment of Organizational Security Policies -- Theory and Practice

    NARCIS (Netherlands)

    Dimkov, T.

    2012-01-01

    To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a

  13. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  14. Gaining Economic Profit or Losing Cultural Security: Framing Persuasive Arguments for Two Types of Conservatives

    Directory of Open Access Journals (Sweden)

    Silke Eschert

    2017-02-01

    Full Text Available Recent research suggests that different motivational bases underlie economic and cultural conservatism. Different political messages may address these different motivational bases. This article investigates the hypothesis that gain frames and achievement frames are more persuasive for participants high in economic conservatism and for economic conservative political issues, whereas loss and security frames are more persuasive for participants high in cultural conservatism and for cultural conservative political issues. Indeed, differential framing effects were found for economic versus cultural conservative issues across two experimental studies (N = 111 and N = 234. Study 2 could show that these effects were also significantly moderated by individual economic and cultural conservatism. Political arguments were perceived as most persuasive when argument frames matched both the issue at hand and recipient’s individual conservatism. Theoretical implications are discussed with regard to the motivational bases of two dimensions of conservatism along with practical implications for the field of political communication.

  15. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  16. External dimension of Ukraine’s security policy

    OpenAIRE

    O. S. Vonsovych

    2015-01-01

    Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude...

  17. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  18. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  19. Nuclear Cyber Security Issues and Policy Recommendations

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo

    2015-01-01

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities

  20. 12 CFR 12.7 - Securities trading policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Securities trading policies and procedures. 12.7 Section 12.7 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and...

  1. Differential Effects of Message Framing on Obesity Policy Support Between Democrats and Republicans.

    Science.gov (United States)

    Lee, Tae Kyoung; Kim, Hye Kyung

    2017-12-01

    This study tests whether gain- and loss-framed messages about establishing obesity-reducing policies have different persuasive effects on Republicans and Democrats. In a randomized between-subject experiment, participants (N = 384) read a message emphasizing either benefits to a society by establishing policies aimed to reduce obesity (i.e., gain-framed message) or costs to a society that fails to establish those policies (i.e., loss-framed message). Results indicated that Democrats perceived the gain-framed message as more persuasive than the loss-framed message and the perceived argument strength fully mediated the framing effect on Democrats' policy support; however, there was no framing effect on perceived argument strength among Republicans. On the other hand, the gain-framed message led Republicans to attribute the cause of obesity less to the individual level compared to the loss-framed message and the no-message condition. We observed no framing difference among Democrats on causal attributions. Theoretical and practical implications of these findings are discussed.

  2. Changing climate, changing frames; the role of frame interactions in Dutch water safety policy

    NARCIS (Netherlands)

    Vink, M.J.; Boezeman, D.; Dewulf, A.; Termeer, C.J.A.M.

    2011-01-01

    Both climate change and water safety are textbook examples of wicked problems. Due to the ambiguous knowledge bases and contested values characterising these problems, frame differences among stakeholders and participants often result in severe political debate and not seldom evolve into

  3. Constructing Outsiders: The Discursive Framing of Access in University Diversity Policies

    Science.gov (United States)

    Iverson, Susan V.

    2012-01-01

    This article investigates how discourses circulating in diversity policies reflect and produce perceptions about diversity in higher education. This study, utilizing the method of policy discourse analysis, examines 21 diversity action plans issued at 20 U.S. land-grant universities to understand how these policy documents frame diversity.…

  4. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  5. Frame contestation in the news: national identity, cultural resonance, and U.S. drone policy

    NARCIS (Netherlands)

    Rowling, C.M.; Sheets, P.; Jones, T.M.

    2013-01-01

    Scholarship suggests that disagreement among political officials significantly impacts how the press covers a particular policy issue and how the public perceives and comes to understand it. An unexplored area of research in the framing effects literature asks to what extent frame contestation

  6. Frames of Reference: A Metaphor for Analyzing and Interpreting Attitudes of Environmental Policy Makers and Policy Influencers

    Science.gov (United States)

    Swaffield

    1998-07-01

    / The concept of frame of reference offers a potentially useful analytical metaphor in environmental management. This is illustrated by a case study in which attitudes of individuals involved in the management of trees in the New Zealand high country are classified into seven distinctive frames of reference. Some practical and theoretical implications of the use of the frame metaphor are explored, including its potential contribution to the emerg- ing field of communicative planning. KEY WORDS: Frames of reference; Environmental policy analysis; Metaphor; New Zealand high country

  7. Frames in contestation: gendering domestic violence policies in five central and eastern European countries.

    Science.gov (United States)

    Krizsan, Andrea; Popa, Raluca Maria

    2014-07-01

    The article looks at the translation of international norms on domestic violence to the national level in five Central and Eastern European countries. It argues that translation brings a concept of domestic violence, which stretches gender equality ideas underpinning international norms so as to be easier to endorse by mainstream policy actors, and results in policies framed in degendered individual rights terms. The potential for keeping gender equality in focus is then guaranteed by gendering policy processes through empowerment of gender equality actors at all stages. Absence of ownership of the policy by gender equality actors risks co-optation by frames contesting gender equality. © The Author(s) 2014.

  8. Private military and security companies policy in Africa: regional ...

    African Journals Online (AJOL)

    The purpose of this article is to explain the policy stasis around private security regulation in Africa. Africa is one of the largest theatres of private military and security company operations in the world. Yet, there is still no new regional convention or policy on their regulation. Previous studies focused on Western efforts to ...

  9. Between Accommodating and Activating: Framing Policy Reforms in Response to Workforce Aging across Europe.

    Science.gov (United States)

    Kroon, Anne C; Vliegenthart, Rens; van Selm, Martine

    2017-07-01

    In the past decade, European governments have implemented activating policy reforms to maximize older workers' employment and employability, representing a paradigmatic change in approaches to work and retirement. This study isolates the factors that explain the relative success and failure of competitive frames that are either in favor of or against activating policies in European news coverage, by applying time-series analysis (ordinary least squares with panel-corrected standard errors) to monthly aggregated news coverage in the Netherlands, the United Kingdom, Denmark, and Spain over the timespan 2006-2013. The results show that pro-activating and counteractivating frames generally coincide in competitive framing environments. The pro-activating frame proliferated in times of high employment protection, whereas the counteractivating frame prevailed stronger in conservative compared with progressive newspapers, and gained momentum during the aftermath of the financial crisis and in times governments on the economic left were in power. The study advances knowledge of competitive issue framing by demonstrating how the economic, policy, and political context matters for the emergence and evolvement of competing frames. In addition, the findings contribute to the understanding of the factors that contribute to news representations that promote active aging in European news, which may foster support for policy reforms that sustain older workers' employability.

  10. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  11. Framing the ecosystem concept through a longitudinal study of developments in science and policy.

    Science.gov (United States)

    Aggestam, Filip

    2015-08-01

    This paper examines how scientific literature and policy documents frame the ecosystem concept and how these frames have shaped scientific dialogue and policy making over time. This was achieved by developing a frame typology, as a basis for organizing relevant value expressions, to assess how different frames have altered perspectives of the ecosystem concept. The frame typology and analysis is based on a semi-grounded and longitudinal document analysis of scientific literature and policy documents using the ecosystem concept. Despite changing discourses and public priorities (e.g., cultural constructs of biodiversity) both science and policy documents are characterized by stable value systems that have not changed substantially since the 1930s. These value systems were defined based on ethical principles that delineate 6 core frames: humans first, dual systems, eco-science, eco-holism, animals first, and multicentrism. Specific crises (e.g., climate change) and cross-disciplinary uptake and re-uptake of, for example, the ecosystem services concept, have brought new perspectives to the forefront of public discourse. These developments triggered changes in the core frames that, rather than being value based, are based on how the ecosystem is conceptualized under fixed value systems and over time. Fourteen subframes were developed to reflect these longitudinal changes. There are as such clear framing effects in both scientific literature and in policy. Ecosystem research is for instance often characterized by unstated value judgments even though the scientific community does not make these explicit. In contrast, policy documents are characterized by clear value expressions but are principally management driven and human centered. © 2015 Society for Conservation Biology.

  12. Staying above the Fray: Framing and Conflict in the Coverage of Education Policy Debates

    Science.gov (United States)

    Tamir, Eran; Davidson, Roei

    2011-01-01

    This article examines the mass media's role in shaping education policy debates in light of pluralist theory and Bourdieu's social fields theory. We content analyzed the coverage of New Jersey education policy debates during 1985, when the governor moved to consolidate his power in the education field. We used quantitative framing and conflict…

  13. Youth, Privacy and Online Media: Framing the right to privacy in public policy-making

    DEFF Research Database (Denmark)

    Hasselbalch, Gry; Jørgensen, Rikke Frank

    2015-01-01

    policy making that the right to privacy is challenged in new ways in a structurally transformed online public sphere, the way in which it has been framed does not seem to acknowledge this transformation. This paper therefore argues for a reformulation of “online privacy” in the current global policy...... online privacy....

  14. Framing Teacher Education: Conceptions of Teaching, Teacher Education, and Justice in Chilean National Policies

    Science.gov (United States)

    Fernández, M. Beatriz

    2018-01-01

    Chile shows high inequity and socioeconomic stratification in both K-12 education and teacher preparation. Drawing on the notion of frames, this critical policy analysis examines how teaching, teacher education, and justice were conceptualized in Chile's teacher preparation policies between 2008-2015. It also analyzes the narrative stories…

  15. Adaptive governance, uncertainty, and risk: policy framing and responses to climate change, drought, and flood

    NARCIS (Netherlands)

    Hurlbert, M.; Gupta, J.

    2016-01-01

    As climate change impacts result in more extreme events (such as droughts and floods), the need to understand which policies facilitate effective climate change adaptation becomes crucial. Hence, this article answers the question: How do governments and policymakers frame policy in relation to

  16. Security policy of the European Union and refuge crisis

    Directory of Open Access Journals (Sweden)

    Stevović Marko

    2015-01-01

    Full Text Available The paper is chronologicaly analizing the process of the establishing of the European Union Security policy. In a row of intergovernmental agreements, which were verified wit their own constitutions, the key points of creating the Security policy are given, but the internal policies of the memebr states of the European Union remained a little bit dissyncronised. The paper is chronologically analizing the process of the establishing of common foreign and security policy of the European Union. A series of agreements reached, which were verified by mutual agreement states (Treaty of Mastriht, the Treaty of Lisbon, established the guidelines of the common foreign and security policy of the European Union (EU CFSP. There is still incomplete harmonization of national security policy of the EU countries to a level that could completely uniquely to perform on the world stage. This deficiency a cause of this is that the majority of European Union countries unprepared for the huge number of refugees from war-affected areas from the Middle East. Large refugee crisis in the foreground released a security aspect of the common policy of the European Union, but is also revealed the differences between the external policies of the member states in the approaches to the solution of the current problems. Were analyzed security aspects of the newly established factual condition, caused by the refugee crisis and discussed potential solutions to overcome it, as well as issues that the current crisis immigrants open for further research.

  17. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  18. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  19. Framing mechanisms : the interpretive policy entrepreneur’s toolbox

    NARCIS (Netherlands)

    Aukes, Ewert; Lulofs, Kristiaan R.D.; Bressers, Johannes T.A.

    2017-01-01

    Policy entrepreneurs were, originally, neither conceived to be active meaning-makers nor did they interact with other actors. They invested other resources such as time, energy, reputation and money in coupling problems, solutions and politics. Adding the interpretive dimension of interactional

  20. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  1. European Union (EU Information Security Policies Türkay

    Directory of Open Access Journals (Sweden)

    Türkay Henkoğlu

    2013-11-01

    Full Text Available The development of the European economy is strongly related to the use of Information andcommunication technologies (ICT and the transformation process of information society. However, because of the risks of ICT, people are anxious about using technology, which in turn retards the economic growth of countries all around the world. Therefore, especially in the last twenty years, information security issues have begun to gain importance in European Community (EC information policies, and many suggestions have been made related to these issues. The purpose of this study is to examine the main issues in EC information policies, the aims and the effects of these policies, and how they are implemented. The importance and scope of these policies were examined based on the McCumber information security model, which is a comprehensive and multidimensional information security model. In order to draw attention to the importance of information security issues in EC policies, a wide range of information sources are reviewed, including EC directives and agreements related to information security, the EC organizations responsible for making information security policies, and the literature concerning these issues. The findings of the study show that EC information security policies are seen as a vital part of economy and information societypolicies. In addition, the study shows that data protection directives have been updated regularly since 1995, which makes them suitable for the needs of today’s world.

  2. ESCAPE. Energy Security and ClimAte Policy Evaluation

    International Nuclear Information System (INIS)

    Kessels, J.R.; Bakker, S.J.A.

    2005-05-01

    Climate change and energy supply security policy are currently not integrated in most countries, despite possible synergies. The ESCAPE approach suggests that linking climate change policy with security of energy supply could improve climate change policy at both a national and international level. The report explores the interaction between policies of energy security and climate change and the options of inclusion of energy security issues into national and international post-2012 climate negotiations. It emphasises the importance of the US in this regard and takes a close look at US energy policy documents. It appears that current US energy policy is not directed towards reducing its reliance on imported fossil fuel, even though the government has a strong preference for this. This study shows that measures to reduce import dependency are mostly synergetic with climate policy and gives some options that can be implemented. On an international level, linkages of energy security into post-2012 climate policy may be possible in sectoral bottom-up approaches or technology frameworks. As well, inclusion of a security of supply criterion in international emission trading instruments may provide potential benefits

  3. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... committee meeting, to discuss National Industrial Security Program policy matters. DATES: The meeting will...

  4. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee Management... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  5. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  6. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  7. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  8. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  9. Efficient Enforcement of Security Policies in Distributed Systems

    OpenAIRE

    Alzahrani, Ali Mousa G.

    2013-01-01

    Policy-based management (PBM) is an adaptable security policy mechanism in information systems (IS) that confirm only authorised users can access resources. A few decades ago, the traditional PBM has focused on closed systems, where enforcement mechanisms are trusted by system administrators who define access control policies. Most of current work on the PBM systems focuses on designing a centralised policy decision point (PDP), the component that evaluates an access request against a poli...

  10. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  11. Position paper: A generic approach for security policies composition

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming

    2012-01-01

    When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abst......When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic...

  12. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  13. Debating food security policy in two different ideational settings

    DEFF Research Database (Denmark)

    Farsund, Arild Aurvåg; Daugbjerg, Carsten

    2017-01-01

    Food security has emerged as a relatively new policy issue in agricultural policy making in developed countries. This policy problem is addressed within an institutional landscape in which agricultural ideas and institutions are well-established. In this article, food security policy making...... (agriculture is considered a unique economic sector with special market and production conditions). It is demonstrated in the article how these two opposing institutionalised ideational foundations have influenced the nature of the food security debate in the two countries. In Australia, the debate emphasises...... the positive role of the market and trade in providing global food security. In Norway, the debate highlights the need to regulate market forces and restrict trade in order to allow countries to develop their own agricultural sectors....

  14. The Warriors Future Directions in Japanese Security Policies

    National Research Council Canada - National Science Library

    Levin, Norman

    1993-01-01

    This report describes our assessment of how changes in the domestic, regional, and international environments are likely to affect future Japanese security policies and defense cooperation between Japan and the U.S...

  15. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  16. Past Fame, Present Frames and Future Flagship? An Exploration of How Health is Positioned in Canadian Foreign Policy

    Directory of Open Access Journals (Sweden)

    Vivien Runnels

    2012-04-01

    Full Text Available Canada has been regarded as a model global citizen with firm commitments to multilateralism. It has also played important roles in several international health treaties and conventions in recent years. There are now concerns that its interests in health as a foreign policy goal may be diminishing. This article reports on a thematic analysis of key Canadian foreign policy statements issued over the past decade, and interviews with key informants knowledgeable of, or experienced in the interstices of Canadian health and foreign policy. It finds that health is primarily and increasingly framed in relation to national security and economic interests. Little attention has been given to human rights obligations relevant to health as a foreign policy issue, and global health is not seen as a priority of the present government. Global health is nonetheless regarded as something with which Canadian foreign policy must engage, if only because of Canada’s membership in many United Nations and other multilateral fora. Development of a single global health strategy or framework is seen as important to improve intersectoral cooperation on health issues, and foreign policy coherence. There remains a cautious optimism that health could become the base from which Canada reasserts its internationalist status.

  17. Past Fame, Present Frames and Future Flagship? An Exploration of How Health is Positioned in Canadian Foreign Policy

    Science.gov (United States)

    Labonté, Ronald; Runnels, Vivien; Gagnon, Michelle

    2014-01-01

    Canada has been regarded as a model global citizen with firm commitments to multilateralism. It has also played important roles in several international health treaties and conventions in recent years. There are now concerns that its interests in health as a foreign policy goal may be diminishing. This article reports on a thematic analysis of key Canadian foreign policy statements issued over the past decade, and interviews with key informants knowledgeable of, or experienced in the interstices of Canadian health and foreign policy. It finds that health is primarily and increasingly framed in relation to national security and economic interests. Little attention has been given to human rights obligations relevant to health as a foreign policy issue, and global health is not seen as a priority of the present government. Global health is nonetheless regarded as something with which Canadian foreign policy must engage, if only because of Canada’s membership in many United Nations and other multilateral fora. Development of a single global health strategy or framework is seen as important to improve intersectoral cooperation on health issues, and foreign policy coherence. There remains a cautious optimism that health could become the base from which Canada reasserts its internationalist status. PMID:24977037

  18. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  19. Globalized Security Reshaping America’s Defense Trade Policy

    Science.gov (United States)

    2001-04-01

    AU/SCHOOL/NNN/2001-04 THE ATLANTIC COUNCIL OF THE UNITED STATES AIR UNIVERSITY NATIONAL DEFENSE FELLOWSHIP PROGRAM GLOBALIZED SECURITY RESHAPING...to) - Title and Subtitle Globalized Security Reshaping America’s Defense Trade Policy Contract Number Grant Number Program Element Number...20 Globalization

  20. Private Military and Security Companies Policy in Africa

    African Journals Online (AJOL)

    Gwatiwa Tshepo

    INTERNATIONAL POLITICS. Tshepo T. Gwatiwa. Graduate Institute of International and Development. Studies, Geneva. Abstract. The purpose of this article is to explain the policy stasis around private security regulation in Africa. Africa is one of the largest theatres of private military and security company operations in the ...

  1. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    National Preparedness: A Case Study in the Development of Public Policy,” Sam Clovis agrees that homeland security is a national issue but...recommends that state and local governments have maximum flexibility in implementing homeland security programs ( Clovis , 2006). He sees the federal...national preparedness ( Clovis , 2006). The author goes on to recommend a framework of “Collaborative Federalism” for homeland security. A review of

  2. Rapid turns in European renewable energy policy: advocacy and framing of the proposed trading of guarantees of origin

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Maans; Nilsson, Lars J.; Ericsson, Karin

    2008-10-15

    The EU has assumed ambitious targets and strategies for the promotion of renewable sources of energy (RES) binding to all its member states. This report sets out to examine the proposed EU-wide policy instrument designed to help achieve the targets on renewable electricity and heat - the trading of Guarantees of Origin (GO). It analyses the fate of the GO trading proposal in the European policy-making machinery during 2007 and 2008. It first discusses its origins, key components and points of contention, and then examines key factors behind the policy development leading first to its development and subsequently to its abandonment in 2008. Addressing these factors, the report explores first the near-term policy-making process before and after the proposal on GO trading was tabled in January 2008, focusing on processes in the European bureaucracy and how they were influenced by different interest groups and member state governments. It then takes a step back and looks at how competing policy frames over time have shaped the GO instrument debate. Results show how a strong internal market frame acted as a primary driving force in the Commission throughout the 2000s to promote the GO trading instrument. The subsequent collapse of the GO trading proposal can be largely attributed to a) the lack of a strong lobby in favour of GO, b) the accumulated experience with and institutionalisation of national RES support policy, and c) growing general political concerns for supply security, innovation and competitiveness. In the end, the fall of the GO trading instrument is indicative of how the underlying political battle line between advocates of the European internal market and guardians of national interests has moved in favour of the latter in recent years. (author). refs

  3. Beyond the security paradox: Ten criteria for a socially informed security policy.

    Science.gov (United States)

    Pavone, Vincenzo; Ball, Kirstie; Degli Esposti, Sara; Dibb, Sally; Santiago-Gómez, Elvira

    2017-04-01

    This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data gathered at 12 citizen summits in nine European countries. The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy. These criteria not only reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens' priorities. They also cast light on an interesting paradox: although people feel safe in their daily lives, they believe security could, and should, be improved.

  4. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  5. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  6. Considerations When Including Students with Disabilities in Test Security Policies. NCEO Policy Directions. Number 23

    Science.gov (United States)

    Lazarus, Sheryl; Thurlow, Martha

    2015-01-01

    Sound test security policies and procedures are needed to ensure test security and confidentiality, and to help prevent cheating. In this era when cheating on tests draws regular media attention, there is a need for thoughtful consideration of the ways in which possible test security measures may affect accessibility for some students with…

  7. Beyond policy networks: policy framing and the politics of expertise in the 2001 Foot and Mouth Disease crisis.

    Science.gov (United States)

    Wilkinson, Katy; Lowe, Philip; Donaldson, Andrew

    2010-01-01

    For the past decade, the policy community/issue network typology of pressure group interaction has been used to explain policy outcomes and the policy-making process. To re-examine the validity of this typology, the paper focuses on the UK government's response to the 2001 Foot and Mouth Disease (FMD) crisis, and in particular the decision to pursue contiguous culling rather than vaccination to overcome the epidemic. Rather than illustrating the emergence of an issue network in agricultural policy, the decision-making process of the FMD outbreak demonstrates continuity with prior crises. In addition, the politicization of scientific expertise is identified as an emerging trend in crisis management. Policy framing is used to explain the impetus behind the contiguous cull decision, concluding that the legacy of previous policy choices conditioned the crisis response to a far greater degree than contemporaneous pressure group action.

  8. Globally reasoning about localised security policies in distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax......, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access...... control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative...

  9. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  10. Family Economic Security Policies and Child and Family Health

    Science.gov (United States)

    Spencer, Rachael A.; Komro, Kelli A.

    2017-01-01

    In this review we examine the effects of family economic security policies (i.e., minimum wage, Earned Income Tax Credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the U.S., and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child wellbeing. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and wellbeing. PMID:28176020

  11. Family Economic Security Policies and Child and Family Health.

    Science.gov (United States)

    Spencer, Rachael A; Komro, Kelli A

    2017-03-01

    In this review, we examine the effects of family economic security policies (i.e., minimum wage, earned income tax credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the USA, and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies, and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child well-being. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and well-being.

  12. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  13. Food security, agricultural policies and economic growth

    NARCIS (Netherlands)

    Koning, Niek

    2017-01-01

    Using a political-economic approach supplemented with insights from human ecology, this volume analyzes the long-term dynamics of food security and economic growth. The book begins by discussing the nature of preindustrial food crises and the changes that have occurred since the 19th century with

  14. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  15. Renewable energy policy design and framing influence public support in the United States

    Science.gov (United States)

    Stokes, Leah C.; Warshaw, Christopher

    2017-08-01

    The United States has often led the world in supporting renewable energy technologies at both the state and federal level. However, since 2011 several states have weakened their renewable energy policies. Public opinion will probably be crucial for determining whether states expand or contract their renewable energy policies in the future. Here we show that a majority of the public in most states supports renewable portfolio standards, which require a portion of the electricity mix to come from renewables. However, policy design and framing can strongly influence public support. Using a survey experiment, we show that effects of renewable portfolio standards bills on residential electricity costs, jobs and pollution, as well as bipartisan elite support, are all important drivers of public support. In many states, these bills' design and framing can push public opinion above or below majority support.

  16. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  17. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program policy... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 6...

  18. Security aspects of policy controlled cognitive radio

    OpenAIRE

    BALDINI Gianmarco; ATANASOVSKI Vladimir; RAKOVIC Valentin; GAVRILOVSKA Liljana

    2012-01-01

    Cognitive radio networks envision coexistence of several primary and secondary systems in the same environment, where the secondary system actors must cooperate among each other to achieve the goal of higher spectrum utilization concurrently protecting the primary system. The nature of this type of networks makes them vulnerable to a variety of malicious attacks that can decrease the performance of the secondary and especially the primary system. This paper focuses on the security issues in p...

  19. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    -making capacities and capabilities. For many years, a genuine European defence policy remained a distant dream for an exclusive group of political leaders from federally oriented states such as Belgium and Luxembourg. Yet since 1999, the EU has carried out 23 military missions in the Balkans, Africa and Asia....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...

  20. Korea’s Overseas Food Security Policy

    DEFF Research Database (Denmark)

    Müller, Anders Riel

    Korea. While each country has distinct economies, policies, and histories compiling all countries into one is problematic and even dangerous as it oversimplifies complex issue into an “Asian onslaught” onto the Global Economy. Also these generalizations do little to understand why certain governments...

  1. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  2. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  3. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  4. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  5. Adaptive Governance, Uncertainty, and Risk: Policy Framing and Responses to Climate Change, Drought, and Flood.

    Science.gov (United States)

    Hurlbert, Margot; Gupta, Joyeeta

    2016-02-01

    As climate change impacts result in more extreme events (such as droughts and floods), the need to understand which policies facilitate effective climate change adaptation becomes crucial. Hence, this article answers the question: How do governments and policymakers frame policy in relation to climate change, droughts, and floods and what governance structures facilitate adaptation? This research interrogates and analyzes through content analysis, supplemented by semi-structured qualitative interviews, the policy response to climate change, drought, and flood in relation to agricultural producers in four case studies in river basins in Chile, Argentina, and Canada. First, an epistemological explanation of risk and uncertainty underscores a brief literature review of adaptive governance, followed by policy framing in relation to risk and uncertainty, and an analytical model is developed. Pertinent findings of the four cases are recounted, followed by a comparative analysis. In conclusion, recommendations are made to improve policies and expand adaptive governance to better account for uncertainty and risk. This article is innovative in that it proposes an expanded model of adaptive governance in relation to "risk" that can help bridge the barrier of uncertainty in science and policy. © 2015 Society for Risk Analysis.

  6. The Evolution of the European Security Policy

    Directory of Open Access Journals (Sweden)

    Vasilica Negrut

    2010-06-01

    Full Text Available The process of development of the European Union’s security dimension has known a spectacular evolution in the past years, passing from political consultation to establishing objectives, then commonactions and positions; at a practical level, the Petersburg measures, carried on initially by the Western European Union as an armed branch of the European Union, have been replaced by actions of implication ofthe Union in managing some conflicts. The Lisbon Treaty confirms the commitments of the member states and mentions the fact that the European Union will dispose of the necessary measures for the defense of its objectives and to contribute to world peace and stability.

  7. Paradiplomacy, Security Policies and City Networks: the Case of the Mercocities Citizen Security Thematic Unit

    Directory of Open Access Journals (Sweden)

    Gilberto Marcos Antonio Rodrigues

    Full Text Available Abstract In a phenomenon known as paradiplomacy, cities are playing an increasingly important role in international relations. Through paradiplomacy, cities are co-operating internationally with other cities, and city networks have become important spaces for sharing experiences of and best practices in local public policy. Moreover, security policy is a increasingly important part of local policy-making. In Latin America, the concept of citizen security, based on a democratic and human rights approach, has developed in response to the legacy of authoritarian regimes from the 1960s to the 1980s. This article examines how security policies have been disseminated, discussed and transferred through Mercocities, the main city network in South America.

  8. Effect of Steel Framing for Securing Drywall Panels on Thermal and Humidity Parameters of the Outer Walls

    Science.gov (United States)

    Major, Maciej; Kosiń, Mariusz

    2017-12-01

    The paper analyses the effect of steel framing used to secure drywall panels on thermal and humidity properties of outer walls. In the practice of building a light structure, the most popular components are steel and wood studs. They are used to obtain framing for building a wall (an outer wall in this study). Analysis presented in this study concerned the corner of the outer wall build using the technology of light steel framing. Computer simulation was used to perform thermal and humidity analysis for the joint of the outer wall.

  9. Effect of Steel Framing for Securing Drywall Panels on Thermal and Humidity Parameters of the Outer Walls

    Directory of Open Access Journals (Sweden)

    Major Maciej

    2017-12-01

    Full Text Available The paper analyses the effect of steel framing used to secure drywall panels on thermal and humidity properties of outer walls. In the practice of building a light structure, the most popular components are steel and wood studs. They are used to obtain framing for building a wall (an outer wall in this study. Analysis presented in this study concerned the corner of the outer wall build using the technology of light steel framing. Computer simulation was used to perform thermal and humidity analysis for the joint of the outer wall.

  10. Water security in one blue planet: twenty-first century policy challenges for science.

    Science.gov (United States)

    Grey, D; Garrick, D; Blackmore, D; Kelman, J; Muller, M; Sadoff, C

    2013-11-13

    Water-related risks threaten society at the local, national and global scales in our inter-connected and rapidly changing world. Most of the world's poor are deeply water insecure and face intolerable water-related risks associated with complex hydrology. Most of the world's wealthy face lower water-related risks and less complex hydrology. This inverse relationship between hydrological complexity and wealth contributes to a divided world. This must be addressed if global water security is to be achieved. Using a risk-based framework provides the potential to link the current policy-oriented discourse on water security to a new and rigorous science-based approach to the description, measurement, analysis and management of water security. To provide the basis for this science-based approach, we propose an encompassing definition rooted in risk science: water security is a tolerable level of water-related risk to society. Water security policy questions need to be framed so that science can marshal interdisciplinary data and evidence to identify solutions. We join a growing group of scientists in asserting a bold vision for science leadership, calling for a new and comprehensive understanding of the planet's water system and society's water needs.

  11. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July 21...

  12. Land Reform and Food Security | Sanusi | Economic and Policy ...

    African Journals Online (AJOL)

    This paper posits that to achieve a longterm success of land reform in Nigeria and increase its productive capacities for food security, it will require the formulation of an agrarian policy that will balance the competing social and economic needs of the people.

  13. Afghanistan: Post Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-26

    Governance, Security, and U.S. Policy Congressional Research Service 4 reputation as a brilliant strategist by preventing the Soviets from...the National Guard from several states deployed nine “ Agribusiness Development Teams” to help Afghan farmers with water management, soil

  14. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  15. The citizen security reconfiguration: The security and coexistence policy for football in Colombia

    Directory of Open Access Journals (Sweden)

    Diego Felipe Puentes Sánchez

    2015-06-01

    Full Text Available Security policies are passing through a crucial time in which management strategies focused on crime, use of force and increasing clampdown on criminal matters, are inefficient in a scenario that promotes a normative spectrum linked to Human Rights seeking to insert the security as a condition for the construction of universal dignity in what the United Nations has called Human Security. This article is inserted in the current citizen security policy debates, to evidence how concepts such as Civic Culture and Culture of Peace are an inexorable prerequisite for the transformation to a Human Security approach, issue that goes through the possibility of promoting such change from perspectives that understand the conflicts in a broader and interdisciplinary manner. In order to this, the policy for security and coexistence for football in Colombia will be analyzed so as to have a practical and concrete example that will allow to evidence the expressed theoretical approaches and also because football has great social importance (economic, political and cultural in Colombia.

  16. The Faroe Islands’ Security Policy in a Process of Devolution

    Directory of Open Access Journals (Sweden)

    Beinta í Jákobsstovu

    2012-12-01

    Full Text Available Since the late 1990s there has been a remarkable change in the institutional context of safety and security policies for the Faroes. The end of the Cold War led to a reduction in the strategic importance of, and military presence in, the islands. However, today Faroese sea and air space is increasingly exposed to heavy civilian traffic due to expected oil production as well as new sailing routes from the High North. The Faroese government is in a process, nearly completed, of taking over the full responsibility for societal security policy, a field it used to share with the Danish state authorities. In April 2002, the Faroese authorities took over the responsibility for SAR in Faroese sea territory and established a MRCC Center in Tórshavn. A new civic security law was passed by Løgtingið (the parliament in May 2012. This article discusses micro-states’ options in the international arena; provides a brief overview of the history of Faroese security policy; and discusses the present and future challenges involved in assuring protection and rescue services for the Faroese region of the North Atlantic.

  17. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  18. Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2009-01-01

    The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining

  19. The French nuclear policy. A model for security policy in North-East Asia

    International Nuclear Information System (INIS)

    Choe, K.

    1998-01-01

    Between the end of the second world war and the collapse of the Berlin wall, the French diplomacy was based on the nuclear policy in a solid and coherent way. This nuclear policy was an 'incarnation' of the national security conception, allowing France to recover its political, military and economical rank on the international scene. The most important characteristic of the French nuclear policy concerns the commercialization of the nuclear energy which aims to ensuring the national security through the building up of a financial, technological and political 'reserve'. In front of the domination of the USA and USSR during the cold war era, NE Asia had a similar geostrategic configuration as Western Europe. It concerns in particular the massive application of nuclear energy for both military and industrial purposes. The bases of the security policy in this region refers to the real use of the nuclear weapon by the USA against Japan in 1945. The French nuclear policy may be considered as a model for the building of the security policy of NE Asia, in particular through the commercialization of the nuclear technology between the countries in concern. This nuclear approach would allow the countries of these region to change their present day national defense policy into an economical and military cooperation. (J.S.)

  20. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  1. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  2. The effect of framing and normative messages in building support for climate policies.

    Directory of Open Access Journals (Sweden)

    Mark J Hurlstone

    Full Text Available Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a "foregone-gain"--incomes rise in the future but not by as much as in the absence of emission cuts--rather than as a "loss"--incomes decrease relative to the baseline expected future levels (Studies 1 & 2. The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1, whereas a normative message revealing the emission policy preferences of other Australians did (Study 2. The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts.

  3. The Effect of Framing and Normative Messages in Building Support for Climate Policies

    Science.gov (United States)

    Hurlstone, Mark J.; Lewandowsky, Stephan; Newell, Ben R.; Sewell, Brittany

    2014-01-01

    Deep cuts in greenhouse gas emissions are required to mitigate climate change. However, there is low willingness amongst the public to prioritise climate policies for reducing emissions. Here we show that the extent to which Australians are prepared to reduce their country's CO2 emissions is greater when the costs to future national income are framed as a “foregone-gain”—incomes rise in the future but not by as much as in the absence of emission cuts—rather than as a “loss”—incomes decrease relative to the baseline expected future levels (Studies 1 & 2). The provision of a normative message identifying Australia as one of the world's largest CO2 emitters did not increase the amount by which individuals were prepared to reduce emissions (Study 1), whereas a normative message revealing the emission policy preferences of other Australians did (Study 2). The results suggest that framing the costs of reducing emissions as a smaller increase in future income and communicating normative information about others' emission policy preferences are effective methods for leveraging public support for emission cuts. PMID:25501009

  4. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  5. Analysing "Migrant" Membership Frames through Education Policy Discourse: An Example of Restrictive "Integration" Policy within Europe

    Science.gov (United States)

    Dubois-Shaik, Farah

    2014-01-01

    This article proposes combining discourse theory and perspectives on political membership developments in Western European societies. It combines theories and examples of policy discourses about "migrant integration" in the Swiss national context in the sphere of education. This examination aims to deconstruct specific membership framing…

  6. Security Policies from a Spatial Perspective: the Case of Honduras

    Directory of Open Access Journals (Sweden)

    Lirio del Carmen Gutiérrez Rivera

    2014-06-01

    Full Text Available Public insecurity became a central issue for many Hondurans in the late 1990s, as crime, delinquency and homicide increased significantly in the isthmus. Honduras had the second highest homicide rate (35.1 per 100,000 in the region after El Salvador (50.2. per 100,000 . This social violence triggered insecurity and fear, which was further accompanied by the overall perception that the state was unable of relieving or protecting the population. This article looks at the failed attempts of the Honduran state to stop social violence and to control youth gang expansion by focusing on the security policies Cero Tolerancia (Zero Tolerance, Mano Dura (Iron Fist and the Ley Antimaras (Anti-Gang Law. It understands security policies as territorial strategies that attempt to reduce social violence and impose control.

  7. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    management framework under the NIPP, examines how implementation has been managed as strategic change through the lens of change management theory ...implementation has been managed as strategic change through the lens of change management theory , and offers recommendations for improvement. It is...framework been handled as strategic change in homeland security policy? How might change management theory and practice be applied to assess the

  8. Framework for an African policy towards creating cyber security awareness

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2011-05-01

    Full Text Available , Council for Scientific and Industrial Research, Pretoria, RSA 2 Meraka, Council for Scientific and Industrial Research, Pretoria, RSA 3 Cyber Security Department, Department of Communications, Pretoria, RSA idlamini@csir.co.za btaute@csir.co.za jabur... for the development of the proposed framework. The review will analyse the extent to which these policies address awareness as well as related issues such as education, support to industry and citizens, collaboration and increase in technical expertise, and linkages...

  9. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00 a.m... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  10. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  11. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00 a... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  12. Bending Priorities: a Study in Policy Framing. State of Michigan’s Brownfield Initiative

    Directory of Open Access Journals (Sweden)

    Richard HULA

    2009-10-01

    Full Text Available This paper explores the political process bywhich the state of Michigan successfully crafted andimplemented such a brownfield initiative. Althoughthe primary focus here is on the experience of asingle state, the lessons to be learned from thiscase have national and international implicationsbecause Michigan is a leader in brownfieldprograms. The paper begins with a review of thegeneral policy context in which state brownfieldpolicy is made. Particular attention is given tothe widespread dissatisfaction of a variety ofstakeholders with long dominant federal programsin the area of environmental cleanups. The secondsection outlines a number of fundamental legislativeand administrative changes that have beenimplemented in Michigan environmental policyover the past decade. Section three reviews thebroad literature on issue framing and considershow it might help identify the specific mechanismsby which the innovative brownfield program wasadopted. The final section provides an informal testof elements of the issue-framing model by exploringin some detail the convergence of public opinionwith key elements of the innovative policy, andwhether there was any significant shift in publicopinion over time.

  13. Education policy and frame conflict : Student assignment in the Wake County Public School System in North Carolina

    NARCIS (Netherlands)

    D.S. Eyre (Dylan Samuel)

    2011-01-01

    textabstractThis research explores frame conflict in the context of education policy. It centers on the public discourse surrounding the retraction of a student assignment policy aimed at socio-economic diversity in the Wake County Public School System in North Carolina, USA. It argues that the

  14. China's Quest for Energy; Impact upon Foreign and Security Policy

    International Nuclear Information System (INIS)

    Kiesow, Ingolf

    2004-11-01

    Contrary to Chinese intentions, the proportion of China's imports coming from potentially unstable countries is steadily increasing. As a response, China tries to diversify its sources of import and to own the oil when loaded in an export harbour. In spite of very high costs and political problems, China tries to import oil and gas from owned fields in Central Asia through pipelines. In the case of China, the competition is evident on the highest international level. Especially with Japan, this tends to make already previously sensitive relations deteriorate. China has territorial disputes with several neighbouring countries that are becoming more complicated by the fact that there is oil and gas on the bottom of the sea in the disputed area. Relations with Russia have been complicated. Since the 1990s they are on their way of being steadily improved, but they become strained, when Japan is given priority access to oil fields in Siberia. The sensitive relations with the U.S. tend to be impaired by China's ways of getting access to more secure supply of oil and gas. Chinese efforts to get a more attractive foreign policy profile is on the other hand alleviating but does not eliminate the potential of the energy issue to complicate. China's foreign and security policy relations. The European Union seems to be on its way to introduce energy questions as a field of common policy. This is a reason for Sweden to study the development. It is a matter of special interest that China has proposed an 'Energy Dialogue between Asia and Europe' about the resources and the Eurasian continent. The Chinese example illustrates the need for a Swedish energy security policy and plans for energy crisis preparedness

  15. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  16. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  17. THE FOREIGN AND SECURITY POLICIES OF THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Anand Menon

    2003-09-01

    Full Text Available In only a decade the European Union has moved from being a new kid on the block in terms of foreign and security policies to being a high profile and surprisingly effective international actor. Certainly, it has failed to match the ambitions of some of its most enthusiastic proponents. Certainly, too, European publics know next to nothing about what the Union does in the international realm. It is because of this that, despite their potential and their effectiveness to date, EU policies in this sphere were widely derided as failures following the moment when the attacks of 11 September 2001 shook the western world to its core. The Convention on the Future of Europe and subsequent intergovernmental conference look set to make significant institutional changes to the Union’s foreign and security policy systems. In undertaking these reforms, Convention members, and national governments are doubtless motivated by the laudable objective of enabling the Union to do more on the international stage. One can only hope that these motives notwithstanding, they do not simply propose reforms for their own sake and, in the process, undermine a system that, to the surprise of many, has continued to function respectably in an ever more complex and ever more dangerous world.

  18. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  19. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  20. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  1. U.S. energy security: problems and policies

    Energy Technology Data Exchange (ETDEWEB)

    Toman, M.A

    2002-12-15

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  2. U.S. energy security: problems and policies

    International Nuclear Information System (INIS)

    Toman, M.A.

    2002-12-01

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  3. Obesity framing for health policy development in Australia, France and Switzerland.

    Science.gov (United States)

    Patchett, Annabelle D; Yeatman, Heather R; Johnson, Keryn M

    2016-03-01

    The obesity epidemic is a consequence of the interaction of cultural, environmental, genetic and behavioural factors; framing the issue is central to determining appropriate solutions. This study used content and thematic framing analysis to explore portrayal of responsibility for obesity in policy documents in Australia, France and Switzerland. For Australia and France, obesity causality was a combination of individual and environmental factors, but for Switzerland, it was predominantly individual. The primary solutions for all countries were health promotion strategies and children's education. Industry groups proposed more school education while health advocates advised government intervention. Where France emphasized cultural attitudes towards taste, Australia focused on sport. The French were most keen on legislating against unhealthy foods compared with Switzerland where there was opposition towards regulation of individual's choices. To curb the increasing prevalence of obesity, allocation of responsibility needs to be considered and initiatives enacted accordingly. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Public policy and media frames: the debate over migration in Brazil

    Directory of Open Access Journals (Sweden)

    Augusto Veloso Leão

    2013-04-01

    Full Text Available The main goal of this article is to provide a good basis to assess the way media frames are embedded in a wider social scenario, and how public and political preferences can be researched through media debate. The methodology adopted allows for an analysis of newspaper articles that can show broader trends of the debate and serve as a thermometer to measure public debate. It can further highlight details and enable in-depth analyses of media discourse. The article explores the interconnectedness of media debate and policy-making process by means of the analysis of articles published in a Brazilian newspaper between 2009 and 2010. Quantitative and qualitative methodologies are employed to identify the frames used in media and to offer insights of their relationship with the political debate. The ongoing political debate has raised attention to the issue of migration, with a great numbers of actors expressing very diverse points of view. A broader public debate has been initiated and some portions of it find voice in different means of communication. The paper argues that changes in the public and in the media debate are a response to changes in the political debate, while at the same time the first two also help to outline the latter.

  5. Energy policy seesaw between security and protecting the environment

    International Nuclear Information System (INIS)

    Finon, D.

    1994-01-01

    It is just the price of oil that causes the energy policies of importing countries to vacillate. Changing perceptions of energy supply factors has had as much to do with transfiguring government action modes since 1973 as has the idea of the legitimacy of that action. The present paper thus draws a parallel between the goal of energy security twenty years ago and that of global environmental protection today, which explains the critical reversion to a view of minimum government action in the energy field - a view that marked the eighties. (author). 20 refs

  6. Science and Security Policy: The Case of Advanced Pathogens

    International Nuclear Information System (INIS)

    Harris, E. D.

    2007-01-01

    The revolution in biotechnology presents unprecedented opportunities and dangers for the health and well being of mankind. Today, one can plausibly imagine the eradication of many historic diseases. One can also envisage the creation of new diseases that would endanger a substantial proportion of the entire human species. As powerful applications for biotechnology research are identified, appropriate arrangements for managing their extraordinary consequences will inevitably become necessary. This presentation will explore recent efforts to balance science and security policy in the area of advanced biotechnology research. Key developments on the dual-use issue will be discussed, together with a variety of governance options aimed at mitigating the risk from such research. (author)

  7. ROMANIA AND THE EU'S COMMON FOREIGN AND SECURITY POLICY

    Directory of Open Access Journals (Sweden)

    Daniel Călin

    2003-03-01

    Full Text Available Within this article, the author tries to sum up the most salient steps undertaken by Romania on the way to the EU, with respect to an area of particular importance for the Union, i.e. CFSP. After a presentation on its actions in CFSP area, one reviews in short the stances adopted by Romania vis-à-vis the new child of EU policies, i.e. ESDP, as well as towards the Romanian involvement / participation in military crisis management. In the end, the European security policy and the enlargement of both the EU and NATO are assessed in the light of the coming IGC and against the background of the 9/11 events.

  8. FRAMING AS LEGITIMATION OF CLIMATE POLICY. CLIMATE CHANGE FRAMES IN ARGENTINIAN AND BRAZILIAN PRESS DURING THE SUMMITS OF DOHA AND WARSAW

    Directory of Open Access Journals (Sweden)

    Luis González Alcaraz

    2014-06-01

    Full Text Available The article aims to describe and compare journalistic frames of climate change produced by two leading newspapers in South America: Clarin of Argentina and Folha de São Paulo of Brazil, in the context of the Doha (COP- 18 and Warsaw (COP -19 conferences. For this, it has used a definition of framing which recognizes its various dimensions: definition of the situation, reasoning about causes, moral evaluations and recommendations or prescriptions. The analysis was addressed by a qualitative process of coding and classification of journalistic texts. The empirical results indicate that the frames produced for the newspapers correspond to the political context to which they belong, that they coincide in pointing to climate change as a serious problem caused primarily by industrialized countries and what must be faced with a sense of urgency, so they tend to legitimate climate policy. In this regard, it is noted that journalistic frames not only guide the interpretation of social problems, but legitimate political action.

  9. Changing policy framing as a deliberate strategy for public health advocacy: a qualitative policy case study of minimum unit pricing of alcohol.

    Science.gov (United States)

    Katikireddi, Srinivasa Vittal; Bond, Lyndal; Hilton, Shona

    2014-06-01

    Scotland is the first country in the world to pass legislation introducing a minimum unit price (MUP) for alcohol in an attempt to reduce consumption and associated harms by increasing the price of the cheapest alcohol. We investigated the competing ways in which policy stakeholders presented the debate. We then established whether a change in framing helped explain the policy's emergence. We conducted a detailed policy case study through analysis of evidence submitted to the Scottish parliament, and in-depth, one-to-one interviews (n = 36) with politicians, civil servants, advocates, researchers, and industry representatives. Public- and voluntary-sector stakeholders tended to support MUP, while industry representatives were more divided. Two markedly different ways of presenting alcohol as a policy problem were evident. Critics of MUP (all of whom were related to industry) emphasized social disorder issues, particularly among young people, and hence argued for targeted approaches. In contrast, advocates for MUP (with the exception of those in industry) focused on alcohol as a health issue arising from overconsumption at a population level, thus suggesting that population-based interventions were necessary. Industry stakeholders favoring MUP adopted a hybrid framing, maintaining several aspects of the critical framing. Our interview data showed that public health advocates worked hard to redefine the policy issue by deliberately presenting a consistent alternative framing. Framing alcohol policy as a broad, multisectoral, public health issue that requires a whole-population approach has been crucial to enabling policymakers to seriously consider MUP, and public health advocates intentionally presented alcohol policy in this way. This reframing helped prioritize public health considerations in the policy debate and represents a deliberate strategy for consideration by those advocating for policy change around the world and in other public health areas. © 2014

  10. Changing Policy Framing as a Deliberate Strategy for Public Health Advocacy: A Qualitative Policy Case Study of Minimum Unit Pricing of Alcohol

    Science.gov (United States)

    Katikireddi, Srinivasa Vittal; Bond, Lyndal; Hilton, Shona

    2014-01-01

    Context Scotland is the first country in the world to pass legislation introducing a minimum unit price (MUP) for alcohol in an attempt to reduce consumption and associated harms by increasing the price of the cheapest alcohol. We investigated the competing ways in which policy stakeholders presented the debate. We then established whether a change in framing helped explain the policy's emergence. Methods We conducted a detailed policy case study through analysis of evidence submitted to the Scottish parliament, and in-depth, one-to-one interviews (n = 36) with politicians, civil servants, advocates, researchers, and industry representatives. Findings Public- and voluntary-sector stakeholders tended to support MUP, while industry representatives were more divided. Two markedly different ways of presenting alcohol as a policy problem were evident. Critics of MUP (all of whom were related to industry) emphasized social disorder issues, particularly among young people, and hence argued for targeted approaches. In contrast, advocates for MUP (with the exception of those in industry) focused on alcohol as a health issue arising from overconsumption at a population level, thus suggesting that population-based interventions were necessary. Industry stakeholders favoring MUP adopted a hybrid framing, maintaining several aspects of the critical framing. Our interview data showed that public health advocates worked hard to redefine the policy issue by deliberately presenting a consistent alternative framing. Conclusions Framing alcohol policy as a broad, multisectoral, public health issue that requires a whole-population approach has been crucial to enabling policymakers to seriously consider MUP, and public health advocates intentionally presented alcohol policy in this way. This reframing helped prioritize public health considerations in the policy debate and represents a deliberate strategy for consideration by those advocating for policy change around the world and in

  11. QUING WHY paper: Framing gender intersections in the European Union: what implications for the quality of intersectionality in policies?

    DEFF Research Database (Denmark)

    Agustin, Lise Rolandsen; Lombardo, Emanuela

    This paper explores the extent to which the emergence of an anti-discrimination policy in the European Union (EU) implies a shift in EU gender equality policies towards an intersectional approach. The frame analysis of EU gender equality policy documents shows that intersectional dimensions...... are increasingly present but they are treated implicitly and from a separate perspective, and the inclusion of a wide range of inequalities often implies a degendering of the policy content. We assess the implications of the identified intersectionality trends for the quality of intersectionality in gender...

  12. Framing in policy processes: a case study from hospital planning in the National Health Service in England.

    Science.gov (United States)

    Jones, Lorelei; Exworthy, Mark

    2015-01-01

    This paper reports from an ethnographic study of hospital planning in England undertaken between 2006 and 2009. We explored how a policy to centralise hospital services was espoused in national policy documents, how this shifted over time and how it was translated in practice. We found that policy texts defined hospital planning as a clinical issue and framed decisions to close hospitals or hospital departments as based on the evidence and necessary to ensure safety. We interpreted this framing as a rhetorical strategy for implementing organisational change in the context of community resistance to service closure and a concomitant policy emphasising the importance of public and patient involvement in planning. Although the persuasive power of the framing was limited, a more insidious form of power was identified in the way the framing disguised the political nature of the issue by defining it as a clinical problem. We conclude by discussing how the clinical rationale constrains public participation in decisions about the delivery and organisation of healthcare and restricts the extent to which alternative courses of action can be considered. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Framing, Ideology and Evidence: Uganda's HIV Success and the Development of PEPFAR's "ABC" Policy for HIV Prevention

    Science.gov (United States)

    Parkhurst, Justin O.

    2012-01-01

    Cognitive framing theories explain how individuals understand and apply information in relation to existing experiences and beliefs. Yet these theories have rarely been applied to explore the interpretation and application of evidence in policy development. This paper undertakes a critical discourse analysis of interviews and texts surrounding a…

  14. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  15. Social movement heterogeneity in public policy framing: A multi-stakeholder analysis of the Keystone XL pipeline

    Science.gov (United States)

    Wesley, David T. A.

    In 2011, stakeholders with differing objectives formed an alliance to oppose the Keystone XL heavy oil pipeline. The alliance, which came to be known as "Tar Sands Action," implemented various strategies, some of which were more successful than others. Tar Sands Action was a largely heterogeneous alliance that included indigenous tribes, environmentalists, ranchers, landowners, and trade unions, making it one of the more diverse social movement organizations in history. Each of these stakeholder categories had distinct demographic structures, representing an array of racial, ethnic, educational, occupational, and political backgrounds. Participants also had differing policy objectives that included combating climate change and protecting jobs, agricultural interests, water resources, wildlife, and human health. The current dissertation examines the Tar Sands Action movement to understand how heterogeneous social movement organizations mobilize supporters, maintain alliances, and create effective frames to achieve policy objectives. A multi-stakeholder analysis of the development, evolution and communication of frames concerning the Keystone XL controversy provides insight into the role of alliances, direct action, and the news media in challenging hegemonic frames. Previous research has ignored the potential value that SMO heterogeneity provides by treating social movements as culturally homogenous. However, diversity has been shown to affect performance in business organizations. The current study demonstrates that under some circumstances, diversity can also improve policy outcomes. Moreover, policy frames are shown to be more effective in sustaining news media and public interest through a process the author calls dynamic frame sequencing (DFS). DFS refers to a process implementing different stakeholder frames at strategically opportune moments. Finally, Tar Sands Action was one of the first SMOs to rely heavily on social media to build alliances, disseminate

  16. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  17. private military and security companies: ethics, policies and civil ...

    African Journals Online (AJOL)

    hennie

    International, regional and national security, as well as the security of the individual is increasingly entwined in services provided by private military and security contractors. The editors accordingly acknowledge that “… [the] astonishing growth of private and security companies (PMSCs) is clearly one of the most noteworthy.

  18. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  19. Security Policy Configuration Analysis for Web Services on Heterogeneous Platforms

    Science.gov (United States)

    Hongbin, Ji; Fengyu, Zhao; Tao, Xu

    With the rapid development of web services, message security of web services between heterogeneous platforms is increasingly prominent. As two popular web services platforms, Apache Axis2 and Microsoft .Net, have their own security module respectively (Rampart, WSE). Due to differences in platform security mechanisms, it is difficult to build a secure web services communications between different platforms. This paper firstly introduces the Apache Axis2 and. Net platforms, and then analyzes their differences of security mechanism on these two platforms. Finally, followed by a typical secure case, a series of steps are designed and tested in order to realize secure web service invocation on heterogeneous platforms.

  20. Policy and strategy of the Cuban Regulatory Organization for the establishment of the legal and regulation frame

    International Nuclear Information System (INIS)

    Arnau F, A.; Alonso G, I.; Sarabia M, I.

    2006-01-01

    The National Center of Nuclear Security, Cuban entity authorized to exercise the regulation functions and control of the security of the use of the nuclear energy and the accounting and control of the nuclear materials, has among its functions, to elaborate and to propose for its approval to the corresponding instances, the juridical, technical dispositions and of procedure in its competition sphere, what demands that in this sense clear guidelines exist to carry out this social mission. The fact of assuming this function demands the necessity of a Politics for the establishment of the legal and regulation frame that expresses in a coherent way the general lines on those that it behaves the elaboration of the standards that govern this activity, to reach the end in an efficient and effective way and consequently the adoption of a Strategy that frames the necessary actions that assure the one execution and development of the politics and the pursuit of the precise rules for an optimal result. The Politics for the establishment of the legal and regulation frame of the National Center of Nuclear Security is based on a group of general principles that mark the guidelines so that this activity is chord to the national juridical system, to the good ones international practices and the recommendations of the International Atomic Energy Agency appropriated to the national experience and the daily reality, being this a transparent and reconciled process in such a way that the addressee of these standards can contribute their recommendations to the ends of achieving an effective applicability of the legal and regulation frame that governs this activity in the country. The development and pursuit of these principles is sustained in a group of actions to the help of the strategy for the establishment of the legal and regulation frame, embracing the actions so much during the process of elaboration of the legal frame, its systematic revision, the publication and distribution

  1. 34 CFR 668.46 - Institutional security policies and crime statistics.

    Science.gov (United States)

    2010-07-01

    ... Institutional and Financial Assistance Information for Students § 668.46 Institutional security policies and... security of and access to campus facilities, including campus residences, and security considerations used... concerning who should be contacted, the importance of preserving evidence for the proof of a criminal offense...

  2. Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We consider the use of Aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. We follow the approach of attaching security policies to the relevant locations that must be governed by them, and then combining them at runtime according to the interactions...... policies in a distributed system, either with or without exploring the entire state space....... has the capability of combining both history-sensitive and future-sensitive policies, providing even more flexibility and power. Moreover, we propose a global Logic for reasoning about the systems designed with this language. We show how the Logic can be used to validate the combination of security...

  3. The presidential politics of climate discourse: energy frames, policy, and political tactics from the 2016 Primaries in the United States

    OpenAIRE

    Brown, George; Sovacool, Benjamin K

    2017-01-01

    his study presents the results of an investigation into the frequency in which four candidates of the 2016 United States Presidential Primary season communicated their political positions on climate change, and how they subsequently framed these stances in numerous contextual drivers alongside energy policies. A systematic content analysis of political debates, campaign speeches, and press statements reveals how Hillary Clinton, Bernie Sanders, Donald Trump, and Ted Cruz undertook in vote-see...

  4. Message framing in the context of the national menu-labelling policy: a comparison of public health and private industry interests.

    Science.gov (United States)

    Shelton, Rachel C; Colgrove, James; Lee, Grace; Truong, Michelle; Wingood, Gina M

    2017-04-01

    We conducted a content analysis of public comments to understand the key framing approaches used by private industry v. public health sector, with the goal of informing future public health messaging, framing and advocacy in the context of policy making. Comments to the proposed menu-labelling policy were extracted from Regulations.gov and analysed. A framing matrix was used to organize and code key devices and themes. Documents were analysed using content analysis with Dedoose software. Recent national nutrition-labelling regulations in the USA provide a timely opportunity to understand message framing in relation to obesity prevention and policy. We examined a total of ninety-seven documents submitted on behalf of organizations (private industry, n 64; public health, n 33). Public health focused on positive health consequences of the policy, used a social justice frame and supported its arguments with academic data. Industry was more critical of the policy; it used a market justice frame that emphasized minimal regulation, depicted its members as small, family-run businesses, and illustrated points with humanizing examples. Public health framing should counter and consider engaging directly with non-health-related arguments made by industry. Public health should include more powerful framing devices to convey their messages, including metaphors and humanizing examples.

  5. 76 FR 50407 - Addition of Persons Acting Contrary to the National Security or Foreign Policy Interests of the...

    Science.gov (United States)

    2011-08-15

    ... to the national security or foreign policy interests of the United States. These persons will be... national security or foreign policy interests of the United States) of the EAR. Second, this rule... security or foreign policy interests of the United States and those acting on behalf of such persons may be...

  6. The framing of unconventional natural gas resources in the foreign energy policy discourse of the Russian Federation

    International Nuclear Information System (INIS)

    Ocelík, Petr; Osička, Jan

    2014-01-01

    The advent of unconventional resources of natural gas has altered the order on global as well as continental gas markets. With rising liquidity, the position of established dominant suppliers is eroding. We focus on the initial response of Russia, the leading supplier of natural gas to Europe, to the new situation, building the research on unit-level constructivism and discourse analysis. We use frame analysis to reveal what image of unconventional resources was constructed in Russian foreign energy policy discourse (FEPD) in the period between 2009 and 2011, when the “unconventional revolution” did not yet have any sharp contours. We conclude that in Russian FEPD the unconventionals are considered as a distinctive and inferior source of energy compared to conventional natural gas. Emphasis is put on their economic irrationality and environmental hazards. The bottom line of the discourse is the idea that there is a choice between conventional and unconventional sources, with this choice being framed as one between good and bad, or right and wrong. - Highlights: • We examine the image of “unconventional gas” in Russian foreign energy policy discourse. • Two main frames (reliable supplier and triumphant natural gas) were identified. • Two main argumentation schemes (economic and environmental) were identified. • The “unconventional gas” is defined as a mistaken and inferior source of energy

  7. What explains the change of european security policy? : an analysis of European security and defence policy (ESDP) after september 11th 2001

    OpenAIRE

    Haugsdal, Roar

    2005-01-01

    The focus and aim of this thesis is to explain the mechanisms that lead to a change in European Security and Defence Policy (ESDP) after September 11th 2001. Since ESDP was declared operational in Laeken in December 2001 there have been several changes which in sum seem to indicate that the EU now has the tools and the capabilities to act as a security policy actor on its own. The treaty of Nice, which was implemented in 2003, provided ESDP with new agencies and institutions. In 2003, the Ber...

  8. Aviation Security: Background and Policy Options for Screening and Securing Air Cargo

    Science.gov (United States)

    2008-02-25

    today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...that the results of these pilot tests will be provided to the TSA in FY2009 to aid in decisions regarding the technology approach to be taken to meet...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security

  9. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  10. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

    Science.gov (United States)

    Telecommunications Policy Research Conference, Inc., Washington, DC.

    In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…

  11. Expanding the Proliferation Security Initiative: A Legal and Policy Analysis

    Science.gov (United States)

    2010-02-01

    13 Sharp, Walter G. “Proliferation Security Initiative: The Legacy of Operacion Socotora.” 16 Transnational Law and...Gregory S. Jones. U.S. Combat Commands’ Participation in the Proliferation Security Initiative: A Training Manual . Washington, DC: RAND National Defense

  12. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  13. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Christians (mostly foreign residents) in Kuwait: Protestant, Roman Catholic , Greek Catholic (Melkite), Coptic Orthodox, Armenian Orthodox, Greek...Shiites have historically been well integrated into politics and society. In 2010, Kuwait arrested 27...kuwait-charges-terror-cell-tied-iran-hezbollah-150901134517950.html. 31 http://www.criticalthreats.org/gulf-aden-security- review /gulf-aden-security

  14. French Security Policy After the Cold War: Continuity, Change, and Implications for the United States

    National Research Council Canada - National Science Library

    Gordon, Philip

    1992-01-01

    ... has not changed. Section 2 reviews the main elements of French security policy since the early 196Os and examines the geopolitical, diplomatic, and fiscal pressures that many believe will force France to modify...

  15. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  16. (Inefficiency of EU Common Foreign and Security Policy: Ukraine, Brexit, Trump and beyond

    Directory of Open Access Journals (Sweden)

    Filipec Ondřej

    2017-10-01

    Full Text Available The main aim of this article is to explore and analyze key determinants of EU Common Foreign and Security Policy efficiency. For this purpose a 3C analytical approach is used, exploring EU foreign and security policy consistency, capacities and the dimension of cooperation. Article analyzes both horizontal and vertical, consistency of EU Foreign and Security policy especially with connection to Ukraine crises and diverging interests of EU member states. EU capacities are explored with main focus on military spending and challenges related to limited spending. EU military decline is put in contrast with new emerging regional powers. In the area of cooperation article is dedicated mainly to ineffective partnership with Turkey, cold attitude of Trump administration towards Europe and the implications of Brexit for EU foreign and security policy.

  17. Foreign Policy and a State's Hierarchy of Needs: DOD and the New Security Strategy

    National Research Council Canada - National Science Library

    Olwell, Timothy

    1995-01-01

    ....' First, fascist aggression sought world domination, and war resulted. Then, the security of the United States was clearly tied to blocking the spread of communism through a national policy of containment...

  18. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  19. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  20. Implementation of information security policies in public organizations : Top management as a success factor

    OpenAIRE

    Kamariza, Yvette

    2017-01-01

    The purpose of this thesis is to investigate potential success factors related to the implementation of an information security in organizations, with a specific focus on the role of top management in implementing information security policies in organizations. The following are the research questions: What are the factors related to the implementation of an information security in organization according to the literature and what is the organization’s view of these factors? What is the role ...

  1. Economics and National Security: Issues and Implications for U.S. Policy

    Science.gov (United States)

    2011-01-04

    156 Prepared by Dick K. Nanto, Specialist in Industry and Trade, Foreign Affairs, Defense, and Trade Division . 157 International Labour Office...security. The economy has always been there both to provide the funds and materiel for defense and to provide economic security for most households ...Foreign Affairs, Defense, and Trade Division . Economics and National Security: Issues and Implications for U.S. Policy Congressional Research

  2. Assessing the impact of information and framing on support for climate policy action

    International Nuclear Information System (INIS)

    Hatfield-Dodds, Steve

    2007-01-01

    Full text: A significant share of the public appears mislead by the way the economic impacts of emissions reductions are traditionally communicated. This misunderstanding is associated with reduced support for policy action, and risks long term climate impacts that would be avoided if results were communicated properly. Correct this basis appears likely to have a larger effect on attitudes than new research and information on the impacts of climate change. Government action to achieve deep cuts in greenhouse gas emissions - like other major policy changes -depends on public support, which in turn depends on perceptions of policy impacts. This paper reports research exploring the effect of three factors on support for policy action: the way that policy impacts are described; the magnitude of these impacts, and additional information on climate change impacts, provided internally through the surveys and externally through the release of An Inconvenient Truth and media coverage of the Stern Report (2006). The research used split sample phone and internet surveys (n = 4264) conducted in Australia and New Zealand in four waves from April to December 2006. The study gives rise to four major findings: Support for policy action is sensitive to the magnitude of expected economic impacts, with predicted support varying from 27% to 84% across the different levels of policy impact presented; Current approaches to communicating policy impacts are associated with public support for policy action being 8-10% lower than it would be if policy impacts were well communicated. This bias may be corrected by describing policy impacts in terms of changes relative to current levels - stating that incomes continue to rise - as well as describing impacts relative to the base case; The reduction in support associated with these biases is much larger than the increase in support associated with providing credible additional information on the impacts of climate change; Significantly more than

  3. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  4. U.S. Security Policies in the Western Pacific

    National Research Council Canada - National Science Library

    Niksch, Larry A

    2005-01-01

    ... it: North Korea as an emerging nuclear weapons state, Japan's enlarging security role, Islamic terrorism in Southeast Asia, and volatile political attitudes toward the United States in countries once thought to be reliable allies.

  5. Economic Assistance and Security. Rethinking U. S. Policy,

    Science.gov (United States)

    1982-01-01

    dwellers have broken the cultural ties to their villages, their resulting alienation and anomie begin to reap a toll of violence, terror, and social...the past innovative ideas in development theory and aid policy-program lending linked to aggregate policy changes, flexibility on local cost...close to two decades ago in his essay "Preface to a Political Theory of Foreign Aid," in which he wrote that our policy of foreign aid "has been conceived

  6. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD Scheme.

    Directory of Open Access Journals (Sweden)

    Tarik Idbeaa

    Full Text Available This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD. Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  7. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    Science.gov (United States)

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  8. Constitutional Limits of the EU’s Common Foreign and Security Policy

    DEFF Research Database (Denmark)

    Butler, Graham

    The Common Foreign and Security Policy (CFSP) of the European Union (EU) is a highly exceptional component of the EU legal order. This constitutionalised foreign policy regime, with legal, diplomatic and political DNA woven throughout its fabric, is a distinct sub-system of law on the outer...

  9. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  10. Iran: Politics, Gulf Security, and U.S. Policy

    Science.gov (United States)

    2016-03-30

    press for their right to celebrate their culture and history . The government accuses them of promoting revolution or separatism. Kurds There are...United States has supported programs to promote civil society in Iran, but successive U.S. administrations have stopped short of adopting policies...U.S. Policy Congressional Research Service Contents Political History

  11. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    adresses “food security” and “climate change”. By ensuring nutrition is explicit in their policies the agriculture, health, environment and education sectors can develop more coherent policies to prevent unintentional harm and achieve their goals. For example investing in gender equality can help to reduce...

  12. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo; Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui

    2007-01-01

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants

  13. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  14. How social movements influence policies : Advocacy, framing, emotions and outcomes among reproductive rights coalitions in Peru.

    OpenAIRE

    Coe, Anna-Britt

    2010-01-01

    With its origins in the early 1990s, feminist advocacy directed at influencing public policies is a relatively new phenomenon in Latin America that is commonly studied at the national level. The aim of this thesis was to study feminist advocacy on reproductive rights at the sub-national level in Peru. Specifically, it explored two research questions: how do feminist movements carry out advocacy to intervene with government agencies and what effects does their advocacy have on policies. This a...

  15. Framing energy efficiency and renewable energy policies: An international comparison between Mexico and China

    International Nuclear Information System (INIS)

    Valenzuela, Jose Maria; Qi, Ye

    2012-01-01

    This essay compares national strategies on mitigation of GHG emissions for Mexico and China. This state-centered analysis stresses the importance of the interaction between international commitments, the disposition of internal interest of economy-wide actors, and the legacies of policy making and institutions, particularly in relation to economic development and central–local government relations. This research does not attempt to classify institutions according to their effectives to foster climate change policies, but rather explores specific circumstances for climate change policy making on developing countries. Contrary to international proposal to find a generic optimal policy choice, the research explored the relevance of certain political and economic institutions that can be present in other national cases. It shows that the legacies on liberalization and state retreat undermine the state ability to effectively engage with the economic actors on decisions and management. Likewise regular engagement with them undermines the state affinity towards pursuing economic efficient solutions. The relevance of adequate system of incentives for local government to engage in an agenda that is, by nature, adopted by the central government. - Highlights: ► We compared China and Mexico CO 2 emissions potentials and strategies on energy. ► Cost abatement curves were used to induce societal interest. ► Policies on management decision are effective but not clearly efficient. ► Policies that stress efficiency face serious limitations of scope. ► Centrally provided incentives are highly required for local governments action.

  16. The Minimum Food Security Quota (MFS-Quota) in Food Security Policy Modelling

    OpenAIRE

    Mario Arturo Ruiz Estrada

    2010-01-01

    This paper proposes the construction of the Minimum Food Security Quota (MFSQuota)using mathematical economic modelling in real time. The MFS-Quota fixes a certain amount of annual food storage to prepare a country for any natural or social disasters. Any country can construct its own MFS-Quota for “food security policy”.

  17. Co-opting human security and deductions for security policy-making ...

    African Journals Online (AJOL)

    Its conceptual basis derives from the inadequacy of the state-centric conception of security to comprehensively address threats to people, particularly those of a non-military nature. Despite agreement over the importance of making the individual the referent object of security, specific threats that should be considered under ...

  18. A novel technique to secure the Rigid External Distraction (RED) frame in a thin skull allowing sutural mid-face distraction.

    Science.gov (United States)

    Dobbs, Thomas D; Wall, Steven A; Richards, Peter G; Johnson, David

    2014-10-01

    Distraction osteogenesis (DO) has revolutionised the treatment of mid-face hypoplasia in children, allowing advancement of the mid-face in excess of that achievable by traditional Le Fort III osteotomy. One method of performing DO is to use an externally applied frame, such as the Rigid External Distraction (RED) frame. However, at young ages the cranial bone is often too weak to support the frame, preventing its safe use. We present the case of a patient with Crouzon syndrome who required mid-face distraction at 4-months of age due to severe exorbitism, raised intracranial pressure and airway compromise. In order to allow safe application of an external distraction frame laminated bone grafts were secured to the cranium at the areas of frame pin insertion. We believe this to be the first reported case of the use of the patients own cranial bone to create laminated bone grafts and thicken the site of pin insertion. The method described adds to the armamentarium of the surgeon treating these patients who require placement of an external distraction frame for DO at a young age where the thickness of the cranial bone may otherwise prevent safe application. Copyright © 2014 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  19. Global Warming: Its Implications for U.S. National Security Policy

    Science.gov (United States)

    2009-03-19

    The approach to this topic will be to look at the science behind anthropogenic global warming . Is man largely responsible for causing global warming due...paper will then investigate the nexus between global warming and U.S. national security policy. It will address the challenges facing U.S. leaders and...policy makers as they tackle the issue of global warming and its implications for U.S. policy. Finally it will conclude with recommendations for those

  20. The Warriors Future Directions in Japanese Security Policies

    National Research Council Canada - National Science Library

    Levin, Norman

    1993-01-01

    .... We focused on two key areas in making our assessment: the broad policy trends in Japan and Japanese perspectives on evolving regional and global developments, and the force structure and operational capabilities of Japan's Self-Defense Forces (SDF...

  1. Information System Security: Army Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Policy requires heads of DoD Components to establish a process to identify appropriate information for posting to Web sites and to review all information placed on publicly accessible Web sites...

  2. Support for Multi-Level Security Policies in DRM Architectures

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.

    2004-01-01

    Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of

  3. Iran: Politics, Gulf Security, and U.S. Policy

    Science.gov (United States)

    2016-08-19

    state-controlled “Workers’ House” umbrella. In 2014, Iran ratified an additional International Labour Organization convention. A bus drivers’ union...Factbook; various press; IMF; Iran Trade Planning Division ; CRS conversations with experts and foreign diplomats. Iran: Politics, Gulf Security, and

  4. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2017-09-29

    State Department spokesman John Kirby. “Lifting Holds on Security Assistance to the Government of Bahrain.” June 29, 2015. 62 Nicole Gaouette. “U.S...family were long buried . Two smaller islands, Janan and Hadd Janan, were ruled not part of the Hawar Islands group and were also awarded to Qatar

  5. Reflections on the cost of "low-cost" whole genome sequencing: framing the health policy debate.

    Directory of Open Access Journals (Sweden)

    Timothy Caulfield

    2013-11-01

    Full Text Available The cost of whole genome sequencing is dropping rapidly. There has been a great deal of enthusiasm about the potential for this technological advance to transform clinical care. Given the interest and significant investment in genomics, this seems an ideal time to consider what the evidence tells us about potential benefits and harms, particularly in the context of health care policy. The scale and pace of adoption of this powerful new technology should be driven by clinical need, clinical evidence, and a commitment to put patients at the centre of health care policy.

  6. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  7. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  8. Framing ICT, Teachers and Learners in Australian School Education ICT Policy

    Science.gov (United States)

    Jordan, Kathy

    2011-01-01

    It is well over 20 years since information and communication technologies (ICT) was first included as part of a future vision for Australia's schools. Since this time numerous national policies have been developed, which collectively articulate an official discourse in support of a vision for ICT to be embedded in our schools, and routinely used…

  9. Language Policy-Making in Multilingual Education: Mass Media and the Framing of Medium of Instruction

    Science.gov (United States)

    Tollefson, James W.

    2015-01-01

    In some settings, medium of instruction (MOI) policies in multilingual education break out into public debates in mass media involving politicians, business leaders, government officials, parents, and school children. These public discussions of MOI often index struggles over the distribution of political power and economic resources, and issues…

  10. Challenges of EU Security on the Example of Cybeterrorism Policy

    Directory of Open Access Journals (Sweden)

    Izabela Oleksiewicz

    2015-06-01

    Full Text Available In addition to traditional threats to information as spying or leaking state secrets and business secrets appeared the new threats, among which the most dangerous is cyberterrorism. Taking into account the problems of cyber-terrorism, includes, in particular, the analysis of legislation aimed at ensuring the security of information systems of individual countries particular, this subject should be also recognized as requiring at the present time the insightful analysis. Therefore, this publication is an attempt of characteristics the determinants of this phenomenon and analysis of the latest legal solutions in the fight against cyber terrorism within the European Union. Moreover, it was made the attempt to find an answer to the question whether the current legal solutions of the European Union in the area of security are an effective tool in the fight against cyberterrorism.

  11. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  12. Linking research and food security policies in MENA | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... HL: The key is for research to be guided from the outset to respond to development challenges — like food security. For this to happen research organizations need to work in partnership with those who will benefit, such as rural farmers and producers, along with civil society and government agencies.

  13. The Development of Public Policies to Address Non-communicable Diseases in the Caribbean Country of Barbados: The Importance of Problem Framing and Policy Entrepreneurs.

    Science.gov (United States)

    Unwin, Nigel; Samuels, T Alafia; Hassell, Trevor; Brownson, Ross C; Guell, Cornelia

    2016-06-15

    Government policy measures have a key role to play in the prevention and control of non-communicable diseases (NCDs). The Caribbean, a middle-income region, has the highest per capita burden of NCDs in the Americas. Our aim was to examine policy development and implementation between the years 2000 and 2013 on NCD prevention and control in Barbados, and to investigate factors promoting, and hindering, success. A qualitative case study design was used involving a structured policy document review and semi-structured interviews with key informants, identified through stakeholder analysis and 'cascading.' Documents were abstracted into a standard form. Interviews were recorded, transcribed verbatim and underwent framework analysis, guided by the multiple streams framework (MSF). There were 25 key informants, from the Ministry of Health (MoH), other government Ministries, civil society organisations, and the private sector. A significant policy window opened between 2005 and 2007 in which new posts to address NCDs were created in the MoH, and a government supported multi-sectoral national NCD commission was established. Factors contributing to this government commitment and funding included a high level of awareness, throughout society, of the NCD burden, including media coverage of local research findings; the availability of policy recommendations by international bodies that could be adopted locally, notably the framework convention on tobacco control (FCTC); and the activities of local highly respected policy entrepreneurs with access to senior politicians, who were able to bring together political concern for the problem with potential policy solutions. However, factors were also identified that hindered multi-sectoral policy development in several areas, including around nutrition, physical activity, and alcohol. These included a lack of consensus (valence) on the nature of the problem, often framed as being predominantly one of individuals needing to take

  14. The Development of Public Policies to Address Non-communicable Diseases in the Caribbean Country of Barbados: The Importance of Problem Framing and Policy Entrepreneurs

    Science.gov (United States)

    Unwin, Nigel; Samuels, T. Alafia; Hassell, Trevor; Brownson, Ross C.; Guell, Cornelia

    2017-01-01

    Background: Government policy measures have a key role to play in the prevention and control of non-communicable diseases (NCDs). The Caribbean, a middle-income region, has the highest per capita burden of NCDs in the Americas. Our aim was to examine policy development and implementation between the years 2000 and 2013 on NCD prevention and control in Barbados, and to investigate factors promoting, and hindering, success. Methods: A qualitative case study design was used involving a structured policy document review and semi-structured interviews with key informants, identified through stakeholder analysis and ‘cascading.’ Documents were abstracted into a standard form. Interviews were recorded, transcribed verbatim and underwent framework analysis, guided by the multiple streams framework (MSF). There were 25 key informants, from the Ministry of Health (MoH), other government Ministries, civil society organisations, and the private sector. Results: A significant policy window opened between 2005 and 2007 in which new posts to address NCDs were created in the MoH, and a government supported multi-sectoral national NCD commission was established. Factors contributing to this government commitment and funding included a high level of awareness, throughout society, of the NCD burden, including media coverage of local research findings; the availability of policy recommendations by international bodies that could be adopted locally, notably the framework convention on tobacco control (FCTC); and the activities of local highly respected policy entrepreneurs with access to senior politicians, who were able to bring together political concern for the problem with potential policy solutions. However, factors were also identified that hindered multi-sectoral policy development in several areas, including around nutrition, physical activity, and alcohol. These included a lack of consensus (valence) on the nature of the problem, often framed as being predominantly one of

  15. Framing REDD+ at National Level: Actors and Discourse around Nepal’s Policy Debate

    Directory of Open Access Journals (Sweden)

    Rishi R. Bastakoti

    2017-02-01

    Full Text Available Forests and carbon sequestration have become fundamental themes in climate change mitigation. The idea of Reducing Emissions from Deforestation and forest Degradation (REDD+ has generated significant interest in forest governance from United Nations (UN climate strategies over the past decade. REDD+ was initially hailed as a smart and cost-effective way to mitigate climate change. As it is rolling out, ambiguities and controversies are increasingly surfacing to the stakeholders at different levels. Examining the forest governance of Nepal in detail, this research examines how relationships between national and local forest actors have changed, and how REDD+ discourses have evolved among them at the interface between global interests in carbon commodification on one hand, and local realities of community forestry on the other hand. To better understand these competing positions, the study uses a post-structural political ecology perspective with elements of discourse analysis. Using data from interviews with policy actors and members of three local community forest user groups, focus group discussions, policy event observations, and document reviews, this paper highlights how global forest carbon commodification has been affecting community forestry governance. It also illustrates different storylines that actors employ to influence policy discourse and REDD+ debates, indicating a considerable range of problem definitions and policy solutions of climate change among the actors. The analysis highlights the connection between power relationships and the evolution of discourses surrounding REDD+, and how an external discourse can reinforce or challenge local governance and the centralization of forest authority. As such, the research also offers a new application of discursive storylines to climate change discourse analysis across national and local scales. The findings emphasize the importance of a more open and transparent dialogue across Nepal

  16. Clashing frames: human rights and foreign policy in the Brazilian re-democratization process

    Directory of Open Access Journals (Sweden)

    João Henrique Roriz

    2017-11-01

    Full Text Available Abstract This article deals with the use of rights in the Brazilian foreign policy in the late 1970s. Two main arguments are advanced: there was a novel understanding of rights that clashed with the traditional statist one, and the Brazilian strategies were less a complete rebuttal of rights language and more a reading of rights as a possible threat to the Abertura process.

  17. Land Reform and Food Security | Sanusi | Economic and Policy ...

    African Journals Online (AJOL)

    Economic and Policy Review. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 14, No 4 (2008) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  18. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-05-04

    19 Performance on Countering Terrorism Financing / Islamic State...U.S. Policy Congressional Research Service 20 Performance on Countering Terrorism Financing / Islamic State Donations32 Some U.S.-Kuwait...terrorism financing . 39 Earlier, in June 2008, the Department of theTreasury froze the assets of a Kuwait-based charity—the Islamic Heritage Restoration

  19. Food security management Through Public Policy | Amani | African ...

    African Journals Online (AJOL)

    To this end, the paper argues that sectors other than agriculture should become prominent, thereby bringing to the fore issue such as employment generation, broad-based economic growth and sustainable development. In all of these good public policy is crucial. (Af. J. Finance and Management: 2002 11 (1): 1-15) ...

  20. US oil policy and energy security; Politique petroliere americaine et securite energetique

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    2002-05-15

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  1. Don't shoot the messenger: re-framing climate policy to respond to evolving science (Invited)

    Science.gov (United States)

    Allen, M. R.; Otto, F. E.; Otto, A.; Rayner, S.

    2013-12-01

    Lack of progress in mitigation policy, as atmospheric CO2 concentrations climb apparently inexorably past 400ppm, is often blamed on a failure to 'communicate the climate change message' effectively. A small but increasing number of commentators is arguing that the problem is not communication, but the way in which climate policy choices are framed. In particular, the overt politicization of climate science, with so-called 'belief in climate change' being invoked as automatically implying support for a global carbon price or cap-and-trade regime, or even as an argument for voting for specific parties, makes it increasingly difficult to discuss policy options in the light of evolving science. At the heart of the problem is the interpretation of the 'precautionary principle', which is widely invoked in climate policy as a response to scientific uncertainty: policies, it is argued, should be designed to be robust to the range of possible future climates, or to deliver the ';best' possible probability-weighted outcome. The problem with this approach is that it very often makes policy contingent on worst-case scenarios - such as the risk of high climate sensitivity or rapid non-linear climate change - which are often the most uncertain aspects of climate science and hence subject to frequent revision. To be relevant to policies that are based on mitigating worst-case risks, the scientific community is also required to focus on establishing what these risks are, leaving it open, unjustly but understandably, to the accusation of alarmism. Focusing on worst-case scenarios can also give the impression that the mitigation problem is unachievable, and the only option is short-term adaptation followed by geo-engineering. One way of reducing the politicization of climate science is to make policy explicitly contingent on the climate response, such that a high (or low) rate of anthropogenic warming over the coming decades is automatically met with an aggressive (or moderate

  2. Security policy analysis in network-attached optical disk storage system

    Science.gov (United States)

    Liu, Jun; Xie, Changsheng; Huang, Hao

    2005-09-01

    The network-attached optical disk storage system has the advantages of the network-attached storage system and the optical storage device. Due to the data reliability and the removability of the storage medium, this optical storage system is very effective on massive data providing and backup. Recently, achievements have been made in security models and policies in a distributed network system environment and the network-attached storage system environment. However, the relevant research is not enough in the network-attached optical disk storage system, especially in a network-attached optical disc device. So it is significant to analyze the security policy and setup a good security model for the network-attached optical disk storage system. This paper makes a theoretical analysis on the security policy in the network-attached optical disk storage system. Firstly, the difference of the network-attached optical disk storage system and the distributed network system environment is presented. The network-attached optical disk storage system is a special distributed network system, and to meet the requirements of the system security, we use the authentication and key exchange protocol method to decide who is authorized to have what access rights on which objects with respect to some security models and policies in compute system. Secondly, we compare the effect of several types of authentication and key distribution protocols in a distributed network system environment. Then we port these authentication and key exchange protocols on the network-attached optical disk storage system environment. Based on these analyses, this paper proposes a secure key management scheme for security services in the network-attached optical disk storage system over open networks. This scheme focuses on the framework for authentication and the centralized key management, and future work will focus on dynamic membership management.

  3. American Foreign Policy Think Tanks and their Views on Baltic Security

    Directory of Open Access Journals (Sweden)

    Boyd Jonathan A.

    2017-12-01

    Full Text Available Recent events have created a sense of urgency within the U.S. foreign policy establishment to update its strategy towards Russia. The Baltic states are seen to be particularly vulnerable and because of its NATO commitments and its history of underwriting security in the region, the U.S. is under pressure to develop an appropriate response. Policy and research institutes-or think tanks-are an important part of the U.S. foreign policy establishment, and given the influence they often have on American foreign policy, it is sensible for any student of Baltic security to evaluate the think tanks’ current perspectives on the viability and desirability of U.S. security commitments in the region. To that end, this article evaluates the outputs of twelve prominent U.S. foreign policy think tanks according to the views they expressed across four general groupings of issues: positions on U.S. grand strategy, perceptions of Moscow’s intentions and capabilities, assessments of NATO’s heath and its value to U.S. security, and the level of commitment to, and assessment of, the security vulnerabilities of the Baltic states. The findings dispel a common misperception that U.S. foreign policy think tanks are generally shifting towards a realist perspective on the Baltic states; they generally do not support U.S. retrenchment, most consider Russia as having revanchist motives, and as a whole support bolstering the defences of NATO’s easternmost flank. However, it would also be an exaggeration to conclude that the U.S. think tank community overall were staunch defenders of the Baltic states, as for many there is a prevailing inattentiveness to Baltic security issues.

  4. Policies and Processes for Social Inclusion: Using EquiFrame and EquIPP for Policy Dialogue Comment on "Are Sexual and Reproductive Health Policies Designed for All? Vulnerable Groups in Policy Documents of Four European Countries and Their Involvement in Policy Development".

    Science.gov (United States)

    MacLachlan, Malcolm; Mannan, Hasheem; Huss, Tessy; Munthali, Alister; Amin, Mutamad

    2015-11-16

    The application of EquiFrame in the analysis of sexual and reproductive health policies by Ivanova et al to a new thematic area, their selection of only some of the Core Concepts of human rights in health service provision and the addition of new vulnerable groups relevant to the purpose of their analysis, are all very welcome developments. We also applaud their application of EquiFrame to policies in countries where it has not previously been used, along with their use of interviews with policy-makers to produce a deeper understanding of policy processes. We argue that clear justification for the inclusion of additional, or replacement of some exiting vulnerable groups within EquiFrame should be accompanied by clear definitions of such groups, along with the evidence-base that justifies their classification as a vulnerable or marginalised group. To illustrate the versatility of EquiFrame, we summarise a range of ways in which it has been used across a number of regions; including a brief Case Study of its use to develop the National Health Policy of Malawi. While EquiFrame focuses on policy content, we preview a new policy analysis tool - Equity and Inclusion in Policy Processes (EquIPP) - which assesses the extent of equity and inclusion in broader policy processes. Together, EquiFrame and EquIPP can be used to help governments and civil society ensure that policies are addressing the much stronger emphasis on social inclusion, now apparent in the Sustainable Development Goals (SDGs). © 2016 by Kerman University of Medical Sciences.

  5. Distribution of Responsibility for Social Security and Labour Market Policy

    DEFF Research Database (Denmark)

    Madsen, Per Kongshøj

    assistance for non-members. The first tier is basically state-run system, while the second tier is administered by the municipalities. As for the performance of the Danish labour market, participation rates are quite high and although unemployment rates are relatively high and differentiated across groups......It is shown that legislation of unemployment insurance and active labour market policy is set by the national government. Legislation with respect to employment protection, however, is largely left to the social partners, i.e. the dismissal of salaried workers is regulated by a special piece...... of national law, while the rules for blue-collar workers are defined as part of the negotiations between the social partners. The Danish system of unemployment insurance and active labour market policy is a two-tier system: unemployment insurance for members of unemployment insurance funds and social...

  6. A review of management of infertility in Nigeria: framing the ethics of a national health policy

    Directory of Open Access Journals (Sweden)

    Akinloye O

    2011-08-01

    Full Text Available Oluyemi Akinloye1,2, Ernest J Truter21Department of Chemical Pathology, Reproductive and Molecular Endocrinology Unit, College of Health Sciences, Ladoke Akintola University of Technology, Osogbo, Osun State, Nigeria; 2Department of Biomedical Sciences, Faculty of Health and Wellness Science, Cape Peninsula University of Technology, Bellville Campus, Cape Town, South AfricaAbstract: Infertility has recently been construed to be a serious problem in sub-Saharan Africa. This problem seems to be viewed as of low priority with reference to the effective and efficient allocation of available health resources by national governments as well as by international donors sponsoring either research or service delivery in the public health sector. In this paper the problem of infertility in Nigeria is surveyed with a view to assessing the ethical dimension of proposals to manage infertility as a public sector priority in health care delivery. The population/individual and public/private distinction in the formulation of health policy has ethical implications that cannot simply be ignored and are therefore engaged in critically assessing the problem of infertility. Cost–utility analysis (such as Quality Adjusted Life-Year composite index in the management of infertility in Nigeria entails the need for caution relevant to the country's efforts to achieve Millennium Development Goals. This should remain the case whether the ethical evaluation appeals to utilitarian or contractarian (Rawlsian principles. The "worst off" category of Nigerians includes (1 underweight children less than 5 years of age, with special concern for infants (0–1 years of age and (2 the proportion of the population below a minimum level of dietary consumption. The Rawlsian ethic implies that any Federal Ministry of Health policy aimed at establishing public programs for infertility management can be considered a "fair" allocation and expenditure if, and only if, the situation for

  7. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2016-10-28

    force against protesters, since 2011, Administration policy has been to sell to Bahrain only those weapons systems that are tailored only for...people.”  “fairly” demarcated electoral boundaries.  reworking of laws on naturalization and citizenship.  combating financial and...on (1) redefining electoral districts; (2) a revised process for appointing the Shura Council; (3) giving the elected COR new powers to approve or

  8. US Policy Options Mitigating Venezuelan Sponsored Security Challenges

    Science.gov (United States)

    2009-03-12

    Democratic Action Party (Accion, Democratica - AD) and the Social Christian Party (Comite de Organizacion Politica Electoral Independiente-COPEI...because Chavez has been vehemently anti-American. At the other end of the spectrum, Chavez could use an engagement policy as a propaganda tool touting... propaganda needs in portraying the US as an international villain. He could easily plead Venezuela’s case in international forums with some degree of success

  9. Reluctant Partner: Indonesia’s Response to U.S. Security Policies

    Science.gov (United States)

    2003-03-01

    SPECIAL ASSESSMENT M A R C H 2 0 0 3 Asia -Pacific Responses to U.S. Security Policies Reluctant Partner: Indonesia’s Response to U.S. Security...Policies A N T H O N Y L . S M I T H Executive Summary ● Since the terrorist attacks of September 11, 2001, Indonesia — and Southeast Asia more...United States in the war against terrorism, the Indonesian population is not generally supportive. These differences are also found in the political elite

  10. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    International Nuclear Information System (INIS)

    Bang, Guri

    2010-01-01

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  11. The invisibility of men in South African violence prevention policy: national prioritization, male vulnerability, and framing prevention

    Science.gov (United States)

    van Niekerk, Ashley; Tonsing, Susanne; Seedat, Mohamed; Jacobs, Roxanne; Ratele, Kopano; McClure, Roderick

    2015-01-01

    Background South Africa has a significant violence problem. The exposure of girls and women to interpersonal violence is widespread, and the victimization of men, especially to severe and homicidal forms of aggression, is of considerable concern, with male homicide eight times the global rate. In the last two decades, there have been a plethora of South African policies to promote safety. However, indications suggest that the policy response to violence is not coherently formulated, comprehensive, or evenly implemented. Objective This study examines selected South African national legislative instruments in terms of their framing and definition of violence and its typology, vulnerable populations, and prevention. Design This study comprises a directed content analysis of selected legislative documents from South African ministries mandated to prevent violence and its consequences or tasked with the prevention of key contributors to violence. Documents were selected using an electronic keyword search method and analyzed independently by two researchers. Results The legislative documents recognized the high levels of violence, confirmed the prioritization of selected vulnerable groups, especially women, children, disabled persons, and rural populations, and above all drew on criminological perspectives to emphasize tertiary prevention interventions. There is a policy focus on the protection and support of victims and the prosecution of perpetrators, but near absent recognition of men as victims. Conclusions There is a need to broaden the policy framework from primarily criminological and prosecutorial perspectives to include public health contributions. It is likewise important to enlarge the conceptions of vulnerability to include men alongside other vulnerable groups. These measures are important for shaping and resourcing prevention decisions and strengthening primary prevention approaches to violence. PMID:26228996

  12. The invisibility of men in South African violence prevention policy: national prioritization, male vulnerability, and framing prevention

    Directory of Open Access Journals (Sweden)

    Ashley van Niekerk

    2015-07-01

    Full Text Available Background: South Africa has a significant violence problem. The exposure of girls and women to interpersonal violence is widespread, and the victimization of men, especially to severe and homicidal forms of aggression, is of considerable concern, with male homicide eight times the global rate. In the last two decades, there have been a plethora of South African policies to promote safety. However, indications suggest that the policy response to violence is not coherently formulated, comprehensive, or evenly implemented. Objective: This study examines selected South African national legislative instruments in terms of their framing and definition of violence and its typology, vulnerable populations, and prevention. Design: This study comprises a directed content analysis of selected legislative documents from South African ministries mandated to prevent violence and its consequences or tasked with the prevention of key contributors to violence. Documents were selected using an electronic keyword search method and analyzed independently by two researchers. Results: The legislative documents recognized the high levels of violence, confirmed the prioritization of selected vulnerable groups, especially women, children, disabled persons, and rural populations, and above all drew on criminological perspectives to emphasize tertiary prevention interventions. There is a policy focus on the protection and support of victims and the prosecution of perpetrators, but near absent recognition of men as victims. Conclusions: There is a need to broaden the policy framework from primarily criminological and prosecutorial perspectives to include public health contributions. It is likewise important to enlarge the conceptions of vulnerability to include men alongside other vulnerable groups. These measures are important for shaping and resourcing prevention decisions and strengthening primary prevention approaches to violence.

  13. The effects of a social media policy on pharmacy students' facebook security settings.

    Science.gov (United States)

    Williams, Jennifer; Feild, Carinda; James, Kristina

    2011-11-10

    To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy.

  14. Effect of Policy Interventions on Food Security in Tigray, Northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Anne van der Veen

    2011-03-01

    Full Text Available Following the design of a conservation-based agricultural development strategy and food security strategy, the Tigray government has implemented different pro-poor development programs over the past years to address the problems of food security. This study attempts to investigate the effectiveness of government policy interventions at different scales addressed to improve food security. Food security both at the regional and district level was investigated by deriving food balance sheets for the period 2000-2008. An empirical analysis based on a logit model was also employed to analyze household level food security status. The results of the logit model reveal that government policy interventions such as water harvesting schemes, employment generation schemes, and promotion of technology adoption significantly contribute to a higher likelihood of household food security status. The findings of the food balance sheet also indicate that the region has made some impressive development gains in improving regional food self-sufficiency, indicating the importance of government interventions in improving food security both at the household and regional level.

  15. Kantei diplomacy?:Japan's hybrid leadership in foreign and security policy

    OpenAIRE

    Pugliese, Giulio

    2017-01-01

    This article operationalizes Japanese leadership in foreign and security policy, specifically the Abe administrations’ consistent China balancing. It will do so to dispel instances of Premier-centered diplomacy and posit that Abe's diplomatic agenda has rested on a ‘hybrid’ policy-making authority, where the leverage enjoyed by the Prime Minister's office (the Kantei) rested on little-appreciated politicized personnel appointments and demotions within the bureaucratic apparatus, specifically ...

  16. Framing public policy and prevention of chronic violence in American youths.

    Science.gov (United States)

    Dodge, Kenneth A

    2008-10-01

    Metaphors can both inspire and mislead the public. Current metaphors for youth violence are inconsistent with scientific evidence about how chronic violence develops and evoke inaccurate or harmful reactions. Popular, problematic metaphors include superpredator, quarantining the contagious, corrective surgery, man as computer, vaccine, and chronic disease. Four new metaphors that more accurately reflect the science of child development are proposed to shape the field. Preventive dentistry offers a lifelong system of universal, selected, and indicated intervention policies. Cardiovascular disease offers concepts of distal risk factors, proximal processes, equifinality and multifinality, and long-term prevention. The Centers for Disease Control and Prevention's public health model focuses on injury and the victim to elicit popular support. Public education for illiteracy offers concepts of long-term universal education coupled with specialized help for high-risk youths and goes beyond metaphor to represent a truly applicable framework. Research is proposed to test the scientific merit for and public receptivity to these metaphors.

  17. OECD Policy Recommendations on Security for Biological Materials

    International Nuclear Information System (INIS)

    Radisch, J.

    2007-01-01

    Biomedical innovations derived from research on pathogenic micro-organisms promise astounding health and economic benefits. Some such biological resources employed in the RandD for diagnostic kits, vaccines and therapeutics, however, possess capacity for dual-use; they may be misused to develop biological weapons. Research facilities entrusted with possession of such dual-use materials have a responsibility to comply with biosecurity measures that are designed to prevent loss or theft and thereby reduce the probability of a bioterrorist attack. The OECD has provided a forum for its Member countries to engage in a dialogue of international co-operation with a view to produce policies that achieve a research environment fortified by biosecurity measures and capable of producing health innovations. In 2007, the OECD developed a risk assessment framework and risk management principles for Biological Resource Centres. Ongoing policy work at the OECD will look to design biosecurity guidelines appropriate to a broader range of facilities in possession of dual-use materials, such as university and industrial laboratories.(author)

  18. [The evolution of the ethnicity/race concept and its impact on framing policies that promote equity].

    Science.gov (United States)

    Torres-Parodi, Cristina; Bolis, Mónica

    2007-12-01

    Acknowledging the differences between individuals based on their unique identity is a basic requirement for achieving equity. A review of international human rights efforts and the recommendations and declarations of global conferences and regional summits as they redirect policy to battle discrimination shows a positive evolution in the concept of ethnicity/race. This is evident in the transition from using "invisible" differences as an equalizing measure to respecting lifestyle diversity and acknowledging that individuals have a right to be valued for their differences. This evolution in the ethnicity/race concept has been pivotal to building multiethnic, multicultural, and multilingual nations in which minority groups are involved in framing equitable health policies and programs. This study covers the time period from 1948 to the present day, identifying four stages in the concept's evolution that coincide with milestones in the political and social relationship between government institutions and ethnic minority groups. The results of these five decades of positive progress is a heightened appreciation for differences, which underlies multiethnic societies and surpasses any one of the tangible benefits received by minority groups. The progress of democratic societies depends heavily on this concept, one that ensure a stronger foundation for future development.

  19. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    -, 9/2008 (2008), s. 1-34 R&D Projects: GA ČR GA402/05/0711 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics http://ies.fsv.cuni.cz/default/file/download/id/8361

  20. Political and Institutional Drivers of Social Security Policy in South Africa

    DEFF Research Database (Denmark)

    S. Ulriksen, Marianne; Plagerson, Sophie

    This paper provides an analysis of political and institutional drivers that shape social policy in South Africa with a specific focus on social security. As elsewhere in the Global South, South Africa has a quite extensive social assistance framework, whereas social insurance is limited...

  1. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  2. Current Developments and Prospects for the Future: French Security Policy in a Changing World

    Science.gov (United States)

    1991-06-01

    Kentucky, 1981 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN NATIONAL SECURITY AFFAIRS from the NAVAL...PERESTROIKA, AND GORBACHEVS NEW POLITICAL THINKING ON FRENCH SECURTrY POLICY .......... ................................................... 33 A. THE HSTORY ...a new equilibrium of our continent. Europe, the mother of modern civilization, must be established from the Atlantic to the Urals in concord and

  3. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  4. H v Council: Another Court breakthrough in the Common Foreign and Security Policy

    DEFF Research Database (Denmark)

    Butler, Graham

    2016-01-01

    This summer alone, the Court of Justice (‘the Court’) has issued two important decisions that will further shape the legal dimension of the Common Foreign and Security Policy (CFSP). Despite this largely intergovernmental sphere of law (the former Second Pillar) being merged into the unified ‘EU...

  5. Reductionist and integrative research approaches to complex water security policy challenges

    NARCIS (Netherlands)

    Zeitoun, Mark; Lankford, Bruce; Krueger, Tobias; Forsyth, Tim; Carter, Richard; Hoekstra, Arjen Y.; Taylor, Richard; Varis, Olli; Cleaver, Frances; Boelens, Rutgerd; Swatuk, Larry; Tickner, David; Scott, Christopher A.; Mirumachi, Naho; Matthews, Nathanial

    2016-01-01

    This article reviews and contrasts two approaches that water security researchers employ to advance understanding of the complexity of water-society policy challenges. A prevailing reductionist approach seeks to represent uncertainty through calculable risk, links national GDP tightly to

  6. Arms Transfer Policies and International Security: the Case of Brazilian-Swedish Co-operation

    Directory of Open Access Journals (Sweden)

    Carlos Federico Domínguez Avila

    Full Text Available Abstract This article discusses arms trade policies from an international security perspective. Arms transfers are widely treated as political issues even when economic incentives exist. They affect bilateral and multilateral relations among suppliers, countries receiving the arms, non-state actors, taxpayers, and victims. Following the agreement to build Swedish SAAB Gripen NG fighter jets in Brazil, more may be produced for sale to third countries. This, in turn, calls for a review of Brazil’s arms transfer policy. In this instance, Sweden’s principled arms sales model could serve as a basis for a revised Brazilian arms transfer policy as well.

  7. National security governance exemplified by South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, OK

    2014-06-01

    Full Text Available including the ‘attribution problem’, moral responsibility, the inadequacy of secure systems, and the moral justification of a cyber attack on a nation state’s vital interests in response to a cyber attack carried out by people residing in that nation... state. Yet, research on these ethical issues is scarce. Such research is needed to assist nation states in mitigating the risks of a cyber attack to national interests. While the ‘attribution problem’, the moral responsibility of nation states...

  8. Economic Security of Russian Economy under the Conditions of Import Substitution Policy Implementation

    Directory of Open Access Journals (Sweden)

    Natalya Viktorovna Andreeva

    2015-12-01

    Full Text Available In the article, the authors analyze the conditions of import substitution by types of activity from the perspective of the threat to the economic security of Russia. The factors of import substitution are presented. The main factor is the increase of economic and social security by the modernization of Russian economy. Today, a critical measure of the country’s economic security increase is the implementation of import substitution policy. The issue of economic modernization remains of current interest but stays unsolved, especially in the branches where the issue of import substitution is crucial: industry, agriculture, etc. The types of economic activity that can be labeled as open to import substitution are the ones with the high or medium indicators of competitiveness, investment and innovation activity. Within those types, the import substitution policy can be implemented without a threat to economic security. The analysis of the main features of import substitution such as the levels of competitiveness, innovations and investment by the types of economic activity, — is the basis to work out a smart import substitution policy, which will carry no threat to the country’s economic security. The main types of economic activity with the high dependency on import are metallurgical production, chemical industry, wood processing, electrical machines and equipment production, machinery and equipment production, textile manufacture, fishery and fish farming. In the result of the analysis, the following conclusions are drawn: the level of investment for all the types of economic activity presented is critically law; according to the level of innovation and competitiveness, metallurgic production is seen more advantageous on the back of negative dynamics and chemical industry as less advantageous. The other types of activity will face a threat to economic security if the policy of import substitution is implemented without government financing

  9. Increasing public support for food-industry related, obesity prevention policies: The role of a taste-engineering frame and contextualized values.

    Science.gov (United States)

    Ortiz, Selena E; Zimmerman, Frederick J; Adler, Gary J

    2016-05-01

    Support for policies to combat obesity is often undermined by a public sense that obesity is largely a matter of personal responsibility. Industry rhetoric is a major contributor to this perception, as the soda/fast food/big food companies emphasize choice and individual agency in their efforts to neutralize policies that are burdensome. Yet obesity experts recognize that environmental forces play a major role in obesity. We investigate whether exposure to a taste-engineering frame increases support for food and beverage policies that address obesity. A taste-engineering frame details strategies used by the food industry to engineer preferences and increase the over-consumption of processed foods and sugary beverages. We also examine the effects of exposure to two contextualized values that have recently been promoted in expert discourse-consumer knowledge and consumer safety - on public support of policies. Our research shows how causal frames and contextualized values may effectively produce support for new obesity policies. We use an online survey experiment to test the effects of exposure to a taste-engineering frame (TEF), the value of consumer knowledge (CK), or the value of consumer safety (CS), on level of support for a range of policies. A random sample of adults, age 18 + living in the United States was included in the study (N = 2580). Ordered logistic regression was used to measure the effects of treatment exposure. The primary outcome was level-of-support for four (4) food-industry related, obesity prevention policies (aka food and beverage policies): 1) require food-manufacturers to disclose the amount of additives in food products on food packaging; 2) require food-manufacturers to advertise food products in accordance with their actual nutritional value; 3) prohibit all high-fat, high-sugar food advertising on television programming watched primarily by children; and 4) increase healthy food availability in work sites, schools, and hospitals

  10. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  11. Addressing 2030 EU policy framework for energy and climate: Cost, risk and energy security issues

    International Nuclear Information System (INIS)

    Llano-Paz, Fernando de; Martínez Fernandez, Paulino; Soares, Isabel

    2016-01-01

    The different energy sources, their costs and impacts on the environment determine the electricity production process. Energy planning must solve the existence of uncertainty through the diversification of power generation technologies portfolio. The European Union energy and environmental policy has been mainly based on promoting the security of supply, efficiency, energy savings and the promotion of Renewable Energy Sources. The recent European Commission communication “Towards an European Energy Union: A secure, sustainable, competitive and affordable energy for every European” establishes the path for the European future. This study deals with the analysis of the latest EU “Energy Union” goals through the application of Markowitz portfolio theory considering technological real assets. The EU targets are assessed under a double perspective: economic and environmental. The model concludes that implementing a high share of Renewable Energy target in the design of European Policies is not relevant: the maximization of Renewable Energy share could be achieved considering a sole Low Emissions of carbon dioxide policy. Additionally it is confirmed the need of Nuclear energy in 2030: a zero nuclear energy share in 2030 European Mix is not possible, unless the technological limits participation for Renewable Energy Sources were increased. - Highlights: • Implementing a high RES share target in European Policies could not be relevant. • Maximizing RES share could be achieved considering a sole Low Emissions policy. • The EU 2030 Nuclear energy 50% shutting down could be feasible. • Minimizing risk portfolio presents high diversification and energy security levels.

  12. Comparative analysis of military security policy of Norway and Denmark in the Arctic region

    Directory of Open Access Journals (Sweden)

    Igor S. Doroshenko

    2017-01-01

    Full Text Available The interest of Western countries in the Arctic region is growing with each new statement about the sharp climate change and the melting of the Arctic Ocean’s glaciers. In addition to the threats related to the environmental situation in the Arctic zone, the desire to participate in shelf research and development, the potential of using the sea routes of the region by both the Arctic and non-Arctic states creates threats to the security of the Nordic countries.The coastal states, which in case of the escalation of tensions will be in the midst of a regional conflict in the Arctic, are Norway and Denmark. Therefore, the analysis of a level of Norwegian and Danish military security against a backdrop of increasing confrontation between Russia and West and changing climate situation in the region is urgent ., Nevertheless, to ensure a necessary level of defence capability as well as security of borders and zones of exceptional economic interests in the conditions of low temperatures is not so easy. This article examines the Norwegian and Danish approaches to the new military security challenges in the Arctic region. The paper contains examination of the doctrinal basis of military security along with the main documents that form the security concepts of the two countries in the Arctic region, and the reports of the defense ministries and scientific institutions surveys of military activities in the Arctic.Three directions of coastal countries’ policy making in the issues of military security were chosen for comparison. Firstly, the relationships with the USA, the leader of the North Atlantic alliance, which allow us to determine the significance of Norway and Denmark in building NATO security in the north. Secondly, the relationships with the EU and separately with the Nordic countries are considered. This case shows the level of involvement of the European community in the issue of ensuring the Arctic security . Thirdly, the relationships with

  13. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    Science.gov (United States)

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  14. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  15. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  16. Nuclear security policy in the context of counter-terrorism in Cambodia

    International Nuclear Information System (INIS)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia

  17. Nuclear security policy in the context of counter-terrorism in Cambodia

    Energy Technology Data Exchange (ETDEWEB)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong [Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  18. Nuclear security policy in the context of counter-terrorism in Cambodia

    Science.gov (United States)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  19. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  20. 'Sustainability does not quite get the attention it deserves': synergies and tensions in the sustainability frames of Australian food policy actors.

    Science.gov (United States)

    Trevena, Helen; Kaldor, Jenny Claire; Downs, Shauna M

    2015-09-01

    The development of food policy is strongly influenced by the understanding and position actors adopt in their 'framing' of sustainability. The Australian Government developed a National Food Plan (2010-2013). In public consultations on the National Food Plan Green Paper, the government sought stakeholders' views on sustainability. The present study examined the way in which the food industry and civil society organizations framed sustainability in their submissions to the Green Paper. Submissions by food industry actors and civil society organizations were analysed using a framing matrix that examined positioning, drivers, underlying principles and policy solutions related to sustainability. Submissions were open coded and subsequently organized based on themes within the framing matrix. Australia. One hundred and twenty-four written submissions (1420 pages). While submissions from industry and civil society organizations often framed sustainability similarly, there were also major differences. Civil society organizations were more likely to make the link between the food supply and population health, while industry was more likely to focus on economic sustainability. Both viewed consumer demand as a driver of sustainability, welcomed the idea of a whole-of-government approach and stressed the need for investment in research and development to improve productivity and sustainable farming practices. The meaning of sustainability shifted throughout the policy process. There are opportunities for creating shared value in food policy, where the health, environment and economic dimensions of sustainability can be compatible. However, despite pockets of optimism there is a need for a shared vision of sustainability if Australia is to have a food policy integrating these dimensions.

  1. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  2. Analisis kebijakan standardisasi keamanan perangkat telekomunikasi untuk menunjang kebijakan pertahanan dan keamanan nasional [Policy analysis on telecommunication devices security standardization to support national security and defence policy

    Directory of Open Access Journals (Sweden)

    Wirianto Pradono

    2015-12-01

    Full Text Available Beberapa tahun terakhir, kejadian yang terkait dengan pembobolan informasi meningkat dengan signifikan dan menyebabkan kerugian yang tidak sedikit baik bagi pemerintah, industri maupun perorangan. Oleh karenanya diperlukan jaminan terhadap keamanan informasi terutama yang menyangkut informasi yang sensitif dan rahasia. Untuk mengatasi hal tersebut, diperlukan kebijakan di bidang standarisasi keamanan perangkat telekomunikasi untuk menjamin validitas dan kerahasiaan informasi yang dilewatkan melalui perangkat tersebut. Pendekatan kualitatif maupun kuantitatif digunakan dalam studi ini untuk memperoleh gambaran tentang kondisi penerapan standar keamanan perangkat baik oleh pemerintah maupun industri telekomunikasi serta mengidentifikasi kendala yang dihadapi dalam menjamin keamanan perangkat telekomunikasi baik untuk kebutuhan umum maupun kebutuhan khusus baik dari aspek teknologi, kelembagaan, maupun regulasi. Hasil penelitian menunjukkan belum ada regulasi yang mengatur standarisasi keamanan perangkat telekomunikasi untuk kebutuhan khusus. Selain itu belum ada penetapan secara eksplisit tentang lembaga yang berwenang dalam pengujian dan sertifikasi keamanan perangkat telekomunikasi terutama untuk kebutuhan khusus. Sejumlah regulasi yang mengatur secara spesifik bidang standarisasi keamanan perangkat telekomunikasi saat ini masih dalam proses penyusunan oleh instansi-instansi terkait.*****In the past years, incidents involving information security breach increase significantly and cause huge damage to industry, government or individual. Due to that, information security needs to be well guaranteed especially when it comes to sensitive and confidential information. One has to be done to cope with that is the availibility of policy on telecommunication devices security standardization to assure validity and confidentiality of all information going through the devices. Both qualitative and quantitative method used in this study to describe

  3. Adoption of an information systems security policy in small and medium sized enterprises.

    Directory of Open Access Journals (Sweden)

    Isabel Maria Lopes

    2017-03-01

    Full Text Available Information Systems Security (ISS is a relevant fact for current organizations. This paper focuses on Small and Medium Sized Enterprises (SMEs. This article aims to constitute an empirical study on the applicability of the Action Research (AR method in information systems, more specifically by assessing the adoption of an ISS policy in six SMEs, and identifying the critical success factors in adopting an ISS policy. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that AR is a promising means for the evaluation of ISS policies adoption. It can both act as a research method that improves the understanding about the reasons why the policy has been abandoned, and as a change method, assisting practitioners to overcome barriers and suggesting measures to be implemented.

  4. Changing climate, changing frames

    International Nuclear Information System (INIS)

    Vink, Martinus J.; Boezeman, Daan; Dewulf, Art; Termeer, Catrien J.A.M.

    2013-01-01

    Highlights: ► We show development of flood policy frames in context of climate change attention. ► Rising attention on climate change influences traditional flood policy framing. ► The new framing employs global-scale scientific climate change knowledge. ► With declining attention, framing disregards climate change, using local knowledge. ► We conclude that frames function as sensemaking devices selectively using knowledge. -- Abstract: Water management and particularly flood defence have a long history of collective action in low-lying countries like the Netherlands. The uncertain but potentially severe impacts of the recent climate change issue (e.g. sea level rise, extreme river discharges, salinisation) amplify the wicked and controversial character of flood safety policy issues. Policy proposals in this area generally involve drastic infrastructural works and long-term investments. They face the difficult challenge of framing problems and solutions in a publicly acceptable manner in ever changing circumstances. In this paper, we analyse and compare (1) how three key policy proposals publicly frame the flood safety issue, (2) the knowledge referred to in the framing and (3) how these frames are rhetorically connected or disconnected as statements in a long-term conversation. We find that (1) framings of policy proposals differ in the way they depict the importance of climate change, the relevant timeframe and the appropriate governance mode; (2) knowledge is selectively mobilised to underpin the different frames and (3) the frames about these proposals position themselves against the background of the previous proposals through rhetorical connections and disconnections. Finally, we discuss how this analysis hints at the importance of processes of powering and puzzling that lead to particular framings towards the public at different historical junctures

  5. The New Face of EU Security Policies?:Analysing the Normative Patterns of EU Non-Proliferation Policies in the Southern Mediterranean

    OpenAIRE

    Kienzle, Benjamin

    2013-01-01

    In recent years, the European Union has substantially intensified its non-proliferation policies in the southern Mediterranean. Although the analysis of these policies shows that the Union comes close to what the literature suggests is an ideal type normative power, this interpretation in itself is at odds with other security policies in the southern Mediterranean and with non-proliferation policies outside the region, most notably in Iran. Therefore, this article examines the causes and impl...

  6. Food security and nutrition in the Russian Federation – a health policy analysis

    Directory of Open Access Journals (Sweden)

    Karsten Lunze

    2015-06-01

    Full Text Available Background: In the Russian Federation (Russia, an elevated burden of premature mortality attributable to non-communicable diseases (NCDs has been observed since the country's economic transition. NCDs are largely related to preventable risk factors such as unhealthy diets. Objective: This health policy study's aim was to analyze past and current food production and nutritional trends in Russia and their policy implications for Russia's NCD burden. Design: We examined food security and nutrition in Russia using an analytical framework of food availability, access to food, and consumption. Results: Agricultural production declined during the period of economic transition, and nutritional habits changed from high-fat animal products to starches. However, per-capita energy consumption remained stable due to increased private expenditures on food and use of private land. Paradoxically, the prevalence of obesity still increased because of an excess consumption of unsaturated fat, sugar, and salt on one side, and insufficient intake of fruit and vegetables on the other. Conclusions: Policy and economic reforms in Russia were not accompanied by a food security crisis or macronutrient deprivation of the population. Yet, unhealthy diets in contemporary Russia contribute to the burden of NCDs and related avoidable mortality. Food and nutrition policies in Russia need to specifically address nutritional shortcomings and food-insecure vulnerable populations. Appropriate, evidence-informed food and nutrition policies might help address Russia's burden of NCDs on a population level.

  7. Policy and Policy Formulation Considerations for Incorporation of Secure Mobile Devices in USMC Ground Combat Units

    Science.gov (United States)

    2014-09-01

    more important than automobiles , oil, steel , or any of the products of the Industrial Age. Knowledge value added (KVA) theory, then, is squarely...bureaucratic process such as DOD policy-making, a journey into a separate but related field is required to strip away the final level of abstraction from the

  8. Food security for infants and young children: an opportunity for breastfeeding policy?

    Science.gov (United States)

    Salmon, Libby

    2015-01-01

    Increased global demand for imported breast milk substitutes (infant formula, follow-on formula and toddler milks) in Asia, particularly China, and food safety recalls have led to shortages of these products in high income countries. At the same time, commodification and trade of expressed breast milk have fuelled debate about its regulation, cost and distribution. In many economies suboptimal rates of breastfeeding continue to be perpetuated, at least partially, because of a failure to recognise the time, labour and opportunity costs of breast milk production. To date, these issues have not figured prominently in discussions of food security. Policy responses have been piecemeal and reveal conflicts between promotion and protection of breastfeeding and a deregulated trade environment that facilitates the marketing and consumption of breast milk substitutes. The elements of food security are the availability, accessibility, utilization and stability of supply of nutritionally appropriate and acceptable quantities of food. These concepts have been applied to food sources for infants and young children: breastfeeding, shared breast milk and breast milk substitutes, in accordance with World Health Organization (WHO)/United Nations Children's Fund (UNICEF) guidelines on infant feeding. A preliminary analysis indicates that a food security framework may be used to respond appropriately to the human rights, ethical, economic and environmental sustainability issues that affect the supply and affordability of different infant foods. Food security for infants and young children is not possible without high rates of breastfeeding. Existing international and national instruments to protect, promote and support breastfeeding have not been implemented on a wide scale globally. These instruments need review to take into account the emerging trade environment that includes use of the internet, breast milk markets and globalised supply chains for breast milk substitutes. New

  9. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    2008-01-01

    Roč. 58, 7-8 (2008), s. 329-358 ISSN 0015-1920 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics Impact factor: 0.275, year: 2008 http://journal.fsv.cuni.cz/storage/1137_dusek-kopecsni_-_329-358-opravené.pdf

  10. Security Perspectives and Policies: Lebanon, Syria, Israel, and the Palestinians. Conference Papers

    Science.gov (United States)

    1991-05-01

    candidates born certain long-term -issues of security policy over the in Asia or Africa among the first 40 on its list. The past few years; and-(3) a...and North Africa : A B.?iographi cal Dictionary (New House, 1984). York, Westport, Connecticut, and London. Greenwood Press, Simon, Menill. Moshe...that, however, they have not conflit ,-the Maronites were constantly accused by registered any military successes to justify much their opponents of

  11. An Object-Oriented Approach to Security Policies and their Access Controls for Database Management

    Science.gov (United States)

    1991-09-01

    access control requiremnts is a messy task. It may result in a system less reliable and secure than building a new system from scratch. Further, we have...means to specify access control requirments for the need-to-know policy. B. Actions as Access Priviledges and Queries in an Object-Class Hierarchy The...database. Access priviledges include read. update. append, delete. etc. An access query is a logical expression of predicates defining the parn of a data

  12. China’s Foreign- and Security-policy Decision-making Processes under Hu Jintao

    Directory of Open Access Journals (Sweden)

    Jean-Pierre Cabestan

    2009-10-01

    Full Text Available Since 1979, foreign- and security-policy-making and implementation processes have gradually and substantially changed. New modes of operation that have consolidated under Hu Jintao, actually took shape under Jiang Zemin in the 1990s, and some, under Deng Xiaoping. While the military’s role has diminished, that of diplomats, experts, and bureaucracies dealing with trade, international economic relations, energy, propaganda and education has increased. Decision making in this area has remained highly centralized and concentrated in the supreme leading bodies of the Chinese Communist Party (CCP. However, China’s globalization and decentralization, as well as the increasing complexity of its international interests, have intensified the need to better coordinate the activities of the various CCP and state organs involved in foreign and security policy; hence, the growing importance of the CCP leading small groups (foreign affairs, national security, Taiwan, etc.. But the rigidity of the current institutional pattern has so far foiled repeated attempts to establish a National Security Council.

  13. Nuclear regulatory policy concept on safety, security, safeguards and emergency preparedness (3S+EP)

    International Nuclear Information System (INIS)

    Ilyas, Zurias

    2009-01-01

    Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. By undertaking proper regulatory oversight on Safety, Security and Emergency Preparedness (3S+EP) as an integrated and comprehensive system, safe and secure use of nuclear energy can be assured. Licence requirements and conditions should fulfil regulatory requirements pertaining to 3S+EP for nuclear installation as an integrated system. An effective emergency capacity that can be immediately mobilized is important. The capacity in protecting the personnel before, during and after the disaster should also be planned. Thus, proper emergency preparedness should be supported by adequate resources. The interface between safety, security, safeguards and emergency preparedness has to be set forth in nuclear regulations, such as regulatory requirements; 3S+EP; components, systems and structures of nuclear installations and human resources. Licensing regulations should stipulate, among others, DIQ, installations security system, safety analysis report, emergency preparedness requirements and necessary human resources that meet the 3S+EP requirements.

  14. A Public Policy Advocacy Project to Promote Food Security: Exploring Stakeholders' Experiences.

    Science.gov (United States)

    Atkey, Kayla M; Raine, Kim D; Storey, Kate E; Willows, Noreen D

    2016-09-01

    To achieve food security in Canada, comprehensive approaches are required, which involve action at the public policy level. This qualitative study explored the experiences of 14 stakeholders engaging in a 9-month participatory public policy advocacy project to promote community food security in the province of Alberta through the initiation of a campaign to develop a Universal School Food Strategy. Through this exploration, four main themes were identified; a positive and open space to contribute ideas, diversity and common ground, confidence and capacity, and uncertainty. Findings from this study suggest that the participatory advocacy project provided a positive and open space for stakeholders to contribute ideas, through which the group was able to narrow its focus and establish a goal for advocacy. The project also seems to have contributed to the group's confidence and capacity to engage in advocacy by creating a space for learning and knowledge sharing, though stakeholders expressed uncertainty regarding some aspects of the project. Findings from this study support the use of participatory approaches as a strategy for facilitating engagement in public policy advocacy and provide insight into one group's advocacy experience, which may help to inform community-based researchers and advocates in the development of advocacy initiatives to promote community food security elsewhere. © 2016 Society for Public Health Education.

  15. Energy security in western Mediterranean: new factors, new policies. A Spanish perspective

    International Nuclear Information System (INIS)

    Mane-Estrada, Aurelia

    2008-01-01

    After having noticed that there are two typical approaches and models to address energy security, policies acting on the supply side and policies based on a market-and-institutions approach (like stated by the European Union), the author outlines the effects of this second approach for countries of the western Mediterranean Sea, and then analyses the evolutions of energetic relationships between Algeria (where the energy sector is the most open, which is the best equipped in terms of gas infrastructures, and which attracts foreign investors) and European countries of the region (France, Italy, Spain and Portugal). Thus, she analyses present exchanges in the region, the dependency of these European countries on Mediterranean producers, and the relationships between involved companies of the region. She discusses the issue of energy security policy for the region from the perspective of the governments of producing countries and of consuming countries, and of companies. She discusses whether the project of Union for the Mediterranean complies with these objectives of energy security

  16. Global climate policy impacts on livestock, land use, livelihoods, and food security.

    Science.gov (United States)

    Golub, Alla A; Henderson, Benjamin B; Hertel, Thomas W; Gerber, Pierre J; Rose, Steven K; Sohngen, Brent

    2013-12-24

    Recent research has shed light on the cost-effective contribution that agriculture can make to global greenhouse gas abatement; however, the resulting impacts on agricultural production, producer livelihoods, and food security remain largely unexplored. This paper provides an integrated assessment of the linkages between land-based climate policies, development, and food security, with a particular emphasis on abatement opportunities and impacts in the livestock sector. Targeting Annex I countries and exempting non-Annex I countries from land-based carbon policies on equity or food security grounds may result in significant leakage rates for livestock production and agriculture as a whole. We find that such leakage can be eliminated by supplying forest carbon sequestration incentives to non-Annex I countries. Furthermore, substantial additional global agricultural abatement can be attained by extending a greenhouse gas emissions tax to non-Annex I agricultural producers, while compensating them for their additional tax expenses. Because of their relatively large emissions intensities and limited abatement possibilities, ruminant meat producers face the greatest market adjustments to land-based climate policies. We also evaluate the impacts of climate policies on livelihoods and food consumption in developing countries. In the absence of non-Annex I abatement policies, these impacts are modest. However, strong income and food consumption impacts surface because of higher food costs after forest carbon sequestration is promoted at a global scale. Food consumption among unskilled labor households falls but rises for the representative farm households, because global agricultural supplies are restricted and farm prices rise sharply in the face of inelastic food demands.

  17. Framing the frame

    Directory of Open Access Journals (Sweden)

    Todd McElroy

    2007-08-01

    Full Text Available We examined how the goal of a decision task influences the perceived positive, negative valence of the alternatives and thereby the likelihood and direction of framing effects. In Study 1 we manipulated the goal to increase, decrease or maintain the commodity in question and found that when the goal of the task was to increase the commodity, a framing effect consistent with those typically observed in the literature was found. When the goal was to decrease, a framing effect opposite to the typical findings was observed whereas when the goal was to maintain, no framing effect was found. When we examined the decisions of the entire population, we did not observe a framing effect. In Study 2, we provided participants with a similar decision task except in this situation the goal was ambiguous, allowing us to observe participants' self-imposed goals and how they influenced choice preferences. The findings from Study 2 demonstrated individual variability in imposed goal and provided a conceptual replication of Study 1. %need keywords

  18. The Effects of a Social Media Policy on Pharmacy Students’ Facebook Security Settings

    Science.gov (United States)

    Feild, Carinda; James, Kristina

    2011-01-01

    Objective. To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. Methods. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. Results. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Conclusions. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy. PMID:22171105

  19. Alternative policy impacts on US GHG emissions and energy security: A hybrid modeling approach

    International Nuclear Information System (INIS)

    Sarica, Kemal; Tyner, Wallace E.

    2013-01-01

    This study addresses the possible impacts of energy and climate policies, namely corporate average fleet efficiency (CAFE) standard, renewable fuel standard (RFS) and clean energy standard (CES), and an economy wide equivalent carbon tax on GHG emissions in the US to the year 2045. Bottom–up and top–down modeling approaches find widespread use in energy economic modeling and policy analysis, in which they differ mainly with respect to the emphasis placed on technology of the energy system and/or the comprehensiveness of endogenous market adjustments. For this study, we use a hybrid energy modeling approach, MARKAL–Macro, that combines the characteristics of two divergent approaches, in order to investigate and quantify the cost of climate policies for the US and an equivalent carbon tax. The approach incorporates Macro-economic feedbacks through a single sector neoclassical growth model while maintaining sectoral and technological detail of the bottom–up optimization framework with endogenous aggregated energy demand. Our analysis is done for two important objectives of the US energy policy: GHG reduction and increased energy security. Our results suggest that the emission tax achieves results quite similar to the CES policy but very different results in the transportation sector. The CAFE standard and RFS are more expensive than a carbon tax for emission reductions. However, the CAFE standard and RFS are much more efficient at achieving crude oil import reductions. The GDP losses are 2.0% and 1.2% relative to the base case for the policy case and carbon tax. That difference may be perceived as being small given the increased energy security gained from the CAFE and RFS policy measures and the uncertainty inherent in this type of analysis. - Highlights: • Evaluates US impacts of three energy/climate policies and a carbon tax (CT) • Analysis done with bottom–up MARKAL model coupled with a macro model • Electricity clean energy standard very close to

  20. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  1. An Analysis of China's Fertilizer Policies: Impacts on the Industry, Food Security, and the Environment.

    Science.gov (United States)

    Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia

    2013-07-01

    China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  2. Review: Miller, Michelle Ann (2009, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh

    Directory of Open Access Journals (Sweden)

    Antje Missbach

    2009-01-01

    Full Text Available Review of the monograph: Miller, Michelle Ann, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh, London/ New York: Routledge, 2009, ISBN 13: 978-0-415-45467-4, 240 pages.

  3. Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States

    International Nuclear Information System (INIS)

    Littlefield, Scott R.

    2013-01-01

    This article examines the impact of imprecise terminology on the energy policymaking process in US, focusing on the manipulation of discourse by different political–economic interests seeking to sway popular opinion. Using the 2012 US Presidential Elections as a backdrop, the analysis highlights the cooption of the concepts “security,” “independence,” and “sustainability” in energy debates by different and often opposing interest groups. The article’s first section traces the malleability of energy terminology to the vagueness of the term “energy” itself and notes how qualifying words like security, independence, and sustainability have been selectively exploited to introduce further ambiguity to an already fungible concept. The second section notes that while energy is a critical and complex factor of macroeconomic production, its main public visibility comes via a few partially representative numbers, like gasoline prices. This mismatch of broad social importance and piecemeal public understanding enables organized interests to leverage vague terminology in support of particular policy ideas. The third section examines three policymaking tools (1) taxation, (2) regulation, and (3) technology promotion and compares these administrative instruments. Ultimately, the article concludes that loosely defined terminology inhibits energy policy discussion and stifles meaningful public debate over and action on energy issues. - Highlights: ► This article examines the impact of imprecise terminology on US energy policymaking. ► Energy security, energy independence, and sustainability are vaguely defined terms. ► Coordinated interests manipulate debate and exploit public ignorance. ► Taxes, regulation, and innovation incentives are used to apply policy prescriptions. ► Vague terminology stifles meaningful public debate over energy policy.

  4. Norwegian security policy and the Norwegian armed forces in the 21st century : a case study of KFOR

    OpenAIRE

    Nissen, Sven Kristian

    2002-01-01

    Norwegian Security Policy and the Norwegian Armed Forces in the 21st century - a case study of KFOR (Summary) The subject of the study is Norwegian security policy and the Norwegian Armed Forces as an instrument for international operations, studied within the context of globalisation and substantial internal restructuring. Conducted as a case study of KFOR and by means of an inter-disciplinary approach, the objective is to carve out interesting hypothesis concerning the interacti...

  5. Frames and semi-frames

    OpenAIRE

    Antoine, Jean-Pierre; Balazs, Peter

    2011-01-01

    Loosely speaking, a semi-frame is a generalized frame for which one of the frame bounds is absent. More precisely, given a total sequence in a Hilbert space, we speak of an upper (resp. lower) semi-frame if only the upper (resp. lower) frame bound is valid. Equivalently, for an upper semi-frame, the frame operator is bounded, but has an unbounded inverse, whereas a lower semi-frame has an unbounded frame operator, with bounded inverse. We study mostly upper semi-frames, bot...

  6. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    Science.gov (United States)

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security.

  7. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  8. A View of DANIDAs Policy Note on Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    -usikkerhed hæmmer udvikling’ understreges det, at hvis ‘underernæring’ og ‘sult’ forveksles, findes disse synergier ikke og sparsomme resourcer spildes. I Danida`s ’Policy Note on Food Security’ nævnes det, at ‘852 million are living in hunger’, altså sult. Det er imidlertid snarere kronisk underernæring end sult...... Greener World for All (NEC)’. Faktisk peger man på, at landbrugets og fødevaresektorens primære rolle er at brødføde befolkningen ved at øge tilgængeligheden og forbruget af sikre, miljørigtige madvarer, der er i overensstemmelse med ernæringsmæssige anbefalinger og til overkommelige priser. Derfor...

  9. Victims, soldiers, peace-makers and caretakers: the neoliberal constitution of women in the EU’s security policy

    NARCIS (Netherlands)

    Muehlenhoff, H.L.M.

    2017-01-01

    Feminist scholars praise and criticize the UNSC Resolution 1325 on Women, Peace and Security for its considerations of women and gender in conflicts. Poststructuralist feminists show how gender is constructed in the UN’s security policies and how these constructions reproduce gendered dichotomies

  10. Are social security policies for Chinese landless farmers really effective on health in the process of Chinese rapid urbanization? A study on the effect of social security policies for Chinese landless farmers on their health-related quality of life.

    Science.gov (United States)

    Liang, Ying; Lu, Wanyi; Wu, Wei

    2014-01-15

    The continuing urbanization in China has resulted in a loss of land and rights among farmers. The social security of landless farmers has attracted considerable research attention. However, only few studies measure the health-related quality of life (HRQOL) of landless farmers by employing scientific standardized scales. By using five-dimensional European quality of life (EQ-5D) scales, this study measures the HRQOL of landless farmers from a new perspective and examines how the social security policies affect their HRQOL. This study is based on a 2013 household survey that has been conducted among 1,500 landless famers who are residing in six resettlement areas in three cities within the Yangtze River Delta region, namely, Nanjing, Hangzhou, and Yangzhou. This study adopts EQ-5D scales to measure the HRQOL of these farmers. More than 50% of the respondents are in poor or non-serious health conditions, and over 50% are not satisfied with their current social security policies. The health conditions and social security policies are analyzed by multinomial regression analysis and the relationship between these two factors are analyzed via structural equation modeling (SEM). First, the descriptive statistical analysis shows that more than 50% of the respondents are in poor or non-serious health conditions, and that the largest proportion of these farmers are suffering from anxiety or depression, which is the most serious of the five dimensions. Second, multinomial regression analysis shows that the satisfaction of landless farmers with their social security policies improves their living conditions, particularly in their capacity for self-care, in their ability to perform daily activities, and in the reduction of pain, anxiety, and depression. Third, SEM model analysis shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. Among the five dimensions of EQ-5D, daily activities produce the greatest influence

  11. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  12. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  13. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  14. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  15. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  16. Successes and Shortfalls of European Union Common Security and Defence Policy Missions in Africa

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Nervanto, Elisa

    This brief synthesises the IECEU project’s most essential findings on the effectiveness of European Union (EU) missions in four Africa countries: Libya, South Sudan, the Democratic Republic of the Congo (DRC) and the Central African Republic (CAR). It describes the main elements and impact...... of the EU missions in these countries, identifies key strategic and operational shortfalls and offers recommendations on how the EU can improve its effectiveness in future conflict prevention and crisis management missions. The EU missions investigated differ in scale, length, objective, budget, priority...... and context. However, the EU missions presented in this brief share the main characteristic that they have all been deployed under the union’s Common Security and Defence Policy (CSDP)2 with the explicit intent of improving the overall security situation and addressing conflicts in Africa. This brief...

  17. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  18. Indirect effect of management support on users' compliance behaviour towards information security policies.

    Science.gov (United States)

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management

  19. The policy responses to the Fukushima nuclear accident and their effect on Japanese energy security

    International Nuclear Information System (INIS)

    Hayashi, Masatsugu; Hughes, Larry

    2013-01-01

    The accident at the Fukushima Daiichi nuclear power station received worldwide attention in March 2011; since then, much of the reporting has been limited to stories such as the state of the reactor, the trans-Pacific movement of flotsam caused by the tsunami, and the effect of the tsunami and accident on Japanese communities. Other than the closure of Japan's last operating reactor in May 2012, little has been discussed outside of Japan regarding the policies introduced in response by the Japanese government in its effort to maintain Japanese energy security and the effects on Japan's electricity suppliers and the Japanese people. This paper presents a detailed examination of the crisis-driven changes to policy and regulations instituted by the Japanese government and electricity suppliers in the immediate aftermath of the accident up to May 2012. The disruption to Japan's long-term energy policies is discussed in terms of the country's need to maintain its energy security. The paper also considers a number of different energy futures for Japan in light of the accident and how they could improve energy security in terms of availability, affordability, and acceptability. - Highlights: ► Since Fukushima, Japan's reactor capacity has dropped from almost 50 GW to zero. ► Emergency demand-reduction reduced TEPCO's 2011 summer peak by 18% compared to 2010. ► Restricting generation to non-nuclear sources affected Asian LNG and oil supplies. ► Nuclear technology will continue to play a role for Japanese electricity and exports

  20. More of the same: Danish foreign and security policy after Afghanistan

    DEFF Research Database (Denmark)

    Jakobsen, Peter Viggo

    2016-01-01

    Two. The financial costs were also unprecedented as the total civilian and military expenditures on Afghanistan came to approximately €2.68 billion by the end of 2014. Although some politicians now regard the Afghan war as a mistake and more than half of the Danish population do not consider it worth...... the financial and human costs, the disappointing outcome of the ISAF mission has triggered remarkably little domestic debate and soul-searching and left little discernible impact on Danish foreign and security policy....

  1. The foreign policy and security options of Romania in the vision of Klaus Johannis

    Directory of Open Access Journals (Sweden)

    Radu-Ioan Opriș

    2015-03-01

    Full Text Available If a decade ago, Romania became a NATO member and it was enrolled in the accession process to the European Union, in 2014, the problem is radically different: Romania has a new status within NATO, it is part of the EU, it is in process of accession to the Schengen area and it has developed its strategic partnership with the United States of America. In this context, the aim of this paper is to bring into attention the vision of the new president of Romania, Klaus Iohannis, regarding the romanian foreign policy and security.

  2. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  3. Energy policy for India: towards sustainable energy security in India the twenty first century

    International Nuclear Information System (INIS)

    Chopra, S.K.

    2004-01-01

    In this book the background, justification and design for an Integrated Sustainable Energy Policy for the country for the next two decades. Detailed discussion of different energy sub-sectors is given. A separate section in the book focuses on Rural Energy in all its forms and uses. Rural energy is especially important for India and other developing countries because it affects the lives of over seventy percent of the country's population. Environmental concerns in the energy sector have also been discussed in detail in a separate section. These include both local and environmental issues, including India's commitment to various international conventions on environment. The implementation of the Integrated Sustainable Energy Policy is proposed to be done through a National Sustainable Energy Security

  4. Marcel de Haas, Russia’s Foreign Security Policy in the 21st Century – Putin, Medvedev and Beyond.

    Directory of Open Access Journals (Sweden)

    Isabelle Facon

    2011-03-01

    Full Text Available Specialists of Russian military and defense policy are familiar with Marcel De Haas’s prolific and in-depth publications on sometimes fairly technical issues. This book, with its broader outlook aimed at providing an overall understanding of Russian security policy in the 2000s, is the product of Dr. De Haas’s years as a Senior Research Fellow at the Clingendael Institute (The Hague. In many ways, it constitutes a follow-on to the author’s previous book– Russian Security Policy and Air Power...

  5. Beyond engagement in working with children in eight Nairobi slums to address safety, security, and housing: Digital tools for policy and community dialogue.

    Science.gov (United States)

    Mitchell, Claudia; Chege, Fatuma; Maina, Lucy; Rothman, Margot

    2016-01-01

    This article studies the ways in which researchers working in the area of health and social research and using participatory visual methods might extend the reach of participant-generated creations such as photos and drawings to engage community leaders and policy-makers. Framed as going 'beyond engagement', the article explores the idea of the production of researcher-led digital dialogue tools, focusing on one example, based on a series of visual arts-based workshops with children from eight slums in Nairobi addressing issues of safety, security, and well-being in relation to housing. The authors conclude that there is a need for researchers to embark upon the use of visual tools to expand the life and use of visual productions, and in particular to ensure meaningful participation of communities in social change.

  6. Political and Institutional Drivers of Social Security Policy in South Africa

    DEFF Research Database (Denmark)

    S. Ulriksen, Marianne; Plagerson, Sophie

    This paper provides an analysis of political and institutional drivers that shape social policy in South Africa with a specific focus on social security. As elsewhere in the Global South, South Africa has a quite extensive social assistance framework, whereas social insurance is limited and inade......This paper provides an analysis of political and institutional drivers that shape social policy in South Africa with a specific focus on social security. As elsewhere in the Global South, South Africa has a quite extensive social assistance framework, whereas social insurance is limited...... arrangements, positive research evidence and civil society advocacy and litigation. Moreover, the introduction of a health insurance scheme is relatively more complex (politically, institutionally and technically), compared to expanding an already existing social cash transfer programme. In our analysis, we...... of health insurance, ideological narratives are pitted against each other: the concept of health as a common good against health as a commodity, and market-oriented strategies for delivery against state-centric approaches....

  7. Newspaper representations of mental illness and the impact of the reporting of "events" on social policy: the "framing" of Isabel Schwarz and Jonathan Zito.

    Science.gov (United States)

    Paterson, B

    2006-06-01

    Concerns have been raised internationally about the role of the media in influencing public opinion and by implication, social policy on mental health issues. In particular, anxieties have been expressed that an "excessive" focus by the news media on violence in association with mental illness may reinforce pre-existing stereotypes and by escalating public concerns lead to the adoption of policies which place a high priority on the safety of the public. Such assertions are often contained in the numerous studies that record a seemingly disproportionate number of stories featuring violence in association with mental health. What is, however, almost invariably lacking is a developed theory of agency that explains how or why such depictions of mental illness might exert an influence on social policy. This paper critically examines the potential significance of the way in which responsibility for events is constructed for social policy by means of a discourse analysis, inspired by the genealogical work of Michel Foucault. It uses the device of "frames" originally developed by Goffman to explore the nature of newspaper coverage of two deaths to which causal responsibility for changes in the nature of English social policy in mental health has been attributed. Results presented suggest that attempts to assert a causal influence between media coverage and changes in the nature of social policy must engage with the question of agency.

  8. An Experiment Assessing Punitive versus Wellness Framing of a Tobacco-Free Campus Policy on Students' Perceived Level of University Support.

    Science.gov (United States)

    Lee, Joseph G L; Purcell, Christopher J; Chaney, Beth H

    2017-08-20

    The objective of this study was to examine how different ways of describing a hypothetical tobacco-free campus policy would impact college students' perceived level of support from the college. In the spring of 2016, we randomized 1885 undergraduate students in a required course to three message conditions in an online survey: control (no message), wellness (emphasizing promoting health and quitting support), and punitive (emphasizing consequences for violating the policy). The dependent variable was perceived organizational support. We selected items previously shown to be relevant for college students (alpha = 0.92 in our data). Given significant non-normality, we used non-parametric Kruskal-Wallis tests with pairwise comparisons to examine differences in perceived organizational support across the three conditions. We examined results by smoking status and if the participant correctly reported the message they received. We found no significant difference in perceived organizational support among students exposed to different tobacco-free campus policy announcements ( p = 0.75). We also found no significant difference among smokers ( p = 0.66). However, among smokers who correctly reported the message they received, we found significantly lower perceived university support ( p = 0.01). Messages about tobacco-free campus policies should focus on the role of policy in supporting a healthy environment instead of punitive enforcement. Campus administrators should use caution when using message frames focusing on consequences of violating newly adopted policies.

  9. The rise and fall of Australian physical activity policy 1996 – 2006: a national review framed in an international context

    OpenAIRE

    Bellew, Bill; Schöeppe, Stephanie; Bull, Fiona C; Bauman, Adrian

    2008-01-01

    Background This paper provides an historical review of physical activity policy development in Australia for a period spanning a decade since the release of the US Surgeon General's Report on Physical Activity and Health in 1996 and including the 2004 WHO Global Strategy on Diet, Physical Activity and Health. Using our definition of 'HARDWIRED' policy criteria, this Australian review is compared with an international perspective of countries with established national physical activity policie...

  10. The rise and fall of Australian physical activity policy 1996 - 2006: a national review framed in an international context.

    Science.gov (United States)

    Bellew, Bill; Schöeppe, Stephanie; Bull, Fiona C; Bauman, Adrian

    2008-07-31

    This paper provides an historical review of physical activity policy development in Australia for a period spanning a decade since the release of the US Surgeon General's Report on Physical Activity and Health in 1996 and including the 2004 WHO Global Strategy on Diet, Physical Activity and Health. Using our definition of 'HARDWIRED' policy criteria, this Australian review is compared with an international perspective of countries with established national physical activity policies and strategies (New Zealand, Canada, Brazil, Scotland, Switzerland, the Netherlands and Finland). Methods comprised a literature and policy review, audit of relevant web sites, document searches and surveys of international stakeholders. All these selected countries embraced multi-strategic policies and undertook monitoring of physical activity through national surveys. Few committed to policy of more than three years duration and none undertook systematic evaluation of national policy implementation. This Australian review highlights phases of innovation and leadership in physical activity-related policy, as well as periods of stagnation and decline; early efforts were amongst the best in the world but by the mid-point of this review (the year 2000), promising attempts towards development of a national intersectoral policy framework were thwarted by reforms in the Federal Sport and Recreation sector. Several well received reviews of evidence on good practices in physical activity and public health were produced in the period but leadership and resources were lacking to implement the policies and programs indicated. Latterly, widespread publicity and greatly increased public and political interest in chronic disease prevention, (especially in obesity and type 2 diabetes) have dominated the framework within which Australian policy deliberations have occurred. Finally, a national physical activity policy framework for the Health sector emerged, but not as a policy vision that was

  11. Renewable energy perspectives in the frame of Turkey’s and the EU’s energy policies

    International Nuclear Information System (INIS)

    Şekercioğlu, Selma; Yılmaz, Mustafa

    2012-01-01

    Highlights: ► We examined the renewable energy policies of the EU and Turkey in their historical perspectives. ► In the EU there is a progress in renewable energy planning and about support mechanisms. ► In Turkey there is a need for more struggles about increasing the effectiveness of support mechanism. ► The sustainability principle of the EU energy policy has to be a guide for Turkey. - Abstract: Renewable energy as one of the current and substantial issue needs to be investigated in terms of political outlook. So the researches on renewable energy policies under the energy policies of different countries are necessary. The emergence of renewable energy policy was the 20th century but it gained momentum in 21st century. The realization of the polluting nature of the petroleum products, their negative environment effects and the assumptions about the future of non-renewable energy sources were the driving forces behind these politics. The European Union in these conditions tries to play pioneer role. Turkey on the other hand as a candidate country has to harmonize its policies with the Union’s. In this context, objective of this work is to examine the EU and Turkey’s renewable energy policies, make a comparison and as a sustainability of Turkish renewable energy policy construct a future projection in short, medium and long terms.

  12. Report mapping legal and policy instruments of the EU for human rights and democracy support, FRAME Deliverable 12.1

    NARCIS (Netherlands)

    Churruca Muguruza, C.; Isa, F. G.; San José, D. G.; Fernández Sánchez, P. A.; Márquez Carrasco, C.; Muñoz Nogal, E.; Nagore Casas, M.; Timmer, Alexandra|info:eu-repo/dai/nl/351098852

    2014-01-01

    This report is devoted to the mapping of legal and policy instruments of the EU for human rights and democracy support. In particular, it highlights the EU´s human rights priorities in terms of themes and vulnerable groups in its external action based on a review of EU policy documents and

  13. Food security, wheat production and policy in South Africa: Reflections on food sustainability and challenges for a market economy

    Directory of Open Access Journals (Sweden)

    Francois de Wet

    2018-01-01

    Full Text Available The traditional concept of security has broadened over the past decades. Food security in South Africa is an imperative for human and non-human survival. In the contemporary political economy, there is a real nexus between globalisation, exploitation, the state, scarcity of resources, the market, peoples’ need to feel secure, notions of state responsibility and food production. Political economy and human security in theoretical debates and face-to-face politics are intrinsically linked. The notion of a ‘secure community’ changed. Food security and the right to quality living became a social imperative. Understanding current agricultural economics requires the ability to link security and access to food for all. In this case study, wheat production in South Africa is addressed against the interface of the global and the local including South Africa’s transition to a democratic and constitutional state with a Bill of Rights. The current security approach represents a more comprehensive understanding of what security is meant to be and include, amongst others, housing security, medical security, service delivery and food security, as set out in the Millennium Development Goals and the subsequent Sustainable Development Goals. The issue of food security is addressed here with particular reference to wheat production, related current government policies and the market economy. The authors chose to limit their socio-economic focus to a specific sector of the agricultural market, namely wheat, rather than discuss food security in South Africa in general. Wheat was chosen as a unit of analysis because as a crop, wheat used in bread is one of the staples for the majority of South Africans and given the current negative economic developments, wheat as a staple is likely to remain integral, if not increasing its status of dependability

  14. Frames and semi-frames

    Energy Technology Data Exchange (ETDEWEB)

    Antoine, Jean-Pierre [Institut de Recherche en Mathematique et Physique, Universite Catholique de Louvain, B-1348 Louvain-la Neuve (Belgium); Balazs, Peter, E-mail: jean-pierre.antoine@uclouvain.be, E-mail: peter.balazs@oeaw.ac.at [Acoustics Research Institute, Austrian Academy of Sciences, Wohllebengasse 12-14, A-1040 Vienna (Austria)

    2011-05-20

    Loosely speaking, a semi-frame is a generalized frame for which one of the frame bounds is absent. More precisely, given a total sequence in a Hilbert space, we speak of an upper (resp. lower) semi-frame if only the upper (resp. lower) frame bound is valid. Equivalently, for an upper semi-frame, the frame operator is bounded, but has an unbounded inverse, whereas a lower semi-frame has an unbounded frame operator, with a bounded inverse. We study mostly upper semi-frames, both in the continuous and discrete case, and give some remarks for the dual situation. In particular, we show that reconstruction is still possible in certain cases.

  15. [National pharmaceutical policy in Colombia and social security reform: access and rational use of medicines].

    Science.gov (United States)

    Mejia Restrepo, Samuel; Velez Arango, Alba Lucía; Buritica Arboleda, Olga Clemencia; Arango Mejia, María Cristina; Rio Gomez, Jaime Alberto del

    2002-01-01

    Based on the new social security system in Colombia (1993), which establishes equity and mandatory care as the basis for public health care provision, the authors analyze whether the formulation and implementation of pharmaceutical policy promote accessibility, availability, and rational use of medicines, thereby contributing to equity in health. Two approaches were used: a macro approach centered on the legal framework and various actors in the reform process and a micro approach related to the processes and results in the drug supply system. The authors studied the legal instruments backing the country's pharmaceutical policy and evaluated their application, using indicators and a specific disease (diabetes mellitus) as a marker. Although there is a legal framework providing the people's right to access health care services and essential medicines, the country lacks a comprehensive pharmaceuticals policy. Most of the institutions experience problems in distributing the medicines listed under the Mandatory Health Plan, a low percentage of medicines is dispensed at zero cost, and a major portion of patients purchase medicines through associations of diabetics or rely on alternative medicine. The study unveiled several obstacles to equity in health care coverage and access to essential medicines.

  16. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    these constraints into opportunities for women by reflecting on how they can mitigate risks, adapt to climatic challenges and find alternative coping strategies, but suggests that policy options to enhance food security need to respond to the integrated framework of the issues. Additionally, this paper posits......Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...

  17. Framing ‘fracking’

    NARCIS (Netherlands)

    Williams, Laurence; Macnaghten, Philip; Davies, Richard; Curtis, Sarah

    2017-01-01

    The prospect of fracking in the United Kingdom has been accompanied by significant public unease. We outline how the policy debate is being framed by UK institutional actors, finding evidence of a dominant discourse in which the policy approach is defined through a deficit model of public

  18. Decoding the canada's foreing and security policy: tracking the strategic and ethicliberal approaches of a middle power's behavior

    OpenAIRE

    Rodríguez, Federmán

    2010-01-01

    The article attempts to explain the main paradox faced by Canada at formulating its foreign policy on international security. Explained in economic and political terms, this paradox consists in the contradiction between the Canadian ability to achieve its strategic goals, serving to its own national interest and its dependence on the United States. The first section outlines three representative examples to evaluate this paradox: the Canada’s position in North American security regime, the US...

  19. External networks and institutional idiosyncrasies: the Common Security and Defence Policy and UNSCR 1325 on women, peace and security

    NARCIS (Netherlands)

    Joachim, J.M.; Schneiker, A.; Jenichen, A.

    2017-01-01

    In 2008, the Council of the European Union (EU) adopted a ‘Comprehensive Approach’ that outlines a strategy for securing gender mainstreaming; two years later, the Council introduced a set of indicators to assess its implementation. The EU was responding to the United Nations Security Council’s call

  20. Foreign and Security Policy of the Newly Independent States: Balancing between Two Power Centers

    Directory of Open Access Journals (Sweden)

    Sergiy G. Fedunyak

    2014-12-01

    Full Text Available The article is focusing on the interplay between foreign policy agenda of the post-Soviet states at the one hand and internal policy developments in these countries at the other hand. One of the main explanations why the post-Soviet elites in non-Russian republics are pursuing the so-called multi-vectorialism in the foreign policy is that it serves as a strategy to maximize the most from having good relations both with East and West, and thus trying to perpetuate the monopoly of the power. Uzbekistan is a country in case, as Ukraine (and Moldova is (or was indeed also. At the same time, the special relations between the elites of post-Soviet countries and Moscow are very important in shaping the foreign policy agenda of these countries as a result of the Soviet legacy, i.e. the ties of the former Communist nomenklatura with Moscow are still playing a very important role in the most of the former Soviet republics. Another relevant variable in explaining the current state of affairs in the foreign and security issues of the post-Soviet states and the still dominant role of Russia is the fact that the West (NATO and EU especially are not very successful in trying to limit Moscow’s ambitions in the “near abroad”. This is making the leaders of most NIS to be obedient to Russia’s pretensions in lack of real support from the West in order to counteract these neo-imperial claims from the part of the former metropolis.

  1. Wind Development in the United States: A Comprehensive Policy Framework for Effective Wind Development as Framed by PJM Stakeholders

    Science.gov (United States)

    Stewart, Courtney A.

    Wind energy has been lauded as a resource for the United States to lessen its dependency on foreign fuels, reduce carbon output, and potentially create millions of jobs. Accordingly, wind energy is in the forefront of many government officials' minds throughout the United States; however, there are several barriers to wind farm development. This research reviews the social and political barriers to wind farm development and examines the successful renewable energy policies that have been used throughout Europe and the United States. This research consists of interviews with various stakeholders in the PJM region who compare and contrast renewable energy policies in Europe from those in the United States. The resulting information from the interviews creates a comprehensive policy framework that policy makers at all levels of government can utilize and refer to when discussing and drafting wind energy legislation.

  2. International coalitions in Brazil’s foreign policy: security and governance reform

    Directory of Open Access Journals (Sweden)

    Alcides Costa Vaz

    2012-04-01

    Full Text Available The text analyses the relevance and role of international coalitions as instruments and arenas for negotiation in the context of Brazilian foreign policy under Luis Inácio Lula da Silva (2003-2010, and the perspectives they bring to the attainment of the goal of reforming the spaces and instruments of global governance in the political, economic and security spheres. Under Lula da Silva, Brazil supported and resorted intensively to coalitions not only for their instrumental value for consolidating the country’s international presence and actions, but also due to the possibility that they could induce systemic change towards a more uneven pattern of power distribution, thus helping to overcome lasting political and economic international asymmetries.

  3. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  4. Security Policy and Infrastructure in the Context of a Multi-Centeric Information System Dedicated to Autism Spectrum Disorder.

    Science.gov (United States)

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.

  5. Policy in the Public Eye : Agenda-setting and framing dynamics of traditional and social media in relation to immigration and integration policies

    NARCIS (Netherlands)

    R. Dekker (Rianne)

    2016-01-01

    markdownabstractThe policy field of immigration and migrant integration is publicly and politically controversial. Consequently, issues related to immigration and migrant integration are regularly in the public eye of the media. This doctoral thesis analyzes how policy agendas in the domain of

  6. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  7. Ensuring Security of Supply of Natural Gas in the European Union’s Common Energy Policy

    Directory of Open Access Journals (Sweden)

    Andrei Teofil Postolachi

    2013-08-01

    Full Text Available The problematic of energy policy is nowadays widely disputed in the European Union community. In a global context characterized by highly and raising dependency of the economic activity on the energetic resources, the European authorities had launched a strategy in this sector which regards the problems of access to secure and affordable energy products. The aim of this paper is linked to the natural gas field of the European energetic concerns, and it assumes the high dependency of internal consumption on imports, more than half of the natural gas that is used in the 27 states comes from abroad. Ensuring a higher level of security in the supply is one of the goals that European Union wants to achieve on medium and long term. In these circumstances, actual measurements take into account different type of actions: stabilize relations with existing partner gas exporters (Russia, Algeria, Norway; diversification of transport routes coming from these countries, especially in the idea of trying to avoid transit countries (mainly Ukraine and Belarus; and finally opening discussions and investing in alternative routes which should transport the gas from new suppliers placed in the Caspian Sea or Central Asia region.

  8. The impact of security and intelligence policy in the era of cyber crimes

    Directory of Open Access Journals (Sweden)

    MSc. Bahri Gashi

    2016-07-01

    Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in  public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.

  9. Long-term forecasting of international relations as strategic planning of national security policy

    Directory of Open Access Journals (Sweden)

    A. I. Podberezkin

    2017-01-01

    Full Text Available The contemporary transformation and chaos in international relations reduce its predictability, which must be compensated by strengthening the normative content of its analysis that is in fact strategic planning. The deepening of international relations in recent years allows one to make a pessimistic conclusion about the most likely and dangerous scenario for the development of international relations - «the strengthening of military power struggles among the major local human civilizations» and they represent a militarypolitical coalitions and power centers. It should be noted that an effective tool for the implementation of this confrontation is the system of military and civilian instruments used to provide comprehensive multi-factor and multi-dimensional effect on an object. Today, the most striking example of such an integrated infl uence policy is the new public diplomacy. For implementation of such an integrated approach Russia needs to reform the system of national security to include in it not only the traditional enforcement agencies, but also the organizations of business and civil society, as well as to improve coordination between its individual parts. However, the implementation of such a reform is impossible without national ideology that forms the regulatory priorities of national development and national security

  10. Potential impacts of biofuel development on food security in Botswana: A contribution to energy policy

    International Nuclear Information System (INIS)

    Kgathi, Donald L.; Mfundisi, K.B.; Mmopelwa, G.; Mosepele, K.

    2012-01-01

    Biofuel development continues to be a critical development strategy in Africa because it promises to be an important part of the emerging bio-economy. However, there is a growing concern that the pattern of biofuel development is not always consistent with the principles of sustainable development. This paper assesses the potential of the impacts of biofuel development on food security in Botswana. Drawing on informal and semi-structured interviews, the paper concludes that there is potential for the development of biofuels in Botswana without adverse effects on food security due mainly to availability of idle land which accounted for 72% of agricultural land in the eastern part of the country in 2008. It is suggested that farmers could be incentivized to produce energy crops and more food from such land. Although it is hypothesized that the implementation of biofuel development programmes in other countries had an impact on local commodity prices during the period 2005–2008 in Botswana, it is argued that local biofuel production may not necessarily lead to a substantial increase in commodity food prices because land availability is not a major issue. The paper makes policy recommendations for sustainable biofuel development in Botswana. - Highlights: ► Biofuel development in Botswana can be pursued without harming food security. ► There is plenty idle land which could be used for biofuel and food production. ► Biofuel production will not lead to significant increases in food prices. ► There is need to define land for biofuels to avoid future scarcity of land for food production.

  11. Frames, agency and institutional change

    DEFF Research Database (Denmark)

    Rasmussen, Grane Mikael Gregaard; Jensen, Per Langaa; Gottlieb, Stefan Christoffer

    2017-01-01

    This study examines change and the sources influencing the formulation and diffusion of policies in construction. The change examined is the introduction of a benchmarking policy initiative in the Danish construction industry. Using institutional theory with emphasis on the concepts of frames...... and framings, we show how strategically motivated actors are able to frame policy problems in ways that disclose the mixture of motives, interests and institutional mechanisms at play in change processes. In doing so, we contribute to the literature on the role of agency in institutional change and the framing...

  12. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; State, Local... Administration, Information Security Oversight Office. ACTION: Notice of meeting. SUMMARY: In accordance with the... Committee. To discuss the matters relating to the Classified National Security Information Program for State...

  13. Media Framing

    DEFF Research Database (Denmark)

    Pedersen, Rasmus T.

    2017-01-01

    The concept of media framing refers to the way in which the news media organize and provide meaning to a news story by emphasizing some parts of reality and disregarding other parts. These patterns of emphasis and exclusion in news coverage create frames that can have considerable effects on news...... consumers’ perceptions and attitudes regarding the given issue or event. This entry briefly elaborates on the concept of media framing, presents key types of media frames, and introduces the research on media framing effects....

  14. Analysis of rice policy based on presidential instruction on household food security: simultaneous equation model

    Science.gov (United States)

    Sembiring, S. A.

    2018-02-01

    The objective of this research is to analyze the impacts of rice policy on the household food security. The research used cross section data, were collected from 74 respondent as determined by purposive sampling in Sei Rejo villages, the Sub District of Sei Rampah, Serdang Bedagai District in the Province of North Sumatera. Rice policy model specification uses the simultaneous equations consisting of 6 structural equations and 6 identity equations which was estimated using Two Stages Least Squares (2SLS) method. The results show that the effectiveness of government purchase price of dried harvest paddy gave a positive impact on paddy planted area and lead to an increase paddy production and an increase of the rice production gave a positive impact on household rice availability and household rice surplus, and the increase of household rice surplus gave the quantity of Raskin decrease, whereas the increase of fertilizers gave a negative impact on paddy planted area and lead to decrease paddy production and to decrease in rice production was followed by an decrease in household rice availability and household rice surplus, and the decrease of household rice surplus gave the quantity of Raskin increase.

  15. The Issue of Research Graduate Employability in Australia: An Analysis of the Policy Framing (1999-2013)

    Science.gov (United States)

    Molla, Tebeje; Cuthbert, Denise

    2015-01-01

    The prevalent knowledge economy discourse has direct implications for higher education policies and practices. It is expected that the higher education sector supports national economic competitiveness mainly through promoting scientific research, supporting technological transfer and innovation, and producing "knowledge workers" such as…

  16. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  17. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  18. The Ripple Effect of Virginia Tech: Assessing the Nationwide Impact on Campus Safety and Security Policy and Practice

    Science.gov (United States)

    Rasmussen, Chris; Johnson, Gina

    2008-01-01

    This report is the result of a nationwide survey conducted in March 2008 of student life officers and campus safety directors to assess the impact of the April 2007 shootings at Virginia Tech on campus safety and security policy and practice. Discussion areas include: (1) Student Privacy vs. Need-to-Know; (2) Prevention, Mitigation and Recovery;…

  19. Framing the Newspaper Crisis

    DEFF Research Database (Denmark)

    Bruggemann, Michael; Humprecht, Edda; Kleis, Rasmus

    2016-01-01

    This article argues that discourses of a newspaper crisis should not be regarded simply as descriptions of the actual state of the press but also as a means by which strategic actors frame the situation. The emerging frames can have substantial consequences for media policy making. The study...... as well as a qualitative analysis of policy documents and relevant media coverage. The study demonstrates that debates on the newspaper crisis are only partly influenced by (1) economic realities and (2) media policy traditions in the six countries but also reflect (3) the strategic motives of powerful...... actors and (4) the diffusion of frames across borders, particularly those coming from the United States. A transnationally uniform paradigm emerges according to which the state is expected to play the role of a benevolent but mostly passive bystander, while media companies are expected to tackle...

  20. Prostitution Policies in Switzerland and the City of Zurich: A Critical Frame Analysis of Official Documents and NGO Papers

    OpenAIRE

    Isler, Corinne

    2016-01-01

    The phenomenon of prostitution has been controversial in many countries, including Switzerland. Policy regimes on prostitution differ drastically between countries. In recent years, there have been two opposing trends regarding the reform of prostitution laws. Some countries, such as Germany and the Netherlands, have moved towards legalisation and normalisation of the sex industry. Prostitution is thereby regarded as a normal trade and feminist supporters of this model focus mainly on legal r...

  1. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  2. Greek National Security Concerns and the European Union’s Common Foreign and Security Policy: Consensus or Divergence?

    Science.gov (United States)

    2011-09-01

    Theodore A. Couloumbis et al. (New York: Pella Publishing Co., 1976). 12 In a similar manner, Constantine Stephanopoulos asserted that: “National aims... Stephanopoulos , “Issues of Greek Foreign Policy,” in The Greek Paradox- Promise vs. Prerformance, ed. Graham T. Allison and Kalypso Nikolaidis...Opportunities. Burlington, Vermont: Ashgate Publishing Ltd., 2010. Stephanopoulos , Constantine. “Issues of Greek Foreign Policy.” In The Greek Paradox

  3. U.S. Army War College Guide to National Security Issues. Third Edition, Volume 2. National Security Policy and Strategy

    Science.gov (United States)

    2008-06-01

    to Buddhist monks and nuns.7 Similarly, a sacred Jain text says, “One may not kill, ill-use, insult, torment, or persecute any kind of living being...While this power struggle illustrates direct conflict, how does the Congress routinely influence policy and strategy formulation in the national...logically flows from its appropriations role.7 The leaders of the foreign policy agencies routinely go to Capitol Hill to testify before various committees

  4. Framing scenarios of binational water policy with a tool to visualize, quantify and valuate changes in ecosystem services

    Science.gov (United States)

    Norman, Laura M.; Villarreal, Miguel L.; Niraula, Rewati; Meixner, Thomas; Frisvold, George; Labiosa, William

    2013-01-01

    In the Santa Cruz Watershed, located on the Arizona-Sonora portion of the U.S.-Mexico border, an international wastewater treatment plant treats wastewater from cities on both sides of the border, before discharging it into the river in Arizona. These artificial flows often subsidize important perennial surface water ecosystems in the region. An explicit understanding of the benefits of maintaining instream flow for present and future generations requires the ability to assess and understand the important trade-offs implicit in water-resource management decisions. In this paper, we outline an approach for modeling and visualizing impacts of management decisions in terms of rare terrestrial and aquatic wildlife, vegetation, surface water, groundwater recharge, real-estate values and socio-environmental vulnerable communities. We identify and quantify ecosystem services and model the potential reduction in effluent discharge to the U.S. that is under scrutiny by binational water policy makers and of concern to stakeholders. Results of service provisioning are presented, and implications for policy makers and resource managers are discussed. This paper presents a robust ecosystem services assessment of multiple scenarios of watershed management as a means to discern eco-hydrological responses and consider their potential values for future generations living in the borderlands.

  5. The policy of import substitution as the basis for economic security and well-being of society

    Science.gov (United States)

    Makasheva, Yu S.; Makasheva, N. P.; Gromova, A. S.; Andreeva, N. V.; Ishtunov, S. A.

    2016-09-01

    The study presents the analysis of import substitution opportunities on separate branches of economic activity, preceding the realization of import substitution policy with the aim to support national economic security, which is essential for the contemporary society welfare insurance. Currently, social well-being is considered to be the reflection of economic activity, the instrument of state influence on the society, as well as an indicator of the social security system. Due to the fact that Russia is integrated into the world economy, the foreign-economic policy currently is playing an important role in the development of national security and the state's interest to the spheres of economy considering external and internal threats. Decline in external economic conditions may result in serious consequences for the functioning and development of the country as well as for the trade and investment activities, which will further lead to the decline in export, withdrawal of capital, recession of industrial production, trade and investment sphere, fall of GDP and living standards. Thus, considering the current state of instability in the world economy and the growing political tension in relation to Russian Federation, the measures to increase economic security in the country should be taken. The policy of import substitution is considered to be one of the major solutions nowadays.

  6. Framing politics

    NARCIS (Netherlands)

    Lecheler, S.K.

    2010-01-01

    This dissertation supplies a number of research findings that add to a theory of news framing effects, and also to the understanding of the role media effects play in political communication. We show that researchers must think more about what actually constitutes a framing effect, and that a

  7. On Framing

    DEFF Research Database (Denmark)

    Peder Pedersen, Claus

    2018-01-01

    On framing as artistic and conceptual tool in the works of Claudia Carbone. Contribution to exhibition at the Aarhus School of Architecture.......On framing as artistic and conceptual tool in the works of Claudia Carbone. Contribution to exhibition at the Aarhus School of Architecture....

  8. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  9. Food Supply Security and Import Substitution as the Key Strategic Objectives of the Modern Agricultural Policy

    Directory of Open Access Journals (Sweden)

    Anatoly Ivanovich Altukhov

    2015-09-01

    Full Text Available A crucially new social- and economic situation has shaped up by now in the rural areas and agricultural sphere; in its many instances such situation does not fit in the national agricultural policy in effect called upon to be a long-term instrument for economic adjustment of the agro-food market and state support of the agricultural sphere, most significantly, its foundation — the farming sector. Ensuring of food supply security by import substitution in the age of the national farm product markets globalization is possible in the macro-economic conditions promoting the development of the agricultural sector. The main reason that retards this sector development is inequitable cross-sector exchange at sacrifice of the agricultural industry. The article sets forward and approbates the author’s method of simple assessment procedure of how the price cross-sector relations and state financial support (in the form of subsidies of the agricultural enterprises influence their profitability generation. Further to the assessment, the following conclusions have been made: — in view of the tangible contribution of the agricultural sector to the country economy, this sector is self-reliant for its own development, i.e. the state is reasonably in a position to increase expenses for eliminating negative consequences of inequitable crosssector exchange; — the amount of expenses for state financial support is supposed to enable the agricultural commodity producers to generate profitability to the level that can stimulate the farm workers’ labour efficiency and build up a system of affordable credit facilities for the objects of techno-engineering modernization necessary to produce competitive products. — the issue of improving the competitiveness of agricultural production should be addressed in the first place at the federal level. Among the essential factors to increase the competitiveness of specific types of domestic food products and

  10. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  11. Among cosmopolitan values and strategic interests: liberal and realist discourses of canada’s international security policy during post- cold war

    OpenAIRE

    Rodríguez M., Federmán

    2014-01-01

    The purpose of the article is to explain the liberal and realist discourses that underpinned the Canadian International Security Policy (CISP) during the post-Cold War. In particular, it offers evidence to show that Canadian governments inevitably debate between cosmopolitan values and strategic interests in formulating their respective policies of international security. After considering how liberal and realist orientations of this policy have been studied in the literature on CISP, it expl...

  12. Effects of Alternative Framing on the Publics Perceived Importance of Environmental Conservation

    Directory of Open Access Journals (Sweden)

    Amanda E Sorensen

    2015-05-01

    Full Text Available Effective communication of science to the general public is important for numerous reasons, including support for policy, funding, informed public decision making, among others. Prior research has found that scientists participating in public policy and public communication must frame their communication efforts in order to connect with audiences. A frame is the mechanism that individuals use to understand and interpret the world around them. Framing can encourage specific interpretations and reference points for a particular issue or event; especially when meaning is negotiated between the media and public audiences. In this study, we looked at the effect of framing within an environmental conservation context. To do this we had survey respondents rank common issues, among them being environmental conservation, from most important to least important for the government to address. We framed environmental conservation using three synonymous terms (environmental security, ecosystem services, and environmental quality to assess whether there was an effect on rankings dependent on how we framed environmental conservation. We also investigated the effect of individuals’ personality characteristics (identity frame on those environmental conservation rankings. We found that individuals who self-identified as environmentalist were positively associated with ranking highly (most important environmental conservation when it was framed as either environmental quality or ecosystem services, but not when it was framed as environmental security. Conversely, those individuals who did not rank themselves highly as self-identified environmentalists were positively associated with environmental conservation when it was framed as environmental security. This research suggests that framing audience specific messages can engender audience support in hot-button issues such as environmental conservation and climate change.

  13. Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014: Changes and Continuities

    Directory of Open Access Journals (Sweden)

    Ana Claudia Cifali

    2017-03-01

    Full Text Available Since mid-1980s crime rates in Brazil started to increase with the transition from military dictatorship to democracy, a period marked by the rise of poverty and hyperinflation. Given levels of police corruption and protection of criminal gangs, trust in the criminal justice system was low, leading to a heightened dependence on private security, gated communities and the politicisation of law and order politics. An impressive punitive turn began at in the 1990s. This paper analysed penal policies under successive left-wing Lula and Dilma governments from 2003 to 2014. During this period the rise of ‘postneoliberal’ and ‘postneoconservative’ politics, led by the Workers Party, developed governmental strategies and initiatives that formulated and legitimized rich and complex expressions of traditionally left-wing politics. Despite the simultaneous implementation of distributive policies, the increase of human development levels throughout the country, the reduction of social inequalities and the redirection of the official discourse of Federal Government security policies towards crime prevention, incarceration rates continued to increase. This article examines why efforts to build an effective public security policy committed to upholding civil rights and improving the control of police and police activities have failed.

  14. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available , information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure [op cit]. With developing nations such as South Africa... and approach In the case of Estonia, multiple botnets were used to conduct Distributed Denial of Service (DDoS) attacks against the Estonian Critical National Infrastructure, media, telecommunications and the main banks. Routers at the main Internet Service...

  15. The immigrant and the misunderstanding of emergency: The influence of frame security in the practical experimentation of an innovative one of cultural mediation on road / L’immigrato e il malintenso della sicurezza: L’influenza del frame sicuritario nella sperimentazione di una practica innovative di mediazione culturale su strada

    Directory of Open Access Journals (Sweden)

    Vincenzo Romania

    2009-10-01

    , mainly, oPadova (Italy in 2007. I focus, mainly, oPadova (Italy in 2007. I focus, mainly, on the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings produced by frame of security n the misunderstandings

  16. Framing obesity in UK policy from the Blair years, 1997-2015: the persistence of individualistic approaches despite overwhelming evidence of societal and economic factors, and the need for collective responsibility.

    Science.gov (United States)

    Ulijaszek, Stanley J; McLennan, Amy K

    2016-05-01

    Since 1997, and despite several political changes, obesity policy in the UK has overwhelmingly framed obesity as a problem of individual responsibility. Reports, policies and interventions have emphasized that it is the responsibility of individual consumers to make personal changes to reduce obesity. The Foresight Report 'Tackling Obesities: Future Choices' (2007) attempted to reframe obesity as a complex problem that required multiple sites of intervention well beyond the range of personal responsibility. This framing formed the basis for policy and coincided with increasing acknowledgement of the complex nature of obesity in obesity research. Yet policy and interventions developed following Foresight, such as the Change4Life social marketing campaign, targeted individual consumer behaviour. With the Conservative-Liberal Democrat government of 2011, intervention shifted to corporate and individual responsibility, making corporations voluntarily responsible for motivating individual consumers to change. This article examines shifts in the framing of obesity from a problem of individual responsibility, towards collective responsibility, and back to the individual in UK government reports, policies and interventions between 1997 and 2015. We show that UK obesity policies reflect the landscape of policymakers, advisors, political pressures and values, as much as, if not more than, the landscape of evidence. The view that the individual should be the central site for obesity prevention and intervention has remained central to the political framing of population-level obesity, despite strong evidence contrary to this. Power dynamics in obesity governance processes have remained unchallenged by the UK government, and individualistic framing of obesity policy continues to offer the path of least resistance. © 2016 World Obesity.

  17. Framing Gangnam Style

    Directory of Open Access Journals (Sweden)

    Hyunsun Catherine Yoon

    2017-08-01

    Full Text Available This paper examines the way in which news about Gangnam Style was framed in the Korean press. First released on 15th July 2012, it became the first video to pass two billion views on YouTube. 400 news articles between July 2012 and March 2013 from two South Korean newspapers - Chosun Ilbo and Hankyoreh were analyzed using the frame analysis method in five categories: industry/economy, globalization, cultural interest, criticism, and competition. The right-left opinion cleavage is important because news frames interact with official discourses, audience frames and prior knowledge which consequently mediate effects on public opinion, policy debates, social movement and individual interpretations. Whilst the existing literature on Gangnam Style took rather holistic approach, this study aimed to fill the lacuna, considering this phenomenon as a dynamic process, by segmenting different stages - recognition, spread, peak and continuation. Both newspapers acknowledged Gangnam Style was an epochal event but their perspectives and news frames were different; globalization frame was most frequently used in Chosun Ilbo whereas cultural interest frame was most often used in Hankyoreh. Although more critical approaches were found in Hankyoreh, reflecting the right-left opinion cleavage, both papers lacked in critical appraisal and analysis of Gangnam Style’s reception in a broader context of the new Korean Wave.

  18. Framing Light Rail Projects

    DEFF Research Database (Denmark)

    Olesen, Mette

    2014-01-01

    In Europe, there has been a strong political will to implement light rail. This article contributes to the knowledge concerning policies around light rail by analysing how local actors frame light rail projects and which rationalities and arguments are present in this decision-making process...

  19. Testimony before the US-China Economic Security Review Commission: China's Agriculture Policy and US Access to China's Market

    OpenAIRE

    Dermot J. Hayes

    2013-01-01

    Testimony before the US-China Economic and Security Review Commission on April 25, 2013, by Dermot Hayes, professor of Economics and Finance, Iowa State University. Testimony covers impacts on food demand from China's rising incomes and urbanization; the viability of China's attempt to remain self-sufficient in meat and key staple crop production under inherent supply constraints, and the possible technological- and policy-based measures they may pursue in regard of such constraints; and, the...

  20. The effects of national policy on refugee welfare and related security issues a comparative study of Lebanon, Egypt and Syria

    OpenAIRE

    Cleary, Jessica E.

    2008-01-01

    Approved for public release, distribution unlimited The growing and persistent nature of today's protracted refugee situations pose significant threats to the host countries and regions that support these vulnerable people. While stateless, refugees fall under the protection of the international community and its laws. However, it is the effects of state policy that actually shape the living conditions and the opportunities available for refugees, and in turn influence the security re...

  1. Modelling multiple threats to water security in the Peruvian Amazon using the WaterWorld Policy Support System

    OpenAIRE

    A. J. J. van Soesbergen; M. Mulligan

    2013-01-01

    This paper explores a multitude of threats to water security in the Peruvian Amazon using the WaterWorld policy support system. WaterWorld is a spatially explicit, physically-based globally-applicable model for baseline and scenario water balance that is particularly well suited to heterogeneous environments with little locally available data (e.g. ungauged basins) and which is delivered through a simple web interface, requiring little local capacity for use. The model is capable of pr...

  2. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  3. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  4. Framing financial culture

    DEFF Research Database (Denmark)

    Just, Sine Nørholm; Mouton, Nicolaas T.O.

    2014-01-01

    between competing frames leads to the conclusion that this political “blame game” is related to struggles over how to define the scandal, how to conceptualize its causes, and policy recommendations. Banks may have lost the battle of “Liborgate,” but the war over the meaning of financial culture is far...... from over. Originality/value – The paper is theoretically and methodologically original in its combination of the theories of framing and stasis, and it provides analytical insights into how sense is made of financial culture in the wake of the financial crisis....

  5. The Employee Retirement Income Security Act of 1974: Policies and Problems

    Science.gov (United States)

    Alperin, Stuart N.; And Others

    1975-01-01

    Congress enacted the Employment Retirement Income Security Act of 1974 (ERISA) to help assure economic security in retirement. This analysis includes description of the growth, operation, and inequities within the private pension system and analysis of ERISA: (1) participation, vesting and joint and survivor annuities; (2) funding and plan…

  6. DoDs Policies, Procedures, and Practices for Information Security Management of Covered Systems (REDACTED)

    Science.gov (United States)

    2016-08-15

    19 Use of Computer -Processed Data...practices for covered systems. The Act describes covered systems as national security systems2 and Federal computer systems that provide access to...capabilities are designed to detect and prevent the unauthorized use and transmission of national security systems information. 8 Forensics is the

  7. The Effects of National Policy on Refugee Welfare and Related Security Issues: A Comparative Case Study of Lebanon, Egypt and Syria

    National Research Council Canada - National Science Library

    Cleary, Jessica E

    2008-01-01

    .... However, it is the effects of state policy that actually shape the living conditions and the opportunities available for refugees, and in turn influence the security repercussions they can set in motion...

  8. Framing Fragmentation

    DEFF Research Database (Denmark)

    Bundgaard, Charlotte

    2009-01-01

    to create architectural meaning and give character to an architecture of fragmentation. Layers are both seen as conceptual as well as material frames which define certain strong properties or meanings in the architectural work. Defining layers is a way of separating and organizing; it both defines...

  9. Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan

    Science.gov (United States)

    Nabi, Syed Irfan; Nabi, Syed Waqar; Tipu, Syed Awais Ahmed; Haqqi, Bushra; Abid, Zahra; Alghathbar, Khaled

    The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9th globally in 2009 in terms of subscription. The research methodology was case study based in which perceptions were gathered as well as thematic analysis of the interviews was done. The research focus is on breach of data integrity and confidentiality by the internal users in the industry and the perception of improvement, if any, of the data security due to implementation of security management policies and controls. The results show that information security measure are perceived to have a positive impact on reducing data confidentiality and integrity breaches but still falls short of what is required. It concludes that security policies might improve the situation provided, firstly, that the top managements takes information security seriously, and secondly, the non-technical human aspects of the issues are taken into consideration.

  10. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    Science.gov (United States)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  11. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  12. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... Both the official U.S. as well as outside assessments increasingly point to Pakistan's failure to prevent Taliban and other militant infiltration into Afghanistan as a cause of the security deterioration...

  13. National Security Space Policy in the U.S. and Europe. Trends and Choices

    National Research Council Canada - National Science Library

    Gholz, Eugene; Sabathier, Vincent; Sapolsky, Harvey

    2002-01-01

    Since the end of the Cold War, the availability of new technologies and changes in the national security environment have raised the possibility of substantial new demand for military space systems...

  14. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  15. Audience reactions to peace journalism: How supporters and critics of the Israeli policy process escalation and de-escalation oriented media frames

    Directory of Open Access Journals (Sweden)

    Stephanie Thiel

    2014-04-01

    Full Text Available This paper reports on an experiment that uses the Israeli-Palestinian conflict as a natural laboratory for studying how recipients make sense of escalation vs. de-escalation oriented news articles. The results of the study indicate that media frames and individual frames have both a direct effect and complex interaction effects on participants’ text understanding. Particularly the effect of media war frames diminishes if they are incongruent with participants’ individual frames, and the propaganda function of reports about violence and human casualties can be neutralized if framed according to a peace frame. If participants had a priori positioned themselves in favor of the perpetrator, they may produce reactance, however.

  16. What is the place of the energy supply security and energy independence in the energy policy?

    International Nuclear Information System (INIS)

    2001-12-01

    Since the petroleum crisis and the electric power cuts of the 1999 storm, the energy security interest is growing. The author recall the structural risks of the energy systems and the vulnerability of the occidental economies to the supply disruptions. They propose then a long term cooperation between producer and consumer countries, a development of operational tools to face the crisis and a supply security inside the europe. (A.L.B.)

  17. Violence and human security policy relevance of a central health linkage

    OpenAIRE

    Meddings, David; Bettcher, Douglas; Ghafele, Roya

    2003-01-01

    Violence, as a human security threat, constitutes a core public health issue. Finally, in an era of globalized threats requiring international cooperation, the discussion focuses on the interstate spillover effects of violence, or in other words, the transnational dimensions of the problem. These arguments are linked to the notion of security as a “contested concept” in the 21st century; in particular our analysis focuses on the implications of the violence case study for conceptualizing sove...

  18. Attacking or Defending? Jurisdiction of the Court of Justice in the EU's Common Foreign and Security Policy

    DEFF Research Database (Denmark)

    Butler, Graham

    2016-01-01

    The Union’s external competence is fragmented, as are the powers of the institutional bodies involved in external relations. Despite the Union being depillarised after the Treaty of Lisbon coming into force, the ‘specific rules and procedures’ of the Common Foreign and Security Policy (CFSP......’s jurisdiction, it is inevitable that the Court would be placed in a position where it is to rule on its limited remit, and the extent of this perceived boundary within the current Treaties. External relations are an important part of the Court’s work, and cases arise from both preliminary references and direct...

  19. Foreign policy considerations in dealing with Afghanistan’s refugees: when security and protection collide

    Directory of Open Access Journals (Sweden)

    Joanne van Selm

    2002-06-01

    Full Text Available The values of democracy, justice and freedom arestated goals of the foreign policies of Western states.These are the same values that the terrorist attacksof 11 September challenged. They are also the valuesthat should inform refugee protection policies.

  20. Policy and strategy of the Cuban Regulatory Organization for the establishment of the legal and regulation frame; Politica y estrategia del Organo Regulador Cubano para el establecimiento del marco legal y reglamentario

    Energy Technology Data Exchange (ETDEWEB)

    Arnau F, A.; Alonso G, I.; Sarabia M, I. [Centro Nacional de Seguridad Nuclear (Cuba)

    2006-07-01

    The National Center of Nuclear Security, Cuban entity authorized to exercise the regulation functions and control of the security of the use of the nuclear energy and the accounting and control of the nuclear materials, has among its functions, to elaborate and to propose for its approval to the corresponding instances, the juridical, technical dispositions and of procedure in its competition sphere, what demands that in this sense clear guidelines exist to carry out this social mission. The fact of assuming this function demands the necessity of a Politics for the establishment of the legal and regulation frame that expresses in a coherent way the general lines on those that it behaves the elaboration of the standards that govern this activity, to reach the end in an efficient and effective way and consequently the adoption of a Strategy that frames the necessary actions that assure the one execution and development of the politics and the pursuit of the precise rules for an optimal result. The Politics for the establishment of the legal and regulation frame of the National Center of Nuclear Security is based on a group of general principles that mark the guidelines so that this activity is chord to the national juridical system, to the good ones international practices and the recommendations of the International Atomic Energy Agency appropriated to the national experience and the daily reality, being this a transparent and reconciled process in such a way that the addressee of these standards can contribute their recommendations to the ends of achieving an effective applicability of the legal and regulation frame that governs this activity in the country. The development and pursuit of these principles is sustained in a group of actions to the help of the strategy for the establishment of the legal and regulation frame, embracing the actions so much during the process of elaboration of the legal frame, its systematic revision, the publication and distribution

  1. Framing Feminism

    OpenAIRE

    Mendes, Kaitlynn

    2011-01-01

    This article analyses the framing in four British and American newspapers of the second wave feminist movement during its most politically active period (1968–1982). Using content and critical discourse analysis of 555 news articles, the article investigates how movement members were represented, what problems and solutions to women’s oppression/inequality were posed and whose voices were used. This paper identifies: opposition to the movement, support for the movement, conflict and movement ...

  2. Energy policy for Europe. Ensuring secure and low-carbon energy in the EU's internal market. Interim report

    International Nuclear Information System (INIS)

    Egenhofer, C.; Hammes, J.J.; Pedersen, K.

    2006-12-01

    In early March 2006, the European Commission re-launched the discussion on an Energy Policy for Europe with the 2006 publication of its Green Paper 'Secure, Competitive and Sustainable Energy for Europe'. This manifests the EU's will to broaden its reflection on its future energy systems, taking into account increasing market liberalisation and globalisation, environmental pressures, technological challenges and the growing import dependency from politically unstable regions. Other major contributions to this debate include the climate change communication 'Winning the battle against climate change' (published in 2005), the Green Paper on Energy Efficiency (2005), the Energy Efficiency Action Plan (2006), the ongoing works of the High Level Group on Competitiveness, Energy and the Environment (2006) and the enquiry into the energy sector by DG Competition of the European Commission in 2006. The Spring European Council in March 2006 welcomed the Energy Policy Green Paper and committed itself adopting a prioritised Action Plan at its spring session in 2007, to be prepared by the European Commission and the Energy Council. Early next year, the European Commission will table both the EU Strategic Energy Review, accompanied by a number of sectoral policies and a Green Paper on future climate change policy for the period post-2012 when the Kyoto Protocol expires. Both the EU Strategic Energy Review and the post-2012 Green Paper will outline the European Union (EU) 'energy and climate change vision' and propose a roadmap towards achieving EU energy and climate change objectives, namely, how to ensure the competitiveness of European industries while at the same time combating climate change and ensuring security of energy supply. To contribute to this debate, the CEPS multi-stakeholder Task Force on 'energy policy for Europe' has presented this Interim Report, which attempts to develop the key elements for an EU energy policy framework. Although this report will focus

  3. Understanding the Role of Bureaucracy in the European Security and Defence Policy: The State of the Art

    Directory of Open Access Journals (Sweden)

    Maurer Heidi

    2010-08-01

    Full Text Available The establishment of the European Security and Defence Policy (ESDP in 1999 has led to the creation of a whole range of bureaucratic bodies in Brussels and the national capitals. These bodies support the crisis management operations of the European Union. This review article presents the state of the art of academic research on the role of bureaucracy in this recent policy area. It argues that the growing institutional complexity and the constant interaction between actors at the national and European level require scholars to go beyond the dominant approaches of International Relations. Using insights from comparative politics, public administration and multi-level governance, this article considers four important questions: who these civil servants are, why they matter, how they interact, and how they are controlled politically and democratically.

  4. Evaluation and the Framing of Race

    Science.gov (United States)

    House, Ernest R.

    2017-01-01

    Racial framing can have strong effects on programs, policies, and even evaluations. Racial framing developed as a justification for the exploitation of minorities and has been a primary causal factor in the persistence of racism. By being aware of its pattern, structure, origins, and how racial framing generates effects, we can significantly…

  5. Columbia's Democratic Security and Defense Policy in the Demobilization of the Paramilitaries

    National Research Council Canada - National Science Library

    Perdomo, Jose R

    2007-01-01

    .... To deal with these complex issues, President Alvaro Uribe's administration designed a strategy known as "Democratic and Defense Policy," which showed significant results for the period 2002 to 2006...

  6. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    This study uses a computable general equilibrium model to evaluate the fiscal and welfare costs of the market stabilisation and insulating food policy of India during the 2007-08 global food crisis. We demonstrate that domestic food grain price stabilisation through simultaneously subsidising...... consumers and producers and restricting exports entailed huge fiscal costs and equally large welfare costs to India, an outcome that is almost always the worst as compared to the alternative policy mixes examined in this study. While the most market-oriented domestic and trade policy alternatives that would...... generate better welfare effects and the least fiscal costs may not be feasible due to political economy considerations, we argue that there exist some 'middle-ground' policy mixes featuring partial relaxations of domestic subsidies on either food grains or fertilisers and/or less restrictive border...

  7. What's in a word? The framing of health at the regional level: ASEAN, EU, SADC and UNASUR.

    Science.gov (United States)

    Amaya, Ana B; Rollet, Vincent; Kingah, Stephen

    2015-12-01

    The Association of Southeast Asian Nations, the European Union, the Southern African Development Community and the Union of South American Nations have increasingly been involved in health diplomacy in the past decade, yet little is known about how they frame health as a foreign policy issue and how this has an impact on their prioritisation of policies. For this, we conducted a review of existing grey and peer-reviewed literature that address regional integration and health, as well as a documentary review according to security, development, trade, human rights, moral/ethical reasonings and global public goods frames identified in the literature. The policy frames identified responded to the challenges these regions currently face. The Association of Southeast Asian Nation's struggle with re-emerging diseases has led to favouring a securitisation approach to health, the European Union approaches health as a cross-cutting policy issue, the Southern African Development Community presents health as a driver for development, and while the Union of South American Nations emphasises health as a human right and addresses the social determinants of health as an ethical imperative. Overall, these policy frames were useful in analysing the framing of health in foreign policy at the regional level. However, within our analysis, we identified a new frame that approaches health as an intersectoral issue. The impact of regional organisations' forward will depend on their ability to harness their convening power and speak in a coherent voice on health matters.

  8. What’s in a word? The framing of health at the regional level: ASEAN, EU, SADC and UNASUR

    Science.gov (United States)

    Amaya, Ana B; Rollet, Vincent; Kingah, Stephen

    2015-01-01

    The Association of Southeast Asian Nations, the European Union, the Southern African Development Community and the Union of South American Nations have increasingly been involved in health diplomacy in the past decade, yet little is known about how they frame health as a foreign policy issue and how this has an impact on their prioritisation of policies. For this, we conducted a review of existing grey and peer-reviewed literature that address regional integration and health, as well as a documentary review according to security, development, trade, human rights, moral/ethical reasonings and global public goods frames identified in the literature. The policy frames identified responded to the challenges these regions currently face. The Association of Southeast Asian Nation’s struggle with re-emerging diseases has led to favouring a securitisation approach to health, the European Union approaches health as a cross-cutting policy issue, the Southern African Development Community presents health as a driver for development, and while the Union of South American Nations emphasises health as a human right and addresses the social determinants of health as an ethical imperative. Overall, these policy frames were useful in analysing the framing of health in foreign policy at the regional level. However, within our analysis, we identified a new frame that approaches health as an intersectoral issue. The impact of regional organisations’ forward will depend on their ability to harness their convening power and speak in a coherent voice on health matters. PMID:26635496

  9. Political Influence on Japanese Nuclear and Security Policy: New Forces Face Large Obstacles

    OpenAIRE

    Tatsumi, Yuki; Weiner, Robert

    2014-01-01

    Japan’s nuclear weapons policy has long enjoyed a stable, if somewhat internally inconsistent, equilibrium. Anti-proliferation efforts co-exist with reliance upon the United States’ nuclear deterrent, alongside dependence on a nuclear energy program robust enough to potentially support nuclear weapons capability. These policies have been promoted and maintained by Japan’s bureaucracy rather than by political bargains, with their bureaucratic proponents separately stovepipe...

  10. A Security plan for LMOs - concentrated on environmental policy of Biosafety Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Park, Yong Ha [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    Biotechnology industry in Korea is raised by the national support. Also, Korea imports 70% of entire agricultural products. Considering the present situation in Korea, signing a Biosafety Protocol is necessary to prevent harm by LMOs and to protect associated biotechnological industry. Therefore, the problems on signing Biosafety Protocol were analyzed and the environmental policy to be pursued was proposed. This study result will be a cornerstone to prepare a definite environmental policy by government. 54 refs., 7 figs., 27 tabs.

  11. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  12. Global Strategy Choices (GSC) : Prognosis and Strategic Planning for European Foreign and Security Policy

    NARCIS (Netherlands)

    Zwitter, Andrej; Kettle, Lawrence

    2015-01-01

    The European Security Strategy (ESS) is currently being reformulated. This working paper puts forward a new methodological approach in the construction of global strategies for stakeholders in the international system. It makes the case that contemporary strategy formulation (including the ESS)

  13. Security Assistance International Logistics, Training, and Technical Assistance Support Policy and Responsibilities

    Science.gov (United States)

    2000-01-24

    assessment will be drawn from a variety of sources, such as checklists prepared by the in-country SAO, in-country surveys, and security assistance re...activity will prepare, coordinate, and execute the lease agreement with industry after HQDA (SAUS-IA- DSE ) obtains ASA(AL&T) approval as appropriate. d

  14. National Security and Immigration Policy: Reclaiming Terms, Measuring Success, and Setting Priorities

    Science.gov (United States)

    2006-10-31

    Villamil, “New Deportation Numbers Quoted,” Proceso /Apro (April 6, 2006). 256 “Horan Interview” (“The undocumented are not threat to security per se...database systems such as department of motor vehicle records, credit bureaus, court filings, and Internet search engines that compile address and other

  15. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ...). Approximately 18,000 U.S. troops remain in Afghanistan to combat the Taliban-led insurgency, but the United States and NATO have agreed to shift more of the security burden to NATO during 2006, and U.S...

  16. Brexit and Article 50 of the Treaty of the European Union: Implications for UK Energy Policy and Security

    Directory of Open Access Journals (Sweden)

    Augustine O. Ifelebuegu

    2017-12-01

    Full Text Available This paper articulates the potential implications of Brexit on energy policy and security in the United Kingdom (UK. Given the uncertainties associated with the decision to leave the European Union (EU, the need to consider its potential effects on the UK’s energy sector becomes even more pertinent. Through the lens of a few widely reviewed trade regimes in the light of Brexit, it can be observed that while UK energy policies are unlikely to change drastically, Brexit nevertheless threatens the UK’s capacity to safeguard its energy supply. The uncertainties following Brexit could arguably starve the UK’s upstream petroleum, electricity, and renewable energy sectors of their required investments. Both short and long-term impacts could result in UK residents paying more per unit of energy consumed in a “hard Brexit” scenario, where the UK exits the Internal Energy Market (IEM and must trade with the EU under World Trade Organisation rules. While a hard Brexit could aid the growth of the nascent shale gas industry, a negotiated withdrawal that includes some form of access to the IEM (a “soft Brexit” would be more beneficial for the future of energy security in the UK.

  17. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  18. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  19. Epilogue: global food security, rhetoric, and the sustainable intensification debate

    NARCIS (Netherlands)

    Kuijper, T.W.M.; Struik, P.C.

    2014-01-01

    The need to feed nine billion people in 2050 has given rise to widespread debate in science and policy circles. The debate is largely framed in neo-Malthusian terms, and elements of global food security (resilience of the food system, food quantity and quality, right to and access to food) demand

  20. “Post-Feminist” Era of Social Investment and Territorial Welfare? Exploring the Issue Salience and Policy Framing of Child Care in U.K. Elections 1983-2011

    Directory of Open Access Journals (Sweden)

    Paul Chaney

    2015-02-01

    Full Text Available Earlier work has tended to overlook the formative origins of child care policy in liberal democracies. Accordingly, this study examines mandate-seeking and parties’ envisioning of child care with reference to issue salience and policy framing in party manifestos in U.K. Westminster and regional elections. It reveals a significant increase in issue salience following its emergence as a manifesto issue in the 1980s, thereby confirming it as part of the wider rise of “valence politics.” The framing data reveal that a “post-feminist” discourse of “social investment” has generally displaced the political framing of child care as a gender equality issue. It is argued that this is inherently problematic and reflects parties’ failure to address ongoing gender inequality in the labor market. Notably, the data also illustrate the way devolution is leading to the territorialization of child care in the United Kingdom—no longer solely mandated in Westminster elections, policy is now contingent on the discursive practices of regional party politics and shaped by local socio-economic factors.

  1. Consumer Food Security and Labeling Intervention on Food Products through Public Policies in Romania

    Directory of Open Access Journals (Sweden)

    Dacinia Crina Petrescu

    2018-02-01

    Full Text Available The correct understanding of consumers’ food labeling knowledge and perceptions is a prerequisite to develop and implement coherent and appropriate food safety policies. One objective of the paper was to discover how often consumers access and use specific food label information. Another objective was to explore stakeholders’ preferences for several public policy options relevant for food safety. In this respect, a survey on a sample of 312 Romanian consumers and the evaluation of several public policy options by four stakeholder groups (food producers and sellers, doctors, fitness trainers, and consumers were carried out. The results revealed that the most frequently read types of information on the label were “expiration date” and “price”, closely followed by “quantity” and “brand”. Among tested public policies, those related to the traffic light labels and to the social interest messages with health claims were rewarded with high scores by investigated stakeholders. Although nutrition has a decisive impact on health state, nutrition information was not frequently read by people, thus justifying the implementation of a public policy meant to enhance consumers’ interest in and reading frequency of nutrition information on food label.

  2. FOOD SECURITY PROVIDING OF THE SVERDLOVSKAYA OBLAST POPULATION AS THE AGRARIAN POLICY BASIS

    Directory of Open Access Journals (Sweden)

    M.V. Fedorov

    2008-12-01

    Full Text Available Food safety may be interpreted as production systems attribute providing during different technological processes the security and the quality of food products. The key role in this is played by control systems over these processes. Any control system is based on the information data concerning efficiency and state of the system. This information is necessary for operative quality management and the frequency of hypothetic deviations may serve as a universal numeric indicator of the technological processes breakages. The basic elements of food security provision in the region are seen as the following: orientation on our own resources; agro industrial complex restructuring wits a due account of disproportions in its spheres; innovation changes in the production processes in view of competitiveness increase; nutrition improvement and health of the population.

  3. Russian foreign policy in the realm of European security through the lens of neoclassical realism

    Directory of Open Access Journals (Sweden)

    Elena Kropatcheva

    2012-01-01

    Full Text Available There are different views on (in-predictability and on (non-cooperation in Russian foreign policy towards the West, but also on the question about how - that is, through which theoretical framework - to interpret it. This essay aims at contributing to the debate around these three issues. Its goal is to demonstrate the expediency of using a neoclassical realist theoretical perspective, enhanced by the inclusion of such subjective factors as status/prestige and perceptions. While there are factors in Russian domestic and foreign policy which give it a certain degree of unpredictability, nevertheless, if it is studied in a comprehensive way, it turns out to be more consistent and predictable than it at first seems. Even though Russia is often accused of being anti-Western and non-cooperative, this argument does not hold true: Russian foreign policy is selective and includes both cooperative and non-cooperative tactics.

  4. Social Security reform: evaluating current proposals. Latest results of the EBRI-SSASIM2 policy simulation model.

    Science.gov (United States)

    Copeland, C; VanDerhei, J; Salisbury, D L

    1999-06-01

    The present Social Security program has been shown to be financially unsustainable in the future without modification to the current program. The purpose of this Issue Brief, EBRI's fourth in a series on Social Security reform, is threefold: to illustrate new features of the EBRI-SSASIM2 policy simulation model not available in earlier EBRI publications, to expand quantitative analysis to specific proposals, and to evaluate the uncertainty involved in proposals that rely on equity investment. This analysis compares the Gregg/Breaux-Kolbe/Stenholm (GB-KS) and Moynihan/Kerrey proposals with three generic or "traditional" reforms: increasing taxes, reducing benefits, and/or increasing the retirement age. Both proposals would create individual accounts by "carving out" funds from current Social Security payroll taxes. This analysis also examines other proposed changes that would "add on" to existing Social Security funds through the use of general revenue transfers and/or investment in the equities market. President Clinton has proposed a general revenue transfer and the collective investment of some of the OASDI trust fund assets in equities. Reps. Archer and Shaw have proposed a general revenue tax credit to establish individual accounts that would be invested partially in the equities markets. When comparing Social Security reform proposals that would specifically alter benefit levels, the Moynihan/Kerrey bill compares quite favorably with the other proposals in both benefit levels and payback ratios, when individuals elect to use the individual account option. In contrast, the GB-KS bills do not compare quite as favorably for their benefit levels, but do compare favorably in terms of payback ratios. An important comparison in these bills is the administrative costs of managing the individual accounts, since benefits can be lowered by up to 23 percent when going from the assumed low to high administrative costs. Moreover, allowing individuals to decide whether to

  5. Technology Security Policy: From the Cold War to the New World Order

    Science.gov (United States)

    1993-12-01

    Alic. Lemis M. Branscomb, Harvey Brooks, Ashton B. Carter, and Gerald L. Epstein, Beyond Spinoff: Military and Commercial Technologies in a Changing...97. Is Aaron Karp , "Controlling Weapons Proliferation: The Role of Export Controlw The Journal of Strategic Studies, March 1993, p. 24. 19 Balancing...The National Interest: U.S. National Security Export Controls and Global Economic Competition, op. cit., p. 98. 20 Karp , op. cit., p. 40. 21

  6. Exploring Resource Security Policy and Green Science and Technology in Asia

    Science.gov (United States)

    2014-04-01

    a “more pluralistic, non-European, non-Western world” where its dynamic economies have “retaken control of vast resources, huge assets, big markets...security and the dynamics of global politics cast within the Asian setting. Alongside the increasing urgency to extract and appropriate scarce...solar- powered microgrids that can provide clean light and charge phones to rural villagers. 18 Second, clean-energy is socialized as a critical

  7. Less is More: How A Reduced Foreign Policy Can Enhance America’s National Security

    Science.gov (United States)

    2000-01-01

    Hegel , Fukuyama postulated that history is neither a series of random events nor endlessly repeating cycles, but rather a straight line evolution in...tended to be the prevailing attitude and philosophy for national security strategists in the 20th century. Idealists and optimists have not fared...demise of the dictator. This was most clearly articulated by Francis Fukuyama in his landmark 1992 book, The End of History and the Last Man. He

  8. A Comparison of the Democratic Security Policy in Colombia and Provincial Reconstruction Teams in Iraq

    Science.gov (United States)

    2009-09-01

    Reforma Agraria - Incora was created to redistribute land. Over time, it did have some success in marginal areas. But it failed to prove the dynamo...Record. Bureau of Democracy, Human Rights, and Labor . Available at: www.state.gov. 62 Ibid., 1. 63 Presidency of the Republic, “Democratic Security and...assessment, statistics show a significan 2000 .”68 C. DEMOBILIZATION The process of demobilization in Colombia is currently an area of contention for

  9. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  10. Conditions of Poland’s foreign and security policy within the EU and NATO environment

    Directory of Open Access Journals (Sweden)

    Antczak- Barzan Anna

    2014-01-01

    Full Text Available The article is an attempt to answer the question about the state of Poland’s security after the first decade of the twenty-first century, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena to strengthen its international position as well as the level of its security. Thus, the aim is to identify those determinants which may contribute to establishing a stronger position and which can create problems and become a formidable challenge in the context of various aspects of security, and even develop into a threat. Unfortunately, the picture which comes out of the above mentioned analysis is not optimistic and the impression is that Poland did not use the chance it was given after the accession to the NATO and the EU.

  11. [Food and nutritional security: situation analysis of decentralization in the national public policy].

    Science.gov (United States)

    Vasconcellos, Ana Beatriz Pinto de Almeida; Moura, Leides Barroso Azevedo de

    2018-03-01

    The aim of this study was to analyze the situation with the decentralization of the Brazilian National System of Food and Nutritional Security (SISAN), created in 2006 under the Brazilian National Food and Nutritional Security Act (LOSAN). Based on the criteria for joining SISAN, as set out in Decree 7,272 of August 25, 2010, the authors analyzed data from the basic information surveys of the Brazilian Institute of Geography and Statistics, 2014 (Estadic e Munic/2014). The results show that decentralization of SISAN is still incipient at the municipal level, although all the states of Brazil have already joined the system. The social assistance sector has played an outstanding role in coordinating SISAN at the state and municipal levels, while in the latter the health sector has also played a relevant role. The analysis of food and nutritional security activities conducted to date, based on the sources of federal, state, and municipal funds, further shows that the federal sphere has still not played a strong inductive role capable of leading the expansion of SISAN. More effective funding mechanisms and the assignment of responsibilities to the states and municipalities are relevant factors for consolidating the system's state-level base and expanding the municipal base in the search for an identity and capillarity for SISAN.

  12. Security policy speculation of user uploaded images on content sharing sites

    Science.gov (United States)

    Iyapparaja, M.; Tiwari, Maneesh

    2017-11-01

    Innovation is developing step by step tremendously. As there are numerous social locales where information likes pictures, sound, video and so forth are shared by the client to each other. In concentrate to all exercises on social locales, there is need of protection to pictures. Because of this reason, I utilized Adaptive protection strategy forecast instrument to give security to the pictures. Issue identified with pictures is the huge issue in social locales like Facebook, twitter and so on. So here the part of a social thought, security to pictures, metadata and so on is produced. To conquer this issue we produced an answer which is 2 systems which understanding to a background marked by the pictures gives appropriated answer for them. Here we give an arrangement to the specific sort of pictures by characterizing them and in addition giving protection to pictures which are transferred agreement to a calculation that we utilized. Consequently as indicated by this arrangement expectation pictures take after a similar approach on up and coming pictures and give successful security to them.

  13. Putting Safety in the Frame

    Directory of Open Access Journals (Sweden)

    Valerie Jean O’Keeffe

    2015-06-01

    Full Text Available Current patient safety policy focuses nursing on patient care goals, often overriding nurses’ safety. Without understanding how nurses construct work health and safety (WHS, patient and nurse safety cannot be reconciled. Using ethnography, we examine social contexts of safety, studying 72 nurses across five Australian hospitals making decisions during patient encounters. In enacting safe practice, nurses used “frames” built from their contextual experiences to guide their behavior. Frames are produced by nurses, and they structure how nurses make sense of their work. Using thematic analysis, we identify four frames that inform nurses’ decisions about WHS: (a communicating builds knowledge, (b experiencing situations guides decisions, (c adapting procedures streamlines work, and (d team working promotes safe working. Nurses’ frames question current policy and practice by challenging how nurses’ safety is positioned relative to patient safety. Recognizing these frames can assist the design and implementation of effective WHS management.

  14. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  15. A Case for National Security: Using the Might Tuna to Frame U.S. Coast Guard’s Role in the Strategic Shift to the Pacific

    Science.gov (United States)

    2014-06-13

    Marine Conservation ( OMC ). This section discusses the roles and responsibilities of NMFS. “NMFS is the lead federal agency responsible for the...DOS also has a major role in international fisheries. The Office of Marine Conservation ( OMC ) is a part of the State Department’s Bureau of Oceans and...policy on a broad range of international issues concerning living marine resources. In executing this responsibility, OES/ OMC negotiates bilateral and

  16. Achieving Food Security and Environmental Sustainability in Southeast Asia: A Policy Challenge

    NARCIS (Netherlands)

    Mahanani WR; MNV

    2002-01-01

    De studie gaat over de mogelijke situatie in Zuid-Oost Azie anno 2030 wat betreft voedsel en milieu, en over noodzakelijke beleidsmaatregelen. Vijf mondiale scenario's zijn voor deze regio vergeleken, namelijk: FAO Agriculture Towards 2015/2030; Policy Reform en Market Forces uit concepten

  17. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, Andrzej; Meijl, van Hans; Overmars, Koen P.; Stehfest, Elke

    2017-01-01

    Recent research shows that the combined contributions of deforestation, forest degradation and peat land emissions account for about 15% of greenhouse gas emissions. The REDD policy which preserves forests and values standing forests, enables substantial emission reductions. Since agricultural

  18. Policy Analysis in National Security Affairs: New Methods for a New Era

    Science.gov (United States)

    2006-01-01

    downturn seems unlikely, periods of recession and slowed growth are real possibilities. If they occur, the result could be a stuttering world economy...policy analyst and a practitioner and teacher of this book’s analytical methods. Currently, he is Distinguished Research Profes- sor in the Center for

  19. Achieving Food Security and Environmental Sustainability in Southeast Asia: A Policy Challenge

    NARCIS (Netherlands)

    Mahanani WR; MNV

    2002-01-01

    To get a thorough picture on the possible situation of food and the environment in Southeast Asia in 2030 and to identify the areas that need policy intervention, five scenarios on future food production are reviewed and compared. These scenarios include: 1) FAO AT 2015/30 which is taken as the

  20. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Science.gov (United States)

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  1. Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach

    Science.gov (United States)

    2011-08-01

    earthquakes or hurricanes, social crises like wars and riots, and terrorism that deliberately targets infrastructure to injure, disrupt and frighten...uses policies to determine whether the meter is intentionally reporting fake readings or the current environmental conditions cause those faulty meter

  2. Rethinking Food: How United States Agriculture Production Affects Security Policy and Global Markets

    Science.gov (United States)

    2014-06-13

    policy as well as domestic socioeconomic issues. The author cobbles disparate data sets; many from “mirror” data points, or rather data from North...our objectives in the world and our viewpoint, and try to be a little more sympathetic in recognizing them. I don’t say just rubber -stamp anything we

  3. Funding Homeland Security Programs at the State Level: A Multiple Policy Analysis

    Science.gov (United States)

    2014-12-01

    LEGALIZATION AND TAXATION OF RECREATIONAL MARIJUANA USE ........................................................................................58 D...noncontroversial policy. C. LEGALIZATION AND TAXATION OF RECREATIONAL MARIJUANA USE HS programs could also benefit from the recent trend of the...intoxicating effects of the marijuana , and therefore, are a far cry from the legalization of the recreational use of the drug. The legalization for

  4. United States foreign oil policy since World War 1 : for profits and security. 2 ed.

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J.

    2005-07-01

    This book provided a historical context for United States global oil politics, with a focus on the goals, accomplishments and challenges of United States foreign oil policy, as well as on the relationship between the state and private sectors. This second edition has integrated developments in global politics since the end of the Cold War. It was suggested that many factors have provided the context for oil policy formation: a succession of crises in Iran since the 1950s; 2 wars in Iraq; U.S. intervention in Afghanistan; the threat of international terrorism since September 11, 2001; ongoing conflicts between Israel and the Arab nations in the Middle East; political instability in Saudi Arabia and in Venezuela and the trend towards trade and investment liberalization in Latin America in the 1990s. In addition, the emergence of oil sands reserves in Canada and other sources of non-conventional oil were discussed. Nationalism and oil policies in the Depression and World War 2 were examined. The structure of decision-making in oil policies was examined. Domestic and offshore resources were reviewed, and an outline of international agreements and relationships was presented. Issues concerning OPEC countries and the Iranian Revolution were examined. It was concluded that the United States has become more and not less vulnerable, despite its military strength. The author suggested that the main policy challenge to the United States may well be the tension between its commitment to Israel and its determination to avoid alienating the Arab oil-producing states. refs., tabs., figs.

  5. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    Science.gov (United States)

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  6. Studying policy implementation using a macro, meso and micro frame analysis: the case of the Collaboration for Leadership in Applied Health Research & Care (CLAHRC) programme nationally and in North West London.

    Science.gov (United States)

    Caldwell, Sarah E M; Mays, Nicholas

    2012-10-15

    The publication of Best research for best health in 2006 and the "ring-fencing" of health research funding in England marked the start of a period of change for health research governance and the structure of research funding in England. One response to bridging the 'second translational gap' between research knowledge and clinical practice was the establishment of nine Collaborations for Leadership in Applied Health Research and Care (CLAHRCs). The goal of this paper is to assess how national-level understanding of the aims and objectives of the CLAHRCs translated into local implementation and practice in North West London. This study uses a variation of Goffman's frame analysis to trace the development of the initial national CLAHRC policy to its implementation at three levels. Data collection and analysis were qualitative through interviews, document analysis and embedded research. Analysis at the macro (national policy), meso (national programme) and micro (North West London) levels shows a significant common understanding of the aims and objectives of the policy and programme. Local level implementation in North West London was also consistent with these. The macro-meso-micro frame analysis is a useful way of studying the transition of a policy from high-level idea to programme in action. It could be used to identify differences at a local (micro) level in the implementation of multi-site programmes that would help understand differences in programme effectiveness.

  7. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  8. Timor-Leste’s Foreign Policy: Securing State Identity in the Post-Independence Period

    Directory of Open Access Journals (Sweden)

    Selver B. Sahin

    2014-01-01

    Full Text Available This paper examines some of the major ideational aspects of Timor-Leste’s foreign policy orientation in the post-independence period. Drawing upon the constructivist accounts of state behaviour, the paper situates Timorese leaders’ foreign policy decisions in the broader context of their search to position the fledging nation in the global political order. It argues that Timor-Leste’s insecure state identity has shaped its leaders’ foreign policy preferences in the post-independence period. This identity can be examined by separating it into two parts: the construction of spatial boundaries and the creation of a temporal “other”. The former is evidenced by the leadership’s rhetorical emphasis on the country’s Portuguese heritage and their prioritisation of ASEAN membership, both of which are closely related to the consolidation of the young nation’s political and cultural identity. The creation of a temporal other, as illustrated by the rise of political discourse emphasising sovereignty, reflects a wider transitional process that is embedded in the country’s transformation from colony to independent state under international supervision as well as the state’s transformation from “fragile” or “failing” to “stable”. A detailed analysis of the basic aspects of Timor-Leste’s insecurities as a constitutive element of its foreign policy becomes instrumental to understanding the country’s nation-state-building experience since its separation from Indonesia in 1999, as it enters a new phase of socio-political structuring following the withdrawal of the international security presence in 2012.

  9. U.S. Foreign Policy’s Role in Homeland Security: The Egyptian Case

    Science.gov (United States)

    2011-12-01

    continued repression leads Arab thinkers such as Ahmed Baha ’ al-Din Sha’ban to declare that U.S. democratic rhetoric is the biggest hindrance to reform...a “ syndrome of beliefs” that includes a perception of injustice, distrust, and feelings of vulnerability.309 If U.S. policy nurtures these...torture with this syndrome of beliefs in mind. From the U.S. policymaker’s perspective, the entrance of moderate political Islamists into international

  10. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2010-09-17

    development programs are implemented. On the other hand, an April 2010 UNODC expresses concern over cannabis cultivation and trafficking—which is present...Policy, by Christopher M. Blanchard. 26 UNPDC. Afghanistan Cannabis Survey: 2009. http://www.unodc.org/documents/crop-monitoring/Afghanistan...Afghanistan’s Shiite and other Persian-speaking minorities. Karzai has, at times, called Iran a “ friend ” of Afghanistan, and in March 2010 he met with

  11. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  12. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  13. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  14. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  15. The Model of Gas Supply Capacity Simulation In Regional Energy Security Framework: Policy Studies PT. X Cirebon Area

    Science.gov (United States)

    Nuryadin; Ronny Rahman Nitibaskara, Tb; Herdiansyah, Herdis; Sari, Ravita

    2017-10-01

    The needs of energy are increasing every year. The unavailability of energy will cause economic losses and weaken energy security. To overcome the availability of gas supply in the future, planning are cruacially needed. Therefore, it is necessary to approach the system, so that the process of gas distribution is running properly. In this research, system dynamic method will be used to measure how much supply capacity planning is needed until 2050, with parameters of demand in industrial, household and commercial sectors. From the model obtained PT.X Cirebon area in 2031 was not able to meet the needs of gas customers in the Cirebon region, as well as with Businnes as usual scenario, the ratio of gas fulfillment only until 2027. The implementation of the national energy policy that is the use of NRE as government intervention in the model is produced up to 2035 PT.X Cirebon area is still able to supply the gas needs of its customers.

  16. The Supply of Medical Radioisotopes. Policy Options for Ensuring Long-term Supply Security of Molybdenum-99 and/or Technetium-99m Produced Without Highly Enriched Uranium Targets

    International Nuclear Information System (INIS)

    Westmacott, Chad; Cameron, Ron

    2012-01-01

    Following the shortages of the key medical radioisotopes, molybdenum-99 ( 99 Mo) and its daughter technetium-99m (' 99m Tc), the OECD-Nuclear Energy Agency (NEA) created the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR). Since 2009, this group has identified the reasons for the isotope shortages and developed a policy approach to address the challenges to a long-term secure supply of these important medical isotopes. On top of the ongoing concerns related to long-term reliability, all current long-term major 99 Mo-producing nations have agreed to convert to using low-enriched uranium (LEU) targets for the production of 99 Mo. This decision was made based on important nonproliferation reasons; however, the conversion will have potential impacts on the global supply chain - both in terms of costs and available capacity. Recognising that conversion is important and will occur, and also recognising the need to ensure a long-term secure supply of 99 Mo/' 99m Tc, the NEA, along with stakeholders, examined potential policy options that could be used by to ensure a reliable supply of 99 Mo and/or ' 99m Tc produced without highly enriched uranium (HEU), consistent with the time frames and policies of the HLG-MR. This discussion paper provides the various policy options available to governments to encourage a reliable supply of 99 Mo and/or ' 99m Tc produced without HEU. The examination of these options was done through the lens of ensuring a reliable supply, consistent with the time frames and policies of the HLG-MR. The options described in this document are meant to meet this objective by taking one of three general actions: - Making the option of purchasing or producing non-HEU-based 99 Mo and/or ' 99m Tc more attractive. - Making the option of purchasing or producing HEU-based 99 Mo and/or ' 99m Tc less attractive. - Limiting access to HEU-based 99 Mo and/or ' 99m Tc. This paper presents the options in each category and provides some views

  17. Frames in the Ethiopian Debate on Biofuels

    Directory of Open Access Journals (Sweden)

    Brigitte Portner

    2013-01-01

    Full Text Available Biofuel production, while highly contested, is supported by a number of policies worldwide. Ethiopia was among the first sub-Saharan countries to devise a biofuel policy strategy to guide the associated demand toward sustainable development. In this paper, I discuss Ethiopia’s biofuel policy from an interpretative research position using a frames approach and argue that useful insights can be obtained by paying more attention to national contexts and values represented in the debates on whether biofuel production can or will contribute to sustainable development. To this end, I was able to distinguish three major frames used in the Ethiopian debate on biofuels: an environmental rehabilitation frame, a green revolution frame and a legitimacy frame. The article concludes that actors advocating for frames related to social and human issues have difficulties entering the debate and forming alliances, and that those voices need to be included in order for Ethiopia to develop a sustainable biofuel sector.

  18. Leadership From the Centre: A New Foreign and Security Policy for Germany

    Science.gov (United States)

    2016-03-01

    Balkan Wars (1993-1999), and NATO /EU enlargement to support the theme of the rise to civilian power status. The chapter will also lay out the key...1990s more or less disarmed, reducing its forces in size to what today is too small a level and embracing a policy of NATO enlargement as the core of...without the assistance of American military might as became manifest in Bosnia in 1994 and the decision in 1995 to enlarge NATO . B. GERMANY, NATO

  19. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  20. Policy-based secure communication with automatic key management for industrial control and automation systems

    Science.gov (United States)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  1. Some consequences for the Union’s common foreign and security policy of the EU-enlargement with the former Soviet bloc countries

    NARCIS (Netherlands)

    Marácz, L.

    2008-01-01

    In this era of multilateralism with strong monolithic, global political actors such as the US, Russia and China the European Union (EU) should coordinate its foreign and security policy, if it wants to play a role in the global political arena. In recent treaties however, the Union has not succeeded

  2. Securing Gender Equality through a Nexus of Energy Policy Performance and Relative Political Performance

    Science.gov (United States)

    Perkins-Ozuagiemhe, Andrea Christen

    that, in fact, that women are not impacted equally by energy policy preferences as men and that women in developing countries benefit from increased access to modern household energy. Thus, gender-differentiated energy usage illustrates why treating population as a homogenous group fails to capture how energy policy preferences and energy policy performance can affect different subgroups of population in terms of individual choices and how those differences can affect an overall economic growth and development. Fundamental theoretical implications emerge from this dissertation's empirical findings. First, improving gender equality through technological advancements in household electricity facilitates the progress of demographic transition in terms of reducing fertility rates. Time altering effects of increased access and use of household electricity modify intra-household relations by diminishing differing roles between men and women. When women gain greater autonomy facilitated by increasing time via access to modern household electricity for more economically and educationally productive activities, fertility rates and child births tend to decrease by altering choice in family size with increased investments in children. The effect that the reduction in fertility generated by increased gender equality has upon demographic transition is that it alters the change in age structure in a developing country by decreasing youth dependency ratios generating the demographic dividend. Gender equality-generated fertility reductions may also facilitate the return to human capital by lessening the burden of non-SNA work and activities including reducing child care, increasing female labor force participation rates.

  3. Framing Climate Change to Account for Values

    Science.gov (United States)

    Hassol, S. J.

    2011-12-01

    Belief, trust and values are important but generally overlooked in efforts to communicate climate change. Because climate change has often been framed too narrowly as an environmental issue, it has failed to engage segments of the public for whom environmentalism is not an important value. Worse, for some of these people, environmentalism and the policies that accompany it may be seen as a threat to their core values, such as the importance of personal freedoms and the free market. Climate science educators can improve this situation by more appropriately framing climate change as an issue affecting the economy and our most basic human needs: food, water, shelter, security, health, jobs, and the safety of our families. Further, because people trust and listen to those with whom they share cultural values, climate change educators can stress the kinds of values their audiences share. They can also enlist the support of opinion leaders known for holding these values. In addition, incorporating messages about solutions to climate change and their many benefits to economic prosperity, human health, and other values is an important component of meeting this challenge. We must also recognize that local impacts are of greater concern to most people than changes that feel distant in place and time. Different audiences have different concerns, and effective educators will learn what their audiences care about and tailor their messages accordingly.

  4. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  5. Biomass Productivity Dynamics Monitoring and its Drivers in Sahelian Croplands and Rangelands to Support Food Security Policies

    Science.gov (United States)

    Leroux, L.

    2015-12-01

    -term food security policies.

  6. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  7. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  8. Informing National Food and Water Security Policy through Water Footprint Assessment: the Case of Iran

    Directory of Open Access Journals (Sweden)

    Fatemeh Karandish

    2017-10-01

    Full Text Available Iran’s focus on food self-sufficiency has led to an emphasis on increasing water volumes available for irrigation with little attention to water use efficiency, and no attention at all to the role of consumption and trade. To better understand the development of water consumption in relation to food production, consumption, and trade, we carried out the first comprehensive water footprint assessment (WFA for Iran, for the period 1980–2010, and estimated the water saving per province associated with interprovincial and international crop trade. Based on the AquaCrop model, we estimated the green and blue water footprint (WF related to both the production and consumption of 26 crops, per year and on a daily basis, for 30 provinces of Iran. We find that, in the period 1980–2010, crop production increased by 175%, the total WF of crop production by 122%, and the blue WF by 20%. The national population grew by 92%, and the crop consumption per capita by 20%, resulting in a 130% increase in total food consumption and a 110% increase in the total WF of national crop consumption. In 2010, 26% of the total water consumption in the semi-arid region served the production of crops for export to other regions within Iran (mainly cereals or abroad (mainly fruits and nuts. Iran’s interprovincial virtual water trade grew by a factor of 1.6, which was mainly due to increased interprovincial trade in cereals, nuts, and fruits. Current Iranian food and water policy could be enriched by reducing the WFs of crop production to certain benchmark levels per crop and climatic region and aligning cropping patterns to spatial differences in water availability and productivities, and by paying due attention to the increasing food consumption per capita in Iran.

  9. A study on energy security and nuclear energy role

    International Nuclear Information System (INIS)

    Ujita, Hiroshi

    2011-01-01

    Energy security was a major concern for OECD governments in the early 1970s. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. Here, an energy security concept has been proposed, which is defined by time frame and space frame as well. Wide-meaning energy security is divided broadly into two categories. One is short-term (∼10 y) energy crisis, which is narrow-meaning energy security. Short-term energy crisis is further divided into contingent crisis, such as energy supply chain (sealane) interruption due to conflict, accident, terrorism, etc., and structural crisis, such as price fluctuations, supply shortage, energy demand increase in Asia, technology development stagnation, etc. The other is long-term (∼100 y) energy crisis and global energy problems, such as fossil fuel exhaustion and global warming. (author)

  10. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  11. Prospective analysis of energy security: A practical life-cycle approach focused on renewable power generation and oriented towards policy-makers

    International Nuclear Information System (INIS)

    García-Gusano, Diego; Iribarren, Diego; Garraín, Daniel

    2017-01-01

    Highlights: • Formulation and application of the Renewable Energy Security Index (RESI). • Prospective analysis combining Energy Systems Modelling and Life Cycle Assessment. • Feasibility proven through two case studies of power generation in Spain and Norway. • Good coverage of key energy security aspects (availability, affordability, etc.). • Novel and easy-to-report index suitable for energy policy-making. - Abstract: Energy security is a wide-ranging term to encompass issues such as security of supply, reliability of infrastructures, affordability and environmental friendliness. This article develops a robust indicator – the Renewable Energy Security Index, RESI – to enrich the body of knowledge associated with the presence of renewable energy technologies within national electricity production mixes. RESI is built by combining environmental life cycle assessment and techno-economic energy systems modelling. Spain and Norway are used as illustrative case studies for the prospective analysis of power generation from an energy security standpoint. In the Spanish case, with a diversified electricity production mix and a growing presence of renewable technologies, RESI favourably “evolves” from 0.36 at present to 0.65 in 2050 in a business-as-usual scenario, reaching higher values in a highly-restricted CO 2 scenario. The Norwegian case study attains RESI values similar to 1 due to the leading role of renewable electricity (mainly hydropower) regarding both satisfaction of national demand and exportation of electricity surplus. A widespread use of RESI as a quantifiable energy security index of national power generation sectors is found to be feasible and practical for both analysts and energy policy-makers, covering a significant number of energy security aspects.

  12. Nonmonotonic belief state frames and reasoning frames

    NARCIS (Netherlands)

    Engelfriet, J.; Herre, H.; Treur, J.

    1995-01-01

    In this paper five levels of specification of nonmonotonic reasoning are distinguished. The notions of semantical frame, belief state frame and reasoning frame are introduced and used as a semantical basis for the first three levels. Moreover, the semantical connections between the levels are

  13. The Global Trends in the Alternative Energetics and Improvement of the State Policy in the Sphere of Fiscal Security: in Search for Equilibrium and Markets

    Directory of Open Access Journals (Sweden)

    Hnedina Kateryna V.

    2017-12-01

    Full Text Available Alternative energetics is an important component of the competitiveness and security of the national economy. Its rapid development over the past 10 years is caused by both the attempts of individual countries to maintain and strengthen their competitive advantage in the world markets and the efforts of international organizations (UN, IRENA, IEA to consolidate different stakeholders to achieve energy and fiscal security, protection of environment and improvement of climate conditions. The article is aimed at generalizing global trends in alternative energetics in the context of development of the State policy in the sphere of fiscal security. A brief overview of the latest trends in the alternative energetics development, most of which focus on identifying the basic sectoral trends, has been provided. However, the issues of fiscal security in the energy sector remain poorly researched, especially in terms of formation of the State policy, consolidating interests of different groups of stakeholders. It has been determined that in the developed countries a significant growth of alternative energetics is caused by the consistent State policy on creation of conditions for formation of effective branch markets and the solving of so-called energy trilemma.

  14. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    The same information about the evidence on health effects can be framed either in positive words or in negative words. Some research suggests that positive versus negative framing can lead to different decisions, a phenomenon described as the framing effect. Attribute framing is the positive versus negative description of a specific attribute of a single item or a state, for example, "the chance of survival with cancer is 2/3" versus "the chance of mortality with cancer is 1/3". Goal framing is the description of the consequences of performing or not performing an act as a gain versus a loss, for example, "if you undergo a screening test for cancer, your survival will be prolonged" versus "if you don't undergo screening test for cancer, your survival will be shortened". To evaluate the effects of attribute (positive versus negative) framing and of goal (gain versus loss) framing of the same health information, on understanding, perception of effectiveness, persuasiveness, and behavior of health professionals, policy makers, and consumers. We searched the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, issue 3 2007), MEDLINE (Ovid) (1966 to October 2007), EMBASE (Ovid) (1980 to October 2007), PsycINFO (Ovid) (1887 to October 2007). There were no language restrictions. We reviewed the reference lists of related systematic reviews, included studies and of excluded but closely related studies. We also contacted experts in the field. We included randomized controlled trials, quasi-randomised controlled trials, and cross-over studies with health professionals, policy makers, and consumers evaluating one of the two types of framing. Two review authors extracted data in duplicate and independently. We graded the quality of evidence for each outcome using the GRADE approach. We standardized the outcome effects using standardized mean difference (SMD). We stratified the analysis by the type of framing (attribute, goal) and conducted pre

  15. Dominant frames in legacy and social media coverage of the IPCC Fifth Assessment Report

    Science.gov (United States)

    O'Neill, Saffron; Williams, Hywel T. P.; Kurz, Tim; Wiersma, Bouke; Boykoff, Maxwell

    2015-04-01

    The media are powerful agents that translate information across the science-policy interface, framing it for audiences. Yet frames are never neutral: they define an issue, identify causes, make moral judgements and shape proposed solutions. Here, we show how the IPCC Fifth Assessment Report (AR5) was framed in UK and US broadcast and print coverage, and on Twitter. Coverage of IPCC Working Group I (WGI) was contested and politicized, employing the `Settled Science, Uncertain Science, Political or Ideological Struggle and Role of Science’ frames. WGII coverage commonly used Disaster or Security. More diverse frames were employed for WGII and WGIII, including Economics and Morality and Ethics. Framing also varied by media institution: for example, the BBC used Uncertain Science, whereas Channel 4 did not. Coverage varied by working group, with WGIII gaining far less coverage than WGI or WGII. We suggest that media coverage and framing of AR5 was influenced by its sequential three-part structure and by the availability of accessible narratives and visuals. We recommend that these communication lessons be applied to future climate science reports.

  16. Securing Communal Land Rights to Achieve Sustainable Development in Sub-Saharan Africa: Critical Analysis and Policy Implications

    Directory of Open Access Journals (Sweden)

    Ross Andrew Clarke

    2009-09-01

    Full Text Available While the concept of sustainable development gains increasing traction under international law, effective and scalable policies to translate these principles into practice remain largely beyond reach. This article analyses one possible strategy in Sub-Saharan Africa - increasing security of communal tenure to improve resource management and achieve rural sustainable development. Although this approach has attracted some attention, particularly with management responsibility of communal property increasingly devolved to the community-level, the expected results in terms of more sustainable resource exploitation and sounder environmental management have yet to be realised. Through critical analysis, with particular emphasis on the Gestion Terroir approach in Burkina Faso , the article explores the reasons behind the limited success. The article suggests that greater emphasis must be placed on bridging statutory command-and-control regimes with community-based models. Focusing on the links between communal land tenure and environmental management, and effectively embedding community land management institutions within existing environmental governance structures offers a practical model to promote sustainable development.

  17. Modelling multiple threats to water security in the Peruvian Amazon using the WaterWorld Policy Support System

    Science.gov (United States)

    van Soesbergen, A. J. J.; Mulligan, M.

    2013-06-01

    This paper explores a multitude of threats to water security in the Peruvian Amazon using the WaterWorld policy support system. WaterWorld is a spatially explicit, physically-based globally-applicable model for baseline and scenario water balance that is particularly well suited to heterogeneous environments with little locally available data (e.g. ungauged basins) and which is delivered through a simple web interface, requiring little local capacity for use. The model is capable of producing a hydrological baseline representing the mean water balance for 1950-2000 and allows for examining impacts of population, climate and land use change as well as land and water management interventions on hydrology. This paper describes the application of WaterWorld to the Peruvian Amazon, an area that is increasingly under pressure from deforestation and water pollution as a result of population growth, rural to urban migration and oil and gas extraction, potentially impacting both water quantity and water quality. By applying single and combined scenarios of: climate change, deforestation around existing and planned roads, population growth and rural-urban migration, mining and oil and gas exploitation, we explore the potential combined impacts of these multiple changes on water resources in the Peruvian Amazon and discuss the likely pathways for adaptation to and mitigation against their worst effects. See Mulligan et al. (2013) for a similar analysis for the entire Amazon Basin.

  18. Energy policy, ethics, and a return to civility

    International Nuclear Information System (INIS)

    Pickering, G.W.

    1985-01-01

    For the past decade or so government, business and the general public have been concerned with framing a coherent set of energy policies that will meet our present responsibilities and secure an adequate and diversified energy future of a nation. Thinking about these policies and the possible sources of energy supply that we might be able to rely on has involved, in addition to the customary technical and commercial considerations, certain ethical issues as well. In this context the author discusses, 1) energy policy, price deregulation and distributive justice, 2) energy policy, social policy and basic goods, 3) the energy-environment-safety debate and 4) nuclear waste management

  19. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  20. The Big-Fish-Little-Pond Effect and a National Policy of Within-School Ability Streaming: Alternative Frames of Reference

    Science.gov (United States)

    Liem, Gregory Arief D.; Marsh, Herbert W.; Martin, Andrew J.; McInerney, Dennis M.; Yeung, Alexander S.

    2013-01-01

    The big-fish-little-pond effect (BFLPE) was evaluated with 4,461 seventh to ninth graders in Singapore where a national policy of ability streaming is implemented. Consistent with the BFLPE, when prior achievement was controlled, students in the high-ability stream had lower English and mathematics self-concepts (ESCs and MSCs) and those in the…

  1. Globalisation: Frame Word for Education and Training, Human Capital and Human Development/Rights. Language Australia Research Policy and Practice Papers.

    Science.gov (United States)

    Lo Bianco, Joseph

    This booklet discusses some consequences of internationalization for national training systems from the standpoint of the following two broad approaches often taken by international organizations: (1) the human capital ideology, which assumes human capital is an appropriate basis for education policy; and (2) the human rights and human development…

  2. Positioning women's and children's health in African union policy-making: a policy analysis

    Directory of Open Access Journals (Sweden)

    Toure Kadidiatou

    2012-02-01

    Full Text Available Abstract Background With limited time to achieve the Millennium Development Goals, progress towards improving women's and children's health needs to be accelerated. With Africa accounting for over half of the world's maternal and child deaths, the African Union (AU has a critical role in prioritizing related policies and catalysing required investments and action. In this paper, the authors assess the evolution of African Union policies related to women's and children's health, and analyze how these policies are prioritized and framed. Methods The main method used in this policy analysis was a document review of all African Union policies developed from 1963 to 2010, focusing specifically on policies that explicitly mention health. The findings from this document review were discussed with key actors to identify policy implications. Results With over 220 policies in total, peace and security is the most common AU policy topic. Social affairs and other development issues became more prominent in the 1990s. The number of policies that mentioned health rose steadily over the years (with 1 policy mentioning health in 1963 to 7 in 2010. This change was catalysed by factors such as: a favourable shift in AU priorities and systems towards development issues, spurred by the transition from the Organization of African Unity to the African Union; the mandate of the African Commission on Human and People's Rights; health-related advocacy initiatives, such as the Campaign for the Accelerated Reduction of Maternal Mortality in Africa (CARMMA; action and accountability requirements arising from international human rights treaties, the Millennium Development Goals (MDGs, and new health-funding mechanisms, such as the Global Fund to Fight AIDS, Tuberculosis and Malaria. Prioritization of women's and children's health issues in AU policies has been framed primarily by human rights, advocacy and accountability considerations, more by economic and health frames

  3. Algorithm and Indicators of Evaluation of Agrarian Policy Efficiency in the Sphere of Food Security of the Region

    Directory of Open Access Journals (Sweden)

    Elena Nikolaevna Antamoshkina

    2015-12-01

    Full Text Available The article substantiates the author’s method of analysis of the regional food security and its approbation on the example of the Southern Federal District. The author’s goal was to develop a comprehensive universal method of analysis of the regional food security. To achieve this goal the following steps were required: to develop a system of indicators to measure food security at the regional level; to define criteria for assessing regional food security; to synthesize model analysis and evaluation of food security in the region. The paper presents an algorithm for the phased application of methodology for assessing regional food security. The recommended indicators and criteria for assessing regional food security are consistent with the parameters defined by the Doctrine of food security in Russia, and take into account the requirements of the WTO. The proposed method was tested on data from the largest regions of the Southern Federal District, which allowed a comparison of the level of food security in the regions of the spatial and temporal perspective. Comparison was made on the basis of an integrated assessment of the level of food security in the regions. The theoretical significance consists in the meaningful complement to research models and tools for analysis of food security at the regional level of the economy in terms of justification of indicators and criteria for assessing food security in the region in terms of Russia’s participation in the WTO. The practical significance is in developing and testing the proposed method based on an assessment of indicators of food security in SFD.

  4. Ukrainian Security Policy

    National Research Council Canada - National Science Library

    Buniak, Oleksandr

    2006-01-01

    The 20th century culminated with the end of the Cold War, the collapse of the Warsaw Pact, the formation of New Independent States in post-Soviet Eurasia, and a continuing process of NATO enlargement...

  5. National Security Policy: Mexico.

    Science.gov (United States)

    1986-04-01

    President Lazaro Cardenas expropriated the 2 assets of seventeen foreign oil companies to include major United States companies and formed a national oil...Ironically, it was a military man General Lazaro Cardenas , who as president from 1935 to 1940 eliminated the preeminence of the military in...offices to fill. Other accomplishments of President Cardenas were his stripping power from rival general officers and his successful efforts to

  6. Patient organization involvement and the challenge of securing access to treatments for rare diseases: report of a policy engagement workshop.

    Science.gov (United States)

    Mikami, Koichi; Sturdy, Steve

    2017-01-01

    , and access to effective treatments remains a major challenge for patients with rare diseases - despite active involvement of patients and their support organizations in various stages of basic and applied research and commercial development. In order to allow patients to benefit from treatments proved effective for their diseases, we need to better understand why this challenge persists, and what steps might be taken to address it. To that end, we organized a policy-engagement workshop, bringing together individuals and organizations with direct experience of trying to secure access to a treatment for a rare disease along with individuals with relevant expertise in regulatory and commissioning processes for new medicines. With additional input from social scientists who offered different perspectives on the value of patient involvement, the workshop aimed to initiate a dialogue among the participants about how to address the challenge in a sustainable manner. Discussions at the workshop stressed that active involvement of patients is as valuable in the regulatory and commissioning processes as in the research and development of new medicines. However, it also highlighted certain risks and costs associated with such involvement. These include the costs of adjusting to abrupt changes in regulatory and commissioning processes, and the risk of being perceived as too close to commercial interests. To optimize use of scarce resources and ensure continuing active involvement, such risks and costs need to be better managed. Participants also noted that, owing to advances in genomic technologies, common diseases are also becoming divided into rare sub-categories, which are equally eligible for orphan drug designation. Consequently, involvement of wider patient communities beyond rare disease communities will be critical for continuing discussions about patients' involvement in regulatory and commissioning processes, and to consider how patients and their support organizations

  7. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  8. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  9. The EU as black widow; Devouring the WEU to give birth to a European Security and Defence Policy

    NARCIS (Netherlands)

    Wessel, Ramses A.; Kronenberger, Vincent

    2001-01-01

    The Treaty of Nice will finally turn the European Union into a security and defence organisation. Alongside its tasks in all other areas the Union will be given the competence to strengthen its contribution to the maintenance of international peace and security in accordance with the UN Charter.

  10. Flexibility and security: an asymmetrical relationship? The uncertain relevance of flexicurity policies for segmented labour markets and residual welfare regimes

    NARCIS (Netherlands)

    Mouriki, A.

    2009-01-01

    Against a background of growing international competition and of pervasive uncertainty and fluidity, flexicurity policies are being actively promoted in the EU policy agenda as a useful policy tool to address the needs of business to respond to rapid changes, while providing workers with a safety

  11. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  12. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  13. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism.

    Science.gov (United States)

    Maltby, Tomas

    2013-04-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution's pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy.

  14. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  15. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism

    International Nuclear Information System (INIS)

    Maltby, Tomas

    2013-01-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution’s pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy. - Highlights: ► We examine the development of EU energy security policy, focusing on gas. ► We examine changes in European Commission competence in energy policy. ► The European Commission has gained increased competence in the internal market. ► In the external dimension of EU energy policy Member States retain competence. ► The European Commission has had qualified success as a policy entrepreneur

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Discretization of continuous frame

    Indian Academy of Sciences (India)

    other known continuous frames. Finally, we state and prove the assertions of the stability of perturbation in this concept. Keywords. Bounded operator; Hilbert space; continuous frame; atomic resolution of identity. 1. Introduction and preliminaries. As we know frames are more flexible tools to convey information than bases, ...

  18. Making students' frames explicit

    DEFF Research Database (Denmark)

    Nielsen, Louise Møller; Hansen, Poul Henrik Kyvsgaard

    2016-01-01

    Framing is a vital part of the design and innovation process. Frames are cognitive shortcuts (i.e. metaphors) that enable designers to connect insights about i.e. market opportunities and users needs with a set of solution principles and to test if this connection makes sense. Until now, framing...

  19. Decisions with endogenous frames

    NARCIS (Netherlands)

    Dalton, P.S.; Ghosal, S.

    2012-01-01

    We develop a model of decision-making with endogenous frames and contrast the normative implications of our model to those of choice theoretic models in which observed choices are determined by exogenous frames or ancillary conditions. We argue that, frames, though they may be taken as given by the

  20. Fusion frames and G-frames in Banach spaces

    Indian Academy of Sciences (India)

    Fusion frames and -frames in Hilbert spaces are generalizations of frames, and frames were extended to Banach spaces. In this article we introduce fusion frames, -frames, Banach -frames in Banach spaces and we show that they share many useful properties with their corresponding notions in Hilbert spaces. We also ...