首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
ABSTRACT

Cattle rustling and conflicts between herders and farmers have long existed in several areas in Africas. In recent years, however, both security challenges have increased exponentially. The extent of the problem, exacerbated both by organized crime links and corruption, has reached levels in which it should now be viewed as a national security issue. This particularly is the case due to most of the criminality and conflicts occurring in border regions and involving cross-border operations. The rise of local uncontrolled armed groups, significant conflict between ethnic groups, inability of the regional governments to gain control of peripheral areas, and the increased politicization of the conflicts all indicate an environment that is highly conducive for creating the rise of insurgent movements.  相似文献   

2.
The Ecuadorian state has long been absent from the regions along its northern border with Colombia. I argue that this lack of state presence has allowed non-state armed groups and criminal organizations space to not only operate from these areas, but also, to challenge and change the relationship between local populations and the Ecuadorian state. After reviewing theoretical approaches to concepts of changing security paradigms and ungoverned space, the article details the conditions that have allowed armed groups, specifically the FARC, to take advantage of the lack of state presence along Ecuador's northern border.  相似文献   

3.
    
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed.  相似文献   

4.
由于嵌入式应用环境的多样性,单纯软件或硬件安全技术或者安全产品的功能和性能都有其局限性,只能满足某类系统的特定安全需求。因此,如何有效利用软硬件技术特点,通过协同防护来保障系统的安全已成为当前信息安全领域的研究热点。通过对嵌入式系统安全威胁和隐患的分析,在此基础上提出一种可以提高嵌入式系统安全性的软硬协同安全防护技术。该技术通过硬件检测、软件处理、综合治理的方法,可以有效地增强嵌入式系统抗击本身缺陷和恶意攻击的能力。  相似文献   

5.
边境安全作为国家安全或者国土安全的重要方面,越来越多地受到各种非传统安全因素的威胁和挑战,其中,非法移民问题就是一个不可忽视的因素。非法移民的界定涵盖了“偷运移民”和“贩运人口”两种犯罪形式,并分别从结构性维度和战略性维度分析了非法移民对输出国(或地区)、输入国(或地区)和途经国(或地区)边境安全稳定的影响。  相似文献   

6.
组织如何制定优化的信息安全技术方案以降低脆弱性对其信息系统的威胁,是信息安全管理领域的关键问题。在描述信息系统安全技术方案决策模型的基础上,提出了一种求解信息系统安全技术方案优化问题的自适应遗传算法,使得组织能以最少的方案实施费用最大限度地处置脆弱性,并以实例说明了该算法的有效性。  相似文献   

7.
移民具有经济、社会、政治等多重属性,其对国家安全的影响也涉及多个领域,且具有很强的不确定性。而地缘政治地位关键、领土存在国际争议、非劳动力要素供给缺乏弹性、族群认同超越国家认同和政府履行社会管理职能存在结构性缺陷等条件变量的作用,会显著增加移民的安全风险。这意味着控制移民安全风险的关键在于抑制或消除这些条件变量的作用。  相似文献   

8.
针对传统混合模糊测试提升技术多聚焦于利用多种动静态分析手段辅助而忽略了混合符号执行自身性能的问题,提出一种混合模糊测试平衡点模型,并基于该模型对主流混合符号执行方案进行剖析,包括污点分析辅助模糊测试、混合模糊测试以及混合符号执行,归纳了6种符号执行方案,基于混合符号执行引擎Triton复现了6种符号执行方案,并通过10个典型真实程序进行了测试评估。从效率、内存、覆盖率三个维度对各个方案进行性能对比与影响因素分析。实验证明,优化方案都可以消除不必要的约束并减少时间和空间开销,但约束缩减会造成信息丢失,造成覆盖率降低。基于实验数据分析,提出了一个优化方案的性能序列,并提出三种针对不同测试需求的优化方案。  相似文献   

9.
    
Despite a constitution that condemns discrimination, as well as positive efforts by all stakeholders, Madagascar is still far from meeting the desired objectives of the Southern African Development Community (SADC) Protocol on Gender and Development, or any other relevant international instruments and conventions. The establishment of an Organising Technical Committee on security sector reform for Madagascar is a positive development, which will hopefully facilitate an understanding of the multiple facets of gender and security in Madagascar as well as advancing the implementation of the instruments calling for greater female participation in the security sector.  相似文献   

10.
    
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy.  相似文献   

11.
基于网络的安全漏洞探测技术   总被引:5,自引:0,他引:5  
漏洞探测工具的目的是探测特定主机或网络中存在的安全漏洞,以测试系统的防御能力,给出可能的修补方法。漏洞探测包括面向主机的漏洞探测和面向网络的漏洞探测。首先从分析漏洞探测技术入手,重点分析了基于网络漏洞探测的原理和技术,在此基础上,介绍了一个基于网络安全的漏洞探测系统。  相似文献   

12.
13.
14.
ABSTRACT

Traditionally the African concept of security concept has been dominated by land-based conflicts with little attention being paid to maritime threats and the protection of the maritime environment. With the rapid escalation of piracy on the East Coast, the African Union (AU) was compelled to develop a joint strategy to address its changing African Maritime Domain (AMD). This was achieved by the AU’s Africa’s Integrated Maritime Strategy (AIMS 2050) in 2014, culminating in the adoption of a binding maritime security and safety charter in Lomé in 2016. The Lomé Charter should ideally focus the general provisions of AIMS 2050 so that Africa, as a continent, can take responsibility for security and economic empowerment of the AMD. This article considers various maritime security documents against the backdrop of an African context for understanding maritime security, in order to evaluate whether the Lomé Charter, as a manifestation of AIMS 2050, will realise its aspirations. Focussing on security is not sufficient and too much emphasis is placed in the Lomé Charter on restriction rather than development. Strong political will and leadership is required to facilitate implementation, identifying common security concerns to ensure better cooperative and collective strategies in a diverse implementation environment.  相似文献   

15.
在分析脆弱性数据库研究现状的基础上 ,指出现有脆弱性数据库系统数据管理方法的不足之处 ,提出基于Krsul脆弱性分类法和联邦模型实现一种脆弱性数据库系统。该脆弱性数据库采用Krsul脆弱性分类法实现脆弱性数据的分类组织 ,采用联邦模型作为数据库系统的体系结构 ,采用Web界面实现数据库的人机接口。  相似文献   

16.
    
Political violence, at times perceived as terrorism, remains a major security challenge in Swaziland. The common view is that this violence is perpetrated by those who feel marginalised from the political process. Central to the hypothesis advanced in this paper is that any effective solution to the menace of political violence and the security challenges it poses begins with an awareness of the symbiotic relation between security, human rights and democracy. It has been empirically proven that abuse of human rights can lead to violence, which negates peace and security in any society. In terms of content the paper looks at the shape of political violence in Swaziland. Next, it discusses the strategies and ideas behind efforts by the Swazi state to combat political violence and the counter-arguments. The final section shows the inextricable link between security, human rights and democracy; and argues that recognising this linkage can provide the key to unlocking the security puzzle in Swaziland.  相似文献   

17.
    
ABSTRACT

The Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories.  相似文献   

18.
针对我军后方仓库弹药装卸运输环节对人员叉车操作的安全性需求,设计出了叉车操作测试场地路线,归纳总结了人员操作叉车进行弹药装卸运输环节中的安全失效形式及失效原因,构建了HRA评估数学模型.选取我军某后方仓库搬运机械建制班人员为对象,进行了实地测试,得到了弹药装卸运输环节的人为失误概率.测试结果表明,基于CREAM方法能够较好地解决后方仓库弹药装卸运输环节人为失误概率的量化问题.  相似文献   

19.
系统目标毁伤效果指标建模方法探讨   总被引:1,自引:0,他引:1  
探讨常规导弹打击目标类群中系统目标的毁伤效果指标的建模方法。在对毁伤效果指标、毁伤意图、目标易损性等概念进行深入分析基础上,提出基于目标功能易损性的系统目标毁伤效果指标建模的思想。根据系统目标功能受损情况,归纳出三类毁伤效果指标常用的建模方法:效能模型、失效模型及基于毁伤的保障度模型。举例说明了方法的有效性,可为导弹武器攻击效能评估、耗弹量计算和瞄准点选择等提供定量决策依据。  相似文献   

20.
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号