Globalising Security Culture and Knowledge in Practice: Nigeria's Hybrid Model
In: Globalizations, Band 9, Heft 1, S. 91-106
ISSN: 1474-774X
1702 Ergebnisse
Sortierung:
In: Globalizations, Band 9, Heft 1, S. 91-106
ISSN: 1474-774X
The current state of knowledge on cyber stalking in the United Kingdom is reviewed. Cyber stalking connotes stalking activities which are carried out by perpetrators in the virtual world via any aspects of information technology or electronic means resulting in a victim or victims suffering emotional and arguably mental and psychological harm. Building on this knowledge, the methods used by cyber stalkers to harass victims are identified. The effects of cyber stalking on victims are then analysed taking into account recent research findings. Following from this, the prevalence of cyber stalking is examined and the effectiveness of existing legislation is evaluated taking into account the recently introduced laws on face-to-face stalking and cyber stalking. The paper concludes by giving an overview of the challenges faced by law enforcement agencies in the cross jurisdictional prosecution of cyber stalkers.
BASE
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Table of Cases -- Table of Statutes -- Figures and Tables -- Acknowledgements -- Preface -- 1. Introduction -- 1.1. Introduction -- 1.2. Terrorism and Profiling a Definitional Problem -- 1.3. Central Analytical Aim -- 1.4. Book Outline -- 1.5. Contribution to Knowledge -- 1.6. Research Limitations -- 1.7. An Analytical Framework to Assess/Measure the Effectiveness of Terrorist Profiling -- 2. The Compatibility of Terrorist Profiling with Fundamental Rights -- 2.1. Introduction -- 2.2. Theoretical Approaches to Assess the Compatibility of Terrorist Profiling with Fundamental Rights -- 2.3. The Definition of Profiling When Sensitive Characteristics are Used in the Profiling Process -- 2.4. The Lawfulness of Including Sensitive Characteristics in Terrorist Profiling -- 2.4.1. Philosophical Underpinnings of the Right to Non-Discrimination -- 2.4.2. The Content and Scope of the Legal Right to Non-Discrimination -- 2.4.2.1. Legitimate Aim -- 2.4.2.2. The Proportionality of the Measure -- 2.4.2.3. The Standard of Review -- 2.4.2.4. Further Observations -- 2.5. Conclusion -- 3. Criminal Profiling and its Applicability to Terrorist Profiling -- 3.1. Introduction -- 3.2. Deductive Profiling -- 3.2.1. The Origins of Profiling -- 3.2.2. Non-Scientific Deductive Profiling Approaches -- 3.2.3. Non-Scientific Deductive Profiling Approaches a Critique -- 3.2.3.1. An Absence of Standardised Methods and Approaches -- 3.2.3.2. Poor Consistency in the Use of Language -- 3.2.3.3. Misapplication of Typologies -- 3.2.3.4. The High Dependence on Law Enforcement Instinct and Prior Investigative Experience -- 3.2.3.5. An Absence of Clear Procedures -- 3.2.3.6. Little Investigative Value? -- 3.2.4. Scientific Deductive Profiling Approaches.
"Enforcement of Intellectual Property Rights in the EU Member States provides a timely overview and thorough analysis of intellectual property rights enforcement in the EU Member States. Taking legal action in one or several countries in the EU to enforce intellectual property rights is quite a challenge. The adoption of European Directive 2004/48/EC on the Enforcement of Intellectual Property Rights was meant to put a halt to considerable discrepancies in national legislations which caused uncertainty and a difference in enforcement between the EU Member States. The Enforcement Directive aimed to create a level playing field and to ensure a high, equivalent and homogeneous level of intellectual property protection across the EU. Over the past decade, the Enforcement Directive has been transposed into all EU Member States, in national legislation and through its application in national and EU case law. Both are essential to understand the Enforcement Directive's actual scope of application. In order to prepare and undertake an action in different countries - potentially simultaneously - knowledge of national legislation, local custom and practice, as well as procedural law, national and EU case law is essential." -- Backside cover
With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of strong dependency (Cohen, 1977). "information is transmitted from a source to a destination only when variety in the source can be conveyed to the destination" Cohen (1977) Building on the notion proposed by Goguen and Meseguer, a program is typically said to be noninterfering if the values of its public outputs do not depend on the values of its secret inputs. If that is not the case then there exist illegal information flows that allow an attacker, having knowledge about the source code of the program, to deduce information about the secret inputs from the public outputs of the execution. In contrast to the vast majority of previous work on noninterference which are based on static analyses (especially type systems), this PhD thesis report considers dynamic monitoring of noninterference. A monitor enforcing noninterference is more complex than standard execution monitors. "the information carried by a particular message depends on the set it comes from. The information conveyed is not an intrinsic property of the individual message." Ashby (1956). The work presented in this report is based on the combination of dynamic and static information flow analyses. The practicality of such an approach is demonstrated by the development of a monitor for concurrent programs including synchronization commands. This report also elaborates on the soundness with regard to noninterference and precision of such approaches. ; Avec l'augmentation des communications entre systèmes d'information, l'intérêt pour les mécanismes de sécurité s'est accru. La notion de non-interférence, introduite par Goguen and Meseguer (1982), est fréquemment utilisée pour formaliser des politiques de sécurité impliquant la confidentialité des secrets manipulés par un programme. Un programme est dit non-interférant si son comportement observable par tous n'est pas influencé par la valeur des secrets qu'il manipule. Si ce n'est pas le cas, alors un attaquant ayant connaissance du code source du programme peut déduire des information concernant les secrets manipulés à partir de l'observation du comportement du programme. À la différence de la majorité des travaux précédents sur la non-interférence (principalement des analyses statiques), ce rapport de thèse s'intéresse au contrôle dynamique de la non-interférence. Le contrôle dynamique des flux d'information est une tâche complexe car l'information transportée par un message n'est pas une propriété intrinsèque de ce message. Elle dépend aussi, lorsque le destinataire connaît l'ensemble des message qui peuvent être envoyés, de la composition de cet ensemble. Le travail présenté dans ce rapport se base sur la composition d'analyses dynamiques et statiques des flux d'information. Des moniteurs de non-interférence sont développés pour différents langages dont un langage concurrent intégrant une commande de synchronisation. L'exactitude de ces moniteurs est prouvée et leur précision est comparée à des travaux précédents.
BASE
With the intensification of communication in information systems, interest in security has increased. The notion of noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. This notion, based on ideas from classical information theory, has first been introduced by Goguen and Meseguer (1982) as the absence of strong dependency (Cohen, 1977). "information is transmitted from a source to a destination only when variety in the source can be conveyed to the destination" Cohen (1977) Building on the notion proposed by Goguen and Meseguer, a program is typically said to be noninterfering if the values of its public outputs do not depend on the values of its secret inputs. If that is not the case then there exist illegal information flows that allow an attacker, having knowledge about the source code of the program, to deduce information about the secret inputs from the public outputs of the execution. In contrast to the vast majority of previous work on noninterference which are based on static analyses (especially type systems), this PhD thesis report considers dynamic monitoring of noninterference. A monitor enforcing noninterference is more complex than standard execution monitors. "the information carried by a particular message depends on the set it comes from. The information conveyed is not an intrinsic property of the individual message." Ashby (1956). The work presented in this report is based on the combination of dynamic and static information flow analyses. The practicality of such an approach is demonstrated by the development of a monitor for concurrent programs including synchronization commands. This report also elaborates on the soundness with regard to noninterference and precision of such approaches. ; Avec l'augmentation des communications entre systèmes d'information, l'intérêt pour les mécanismes de sécurité s'est accru. La notion de non-interférence, introduite par Goguen and Meseguer (1982), est fréquemment utilisée pour formaliser des politiques de sécurité impliquant la confidentialité des secrets manipulés par un programme. Un programme est dit non-interférant si son comportement observable par tous n'est pas influencé par la valeur des secrets qu'il manipule. Si ce n'est pas le cas, alors un attaquant ayant connaissance du code source du programme peut déduire des information concernant les secrets manipulés à partir de l'observation du comportement du programme. À la différence de la majorité des travaux précédents sur la non-interférence (principalement des analyses statiques), ce rapport de thèse s'intéresse au contrôle dynamique de la non-interférence. Le contrôle dynamique des flux d'information est une tâche complexe car l'information transportée par un message n'est pas une propriété intrinsèque de ce message. Elle dépend aussi, lorsque le destinataire connaît l'ensemble des message qui peuvent être envoyés, de la composition de cet ensemble. Le travail présenté dans ce rapport se base sur la composition d'analyses dynamiques et statiques des flux d'information. Des moniteurs de non-interférence sont développés pour différents langages dont un langage concurrent intégrant une commande de synchronisation. L'exactitude de ces moniteurs est prouvée et leur précision est comparée à des travaux précédents.
BASE
In: Organization science, Band 19, Heft 2, S. 260-276
ISSN: 1526-5455
Current social cognition models of knowledge coordination based on transactive memory systems (TMS) theory have not generally considered conditions in which goals among partners are incongruent, and that those with specialized knowledge will not necessarily act to share their knowledge. As expected from previous literature, when facing a problem requiring inputs from others, an individual will draw on her personal or ego-centered network using the knowledge of her network's TMS; however, we theorize that the mixed motives within her network will cause the individual to also take into account her perception of the level of distrust within the network when combining the received knowledge from others in the network. Moreover, an individual's view of her network's TMS will be shaped not by specific policies or enforcement mechanisms, but by semistructures for how knowledge is disseminated, owned, and discussed. Our theory is supported based on a survey of security professionals responding to national security threats. The findings encourage a reexamination of certain assumptions of TMS theory, as well as extending theories of ego-centered networks and social-cognitive information processing to include how individuals manage the knowledge-sharing/protection tension in interorganizational collaborations.
In: Policy sciences: integrating knowledge and practice to advance human dignity, Band 4, Heft 3, S. 337-346
ISSN: 1573-0891
In: The international journal of knowledge, culture & change management, Band 8, Heft 1, S. 15-24
ISSN: 1447-9575
Electrical and electronic waste (e-waste) are dangerous for human health and environment. The e-waste may comes from both external (import) and domestic industries. Batam as part of Indonesia jurisdiction have been a place of e-waste dumping. The e-waste mostly comes from Singapore. The rest is from Malaysia, Thailand, and Vietnam. The influx of electronic waste is done through smuggling at certain place. Police actually knows about the smuggling but not take any action. This crimes was backed up by any army and police. It reflects the ineffectiveness of law enforcement in Batam regarding e-waste smuggling. The ignorance causes the environment and human health is not well protected. Lack of understanding of legal knowledge by law enforcement agencies should be a particular concern for the government. On the other hand, for the people of Batam, e-waste still have economic value. Therefore, they don't care about the menace of e-waste to human health and environment. The government should develop them in order to manage e-waste properly. The government may refer to the Government of India's Bangalore city with regard to how the people manage e-waste.
BASE
In: The B.E. journal of economic analysis & policy, Band 18, Heft 3
ISSN: 1935-1682
Abstract
This article proposes a new approach to measuring the deterrent effect of cartel law enforcement by combining a game-theoretic model with Monte Carlo simulations. The game-theoretical analysis shows which type of perfect Bayesian Nash equilibria is obtained depending on the parameter setup: perfect compliance, imperfect compliance or zero compliance. For each equilibrium, we also derive the probabilities of type I (false-positive) and type II (false-negative) errors committed by the cartel authority. To account for the uncertainty and the vague knowledge concerning the model parameters, we perform Monte Carlo simulations based on parameter ranges extracted from the related literature. The simulations indicate that zero compliance dominates the picture and that the error probabilities are high for type II and negligible for type I errors. The results are fairly robust against correlation in the input parameters. Further robustness studies and interactive visualizations can be obtained with a supplemental web application.
In: International social science journal: ISSJ, Band 54, Heft 1, S. 99-114
ISSN: 0020-8701
Knowledge accumulated for centuries by ethnic communities about their habitat is increasingly being used for commercial purposes in fields such as pharmacy & agriculture. Transnational corporations & research laboratories use knowledge obtained from the analysis of plants & other biological samples provided by ethnic communities, or from the observation of their traditional practices. This paper proposes an interpretation of intercultural processes that take place in the exchange of traditional knowledge between ethnic groups & different kinds of agents in modern societies. The exchange between indigenous communities that possess the knowledge & researchers from universities & transnational corporations willing to develop & exploit that knowledge is marked by a deep information asymmetry. Guidelines for a regulatory framework protecting vernacular knowledge & simultaneously providing incentives for modern scientific research are suggested. Under this scheme, communities might improve their ability to defend their rights & demand the enforcement of certain rules conditioning the use of traditional knowledge by firms, laboratories, & research institutes. At the same time, investment for research in this field would be stimulated. 33 References. Adapted from the source document.
In: Review of public personnel administration, Band 21, Heft 3, S. 237-247
ISSN: 1552-759X
Police selection can be broadened in many jurisdictions, moving beyond traditional reliance on cognitive skills testing, but managers should be aware of dilemmas this process may entail. Jurisdictions differ from one another and trade-offs often need to made between competing values; therefore, there is no "one best way" to select law enforcement personnel. However, in light of several jurisdictions' problematic experiences, managers should take care not to place undue emphasis on any single knowledge, skill, and ability (KSA) or demographic consideration. Also, personality measures have limitations and may never fully replace cognitive tests.
Teams, groups, and task forces in law enforcement agencies are becoming progressively more significant as a greater number of agencies have gained experience with their use. The goal of this text is to bring to reality the importance of teams to police managers, operational personnel, and members of the community. Learning objectives appear at the beginning of each chapter that will allow the reader to grasp the complexity and intricacy of these teams. The book contains helpful information to gain essential knowledge about groups in an organization with emphasis on teams, groups, and task forc
Chapter 1. Protection of Vietnam's Intellectual Property Rights Part 1. Background Part 2. Status of Progress Part 3. Objective Part 4. Expected Benefits Chapter 2. Analysis of Current Status of Vietnam's Intellectual Property Right Part 1. Analysis of Current Status of Vietnam's Intellectual Property Right 1. Status of Application and Registration of Intellectual Property Rights in Vietnam 2. Society's Perception about Intellectual Property Rights in Vietnam 3. Understanding of Level of Intellectual Property Rights in Vietnam 4. Analysis of Causes of Current Status of Infringements of Intellectual Property Rights in Vietnam 5. Analysis of Types of Infringement of Intellectual Property Rights in Vietnam 6. Details of Infringement of Intellectual Property Right in Vietnam Part 2. Understanding the Current Status of Intellectual Property Rights Legal System in Vietnam 1. Vietnam's Intellectual Property Rights related Laws 2. Duties and Rights of Government Bodies in relation to Intellectual Property Rights 3. Definition and Type of Counterfeited Products in Vietnam Part 3. Understanding the current state of copyright law and system in Vietnam 1. Status of the Vietnamese Copyright Law 2. Laws of Vietnam Concerning Copyright Infringements 3. Duties and Powers of Vietnamese Government Agencies related to Copyright 4. Vietnam Infringement Case Analysis Chapter 3. Investigation and Analysis of Copyright and Intellectual Property Infringement Cases in Vietnam Part 1. Investigation and Analysis of Infringement Cases of Intellectual Property Rights in Vietnam 1. Escalating Trend of Countermeasures against Intellectual Property Rights in Vietnam 2. Type of Infringement of Intellectual Property Rights in Vietnam 3. Investigation and Analysis of Trademark Infringement Cases in Vietnam Part 2. Investigation and Analysis of Copyright Infringement Cases in Vietnam 1. Penalties for Infringement of Copyright in Vietnam 2. Escalating Trend in Punishment of Copyright Infringement in Vietnam 3. Infringement of Vietnamese Music Copyright 4. Copyright Infringement in Vietnam Online Books 5. Violation through Online Illegal Content Sites in Vietnam 6. Violation through Online Illegal Game Sites in Vietnam 7. Infringement through Illegal Software Distribution in Vietnam 8. Investigation and Analysis of Infringement Cases in Vietnam Part 3. Case of Orion Chocopie in Vietnam 1. Manufacture and Export of Orion Chocopie Forged Products 2. Repackaging Substandard Units of Genuine Product 3. Partial Distortion of Orion Chocopie Trademark Chapter 4. The Survey on the Infringement on the Intellectual Property Right of Korean Companies entering Vietnam Part 1. Current State of Intellectual Property Rights of Korean Companies in Vietnam 1. Investment Trends of Korean Companies entering Vietnam. 2. Survey on the Status of Counterfeit Goods of Korean companies in Vietnam 3. Survey on the Protection of Intellectual Property of Enterprises entering Vietnam Part 2. Survey on the Status of Counterfeit Goods of Korean companies in Vietnam 1. Survey Overview 2. Survey Result and Analysis Chapter 5. The Proposal of Protection Policy for Vietnamese Intellectual Property Rights Part 1. The Government-level of Policy Recommendation for IPR Protection in Vietnam 1. Suggestion of Structure / Prevention side Policy 2. Suggestion of Structure / Crackdown side Policy 3. Suggestion of Structure / Punishment side Policy 4. Suggestion of Strategy / Prevention side Policy 5. Suggestion of Strategy / Crackdown side Policy 6. Suggestion of Strategy / Punishment side Policy 7. Policy Sharing aspect for Vietnamese Intellectual Property Protection Part 2. The prevention against the Infringement on the Intellectual Property of Companies entering Vietnam and their Response Strategies 1. The Enhancement of Market Research 2. The Exposure of Competent Authorities 3. The Enhancement of Cooperation with Customs 4. The Promotion of Warning and Notification Activities Part 3. The Response Strategy for Companies entering Vietnam 1. The Establishment of Crackdown Cooperation System against those Imitating Illegally in Korea. 2. The Co-development of Response Strategy considering the type of Product and Pusiness 3. The Minimization of Risk through the Intellectual Property Reference Appendix
BASE