Other political and security questions

Keyword(s):  
2018 ◽  
Vol 59 (4) ◽  
pp. e294-e310 ◽  
Author(s):  
Wentian Lu ◽  
Hynek Pikhart ◽  
Amanda Sacker

Abstract Purpose of the Study Few studies have recommended the essential domains of healthy aging and their relevant measurement to assess healthy aging comprehensively. This review is to fill the gap, by conducting a literature review of domains and measures of healthy aging in epidemiological studies. Design and Methods A literature search was conducted up to March 31, 2017, supplemented by a search of references in all relevant articles in English. We made a final selection of 50 studies across 23 countries or regions. Results Nineteen studies applied Rowe and Kahn’s three standards to assess healthy aging. Thirty-seven studies measured physical capabilities mainly by (instrumental) activities of daily living. Cognitive functions were included in 33 studies. Nineteen of them applied Mini-Mental State Examination (MMSE). Twenty-six studies considered metabolic and physiological health, but they mainly asked the self-reported absence of diseases. Twenty-four studies assessed psychological well-being by employing diverse scales. Questions about participation in social activities were mainly asked to measure social well-being in 22 studies. Sixteen studies considered individuals’ general health status, which was mainly measured by self-rated health. Security questions were asked in five studies. Health behaviors were taken into account by three studies. Fifteen studies either applied SF-12/36 or developed health indices to assess healthy aging. Implications This review summarizes detailed scales or methods that have been used to assess healthy aging in previous epidemiological studies. It also discusses and recommends the essential domains of healthy aging, and the relevant instruments for further epidemiological research to use in the assessment of healthy aging.


Author(s):  
Julie Dufort ◽  
Marc-André Anzueto ◽  
Catherine Goulet-Cloutier

This paper seeks to shed light on the evolution of the hegemonic paradigm in the subfield of International Security Studies (ISS) by looking at one highly influential journal, International Security. Questions we will be considering: What are the parameters of the hegemonic paradigm that characterize ISS? What are its main continuities and ruptures? More generally, how do academic journals contribute to building, maintaining or deconstructing the hegemonic paradigm? Using the method of longitudinal content analysis, this paper highlights the different continuities and ruptures in this so-called hegemonic paradigm. Our aim is to show how International Security has contributed to building and maintaining this paradigm and how it can transcend these limits.


Author(s):  
Igboin Benson Ohihon

In recent times, the resurgence of critical security questions has gained prominence in global tabloid, consciousness and discourse. From Tunisia, Algeria, Egypt, Libya, Yemen to Syria; the Nigerian experiences of the Golden Jubilee Independence bombing, for which MEND claimed responsibility, the Boko Haram incendiary that has gravitated into suicide bombing, among others are extant. The causes of these ‘security crises’ can be traced squarely to fundamentalisms: religious fundamentalism or religious nationalism; hegemonic fundamentalism, capitalist fundamentalism, ethnic fundamentalism, existential fundamentalism, ethical fundamentalism, etc. These explain the deepening and proliferation of conflicts in countries around the globe. The response to this state of affairs has been ‘sermon’ on tolerance in the face of aggressive terror. Tolerance may not have been properly conceptualized. The thrust of this paper, therefore, is to stimulate interest in the conceptualization of these terms so that their understanding would pave the way for long lasting solutions. In so doing, the paper will employ historical and philosophical approaches to situate the arguments.


10.28945/3557 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-016
Author(s):  
Grandon Gill ◽  
Joni Jones

Jeffrey Stiles pondered these seemingly straightforward questions. As IT Director of Jagged Peak, Inc., a developer of e-commerce solutions located in the Tampa Bay region of Florida, it would be his responsibility to oversee the implementation of security measures that went beyond the existing user name and password currently required for each user. Recent events suggested that a move towards increased security might be inevitable. In just the past year, highly publicized security failures at the U.S. Department of Defense, major healthcare providers and large companies, such as Sony and JP Morgan Chase, had made executives acutely aware of the adverse consequences of IT system vulnerabilities. In fact, a study of business risk managers conducted in 2014 found that 69% of all businesses had experienced some level of hacking in the previous year. The nature of Jagged Peak’s business made the security of its systems a particular concern. The company, which had grown rapidly over the years, reporting over $61 million in revenue in 2014, provided its customers with software that supported web-based ordering, fulfillment and logistics activities, built around a philosophy of “buy anywhere, fulfill anywhere, return anywhere”. To support these activities, the company’s Edge platform needed to handle a variety of payment types, including gift cards (a recent target of hackers), as well as sensitive personal identifying information (PII). Compounding the security challenge: each customer ran its own instance of the Edge platform, and managed its own users. When only a single customer was being considered, the addition of further layers of security to authenticate uses was an eminently solvable problem. A variety of alternative approaches existed, including the use of various biometrics, key fobs that provided codes the user could enter, personalized security questions, and many others. The problem was that where multiple customers were involved, it was much more difficult to form a consensus. One customer might object to biometrics because it users lacked the necessary hardware. Another might object to security keys as being too costly, easily stolen or lost. Personalized questions might be considered too failure-prone by some customers. Furthermore, it was not clear that adding additional layers of authentication would necessarily be the most cost-effective way to reduce vulnerability. Other approaches, such as user training might provide greater value. Even if Stiles decided to proceed with additional authentication, questions remained. Mandatory or a free/added-cost option? Developed in house or by a third party? Used for internal systems only, customer platforms only, or both? Implementation could not begin until these broad questions were answered.


Author(s):  
Paul Ashby

This chapter contends that the Western Hemisphere is not only key to the development of U.S. national security but also remains of great importance today. Quite simply, U.S. national security interests grew firstly within their own “neighborhood,” and those interests continue to be both important and complex into the present day. Crucially, this is where national security threats come into direct contact with the U.S. homeland. Understanding this history and these interactive dynamics is important to the analysis of contemporary national security questions in the Western Hemisphere. The chapter focuses on key issues that are deeply intertwined: economics and trade; democracy, development, and human rights; drugs and transnational threats; and homeland security and homeland defense.


Sign in / Sign up

Export Citation Format

Share Document