scholarly journals Discourse and blocked mourning –

Author(s):  
Joshua Hurtado Hurtado

While there has been research focusing on security issues in Mexico in the context of the Mexican Drug War and the effects of violence on its population, little has been done to explore the relationship between public-official discourse, political practices and mourning at a societal level. Using the Logics of Critical Explanation (LCE) framework developed by Jason Glynos and David Howarth, and focusing on the notions of mourning and melancholia at a societal level, this paper argues that the conditions for mourning at a societal level have not been met in public-official discourse regarding the security policy and the Mexican Drug War, resulting in subjects experiencing blocked mourning. It views the Peace and Reconciliation Forums as a political logic that seeks to differentiate the approach taken by the incoming López Obrador administration in relation to security strategy formulation and attention to victims and Human Rights’ groups. It also argues that while the forums themselves have some attributes that could pave the way for successful mourning to occur, a comprehensive set of practices needs to materialize that addresses the concerns of violence-affected subjects.

Author(s):  
Omar García-Ponce ◽  
Thomas Zeitzoff ◽  
Leonard Wantchekon

Abstract Are individuals in violent contexts reluctant to tackle corruption for fear of future violence? Or does violence mobilize them to fight corruption? We investigate these questions looking at the effects of fear and violence stemming from the Mexican Drug War on attitudes toward corruption. We conducted two surveys before the 2012 Mexican presidential election. First, as part of a nationally representative survey, we find a positive correlation between fear of violence and willingness to accept corruption in exchange for lower levels of violence. To disentangle causal effects, we conducted a follow-up survey experiment in Greater Mexico City where we manipulated fear over the Drug War. We find that individuals within this context are not easily scared. Those who received a common fear-inducing manipulation do not report higher levels of fear and are less willing to tolerate corruption. Conversely, we find strong evidence that individuals who have been victims of crime are more likely to report both higher levels of fear and willingness to accept corruption if it lowers violence. Our findings suggest that voters are more strategic and resilient in the face of violence than many extant theories of political behavior suggest.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2017 ◽  
Author(s):  
Ryan Brown ◽  
Verónica Montalva ◽  
Duncan Thomas ◽  
Andrea Velásquez

2020 ◽  
Vol 11 (1) ◽  
Author(s):  
Amilcar Orlian Fernandez-Dominguez

AbstractAccording to the Organisation for Economic Co-operation and Development (OECD), violence should be considered by examining both actual and perceived crime. However, the studies related to violence and internal migration under the Mexican drug war episode focus only on one aspect of violence (perception or actual), so their conclusions rely mostly on limited evidence. This article complements previous work by examining the effects of both perceived and actual violence on interstate migration through estimation of a gravity model along three 5-year periods spanning from 2000 to 2015. Using the methods of generalized maximum entropy (to account for endogeneity) and the Blinder–Oaxaca decomposition, the results show that actual violence (measured by homicide rates) does affect migration, but perceived violence explains a greater proportion of higher average migration after 2005. Since this proportion increased after 2010 and actual violence, the results suggest that there was some adaptation to the new levels of violence in the period 2010–2015.


Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


2004 ◽  
Vol 5 (1) ◽  
pp. 67-87
Author(s):  
Jeong-Yong Kim

This article presents the model of 'business-track diplomacy' to test a state's utilization of economic engagement strategy as security policy. The model provides ways to think around security issues and alternative security options that go beyond the traditional military containment approach to security in international relations. As a case study, the article investigates Hyundai Group's Mountain Kumgang tourism with North Korea. In this case study, it demonstrates that not only the Kim Dae-Jung government's strong policy-making will of business-track diplomacy towards North Korea but also the Hyundai Group's business will and vulnerability of the North Korean economy played important roles in realizing the tour project and thus, enhanced inter-Korean economic cooperation.


Author(s):  
Efstratia Mourtou

Since Hospital Information Systems (HIS) are designed to support doctors and healthcare professionals in their daily activities, information security plays a vital role in managing access control. Efficiency and effectiveness of information security policy is crucial, especially when dealing with situations that affect the status and life-history of the patient. In addition, the rules and procedures to follow, in order to provide confidentiality of sensitive information, have to focus on management of events on any table of the HIS. On the other hand, control and statement constraints, as well as events and security auditing techniques, play also an important role, due to the heterogeneity of healthcare professionals’ roles, actions and physical locations, as well as to the specific characteristics and needs of the healthcare organizations. This chapter will first explore issues in managing access control and security of healthcare information by reviewing the possible threats and vulnerabilities as well as the basic attributes of the hospital’s security plan. The authors will then present a hierarchical access model that, from a security policy perspective, refers to data ownership and access control issues. The authors conclude the chapter with discussions of upcoming security issues.


Sign in / Sign up

Export Citation Format

Share Document