We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The objective of this study is to develop a conceptual framework for use cases applicable to the development of an Internet of Things (IoT) system, designed for intelligent environments capable of managing the pandemic.
Methods
To achieve this objective, a comprehensive content analysis of scholarly articles from MDPI, PubMed, and Google Scholar was conducted. Best practices were identified, and various application examples were synthesized to establish an IoT-based framework.
Results
The study proposes measures for the implementation of technologically advanced environments and services while ensuring public compliance with these developments. Based on the identified use cases and enabled applications, a conceptual framework was formulated. The key use cases for IoT applications include traffic management, patient health monitoring, early virus detection, remote work facilitation, smart hygiene solutions, tracking infected individuals, monitoring social distancing, enhancing health care facilities, and ensuring quarantine compliance. To ensure rapid and effective implementation of policies, regulations, and government orders, robust architecture, applications, and technological infrastructures must be developed.
Conclusions
This study explores new architectural frameworks, potential use cases, and avenues for future advancements in IoT-based applications. The use cases are categorized as near-field measures, hybrid measures, centralized control mechanisms, and their integration in the defense against COVID-19.
Conclusions: I summarize some of the shortcomings of current international legal regimes for dealing adequately with grand corruption, summarize some promising avenues for doing so; evaluate the proposal to create an International Anti-Corruption Court, tackle some of the admitted shortcomings of my approach and note the convergence of current anti-corruption struggles with other social movements.
This book is a study of non-alignment as it was conceptualised and developed in the context of modern India, particularly in the period immediately after independence. The main architect of India’s external affairs at this juncture was the first Prime Minister and Foreign Minister, Jawaharlal Nehru. The book is restricted to events that took place during the time he held office, between the years 1947 and 1964. In particular, this study aims to study non-alignment as an approach to security and as an approach to politics. There are three themes along which the book proceeds. First, the book contends that non-alignment is understood vaguely and inaccurately, leading to protracted debates about its past relevance and continued significance; secondly, that non-alignment frames politics innovatively; and thirdly, that this is an immensely precarious wager that encounters many points of resistance, which are not adequately engaged with in a sustained theoretical manner in literature on non-alignment. Thus, the book will argue that there has yet to emerge a serious critique of the political nature of non-alignment.
Lay people often are misinformed about what is a secure password, what are the various types of security threats to passwords or password-protected resources, and the risks of certain compromising practices such as reusing passwords and required password expiration. Expert knowledge about password security has evolved considerably over time, but on many points, research supports general agreement among experts about best practices. Remarkably, though perhaps not surprisingly, there is a sizable gap between what experts agree on and what lay people believe and do. The knowledge gap might exist and persist because of intermediaries, namely professionals and practitioners as well as technological interfaces such as password meters and composition rules. In this chapter, we identify knowledge commons governance dilemmas that arise within and between different communities (expert, professional, lay) and examine implications for other everyday misinformation problems.
This article explores security cooperation between the Caribbean and Mexico,looking specifically at strategies being pursued to shift the focus in Latin America and the Caribbean from ‘the war on drugs’ to ‘the war on guns’ to address the problem of gun trafficking. This is a shift away from the United States’ priority to that of the region and a move towards a more assertive model of South–South security cooperation. The Caribbean Community and Common Market’s (CARICOM’s) strategy to support Mexico’s tortious and historic lawsuit against American gun manufacturers and to declare a ‘war on guns’ reflects its inability to independently influence the United States’ priorities within the region. Mexico, a Southern country, makes a difference because of its geopolitical relevance to the US, their shared border, and Washington’s attempt to stop the flow of Mexican immigration. We read the Mexico–Caribbean coalition as a significant development in South–South security cooperation (SSSC). Our analysis contributes to an understanding of the nuances and complexities of security cooperation, capacities for scaling up action through SSSC, and the political and legal manoeuvrings involved in challenging hierarchies of power between the so-called global North and South.
This article analyses Colombian South–South security cooperation. Drawing upon empirical research findings and by focusing on Colombian security engagements with other Latin American countries in the realm of military transformation, we identify the role of epistemological constructs as key drivers of Colombian South–South security cooperation. We demonstrate that Colombian policy and security actors intentionally created comparability between their own country and its security challenges, and the conditions existing in other countries of the region. This portrayal of idiosyncratic (in)security features as shared attributes across otherwise-different country contexts enables the transfer of security models rooted in Colombia’s expertise and experience. We show how such security-driven homologisation efforts enabled Colombian security practitioners to navigate international hierarchies, particularly unequal US–Colombian relations in their favour, allowing them to secure continued US support and position Colombian security expertise as a blueprint for addressing contemporary security challenges across the region and beyond.
Laboratory experiments are used to evaluate the extent to which players in games can coordinate investments that diminish the probability of losses due to security breaches or terrorist attacks. In this environment, economically sensible investments may be foregone if their potential benefits are negated by failures to invest in security at other sites. The result is a coordination game with a desirable high- payoff, high-security equilibrium and an undesirable low-security equilibrium that may result if players do not expect others to invest in security. One unique feature of this coordination situation is that investment in security by one player generates a positive externality such that all other players’ expected payoffs are increased, regardless of those other players’ investment decisions. Coordination failures are pervasive in a baseline experiment with simultaneous decisions, but coordination is improved if players are allowed to move in an endogenously determined sequence. In addition, coordinated security investments are observed more often when the largest single security threat to individuals is preventable by their own decisions to invest in security. The security coordination game is a “potential game,” and the success of coordination on the more secure equilibrium is related to the notion of potential function maximization and basin of attraction.
This article assesses local tensions that plague the U.S.-centered hub-and-spokes security framework in the Western Pacific region, which finds its most concrete expression in increasingly vulnerable legacy installations. I start by considering how people living outside the fence in places like Guam and Okinawa have tended to see the U.S. military, while summarizing global trends in U.S. base expansion and contraction outside of the continental United States (OCONUS). I tie this past to the most common dilemmas of global basing manifesting today, explain how these dilemmas have been understood, and highlight core concerns undergirding most base protest cultures. In the absence of sweeping policy changes to legal structures that disenfranchise militarized civilians in the most heavily fortified islands in the U.S. global base network, changing the way recent history is represented at U.S. controlled public sites could catalyze meaningful change within perennially troubled relationships between the U.S. military and overburdened host communities.
The focus of EU lawmakers with regard to cryptoassets has been largely regulatory. Reflecting the fact that private law is predominantly under the control of the Member States, and without seeking to be comprehensive, Section 13 takes a comparative view on the private law topics most relevant to cryptoassets. It covers efforts to harmonise national private laws, refers to principles issued by UNIDROIT and the European Law Institute, and considers relevant MiCA provision with private law effects in mind. Section 13.2 covers property law, including the important rules of title and transfer when multiple parties have competing claims to the same cryptoasset. Section 13.3 addresses contract law, including “smart contracts”. Section 13.4 on company law discusses decentralised autonomous organisations (DAOs) and the prospect of collaboration on the blockchain constituting a partnership as the default legal form of business organisation. Section 13.5 covers tort law, before Section 13.6 provides an overview of the difficulties often faced with enforcement of claims related to cryptoassets. Section 13.7 concludes with a perspective on the prospects of a uniform private law for cryptoassets.
This paper examines China’s evolving security engagement in Africa, focusing on the recent shifts in policy and strategy as China’s global influence expands. By employing a multi-dimensional research approach, including fieldwork with semi-structured interviews, and a thorough analysis of official Chinese documents, the study highlights key examples from Tanzania, Ethiopia, and the African Union. China’s security engagement is characterised by a dual strategy of hard and soft security measures, including military presence, arms transfers, and diplomatic initiatives. The research identifies a significant transition from primarily economic-focused interactions to a more nuanced strategy that incorporates military cooperation and diplomatic interventions. This shift reflects China’s response to the complex geopolitical dynamics within Africa and its broader ambitions on the global stage. While still largely state-centric, China’s engagement is beginning to adopt more assertive security strategies, driven by the need to protect its investments and citizens in conflict-prone regions, as well as to position itself as a responsible global actor in peace and security. Despite these developments, China’s approach remains cautious and reactive, constrained by its policy principles and the complexities of African geopolitics.
Chapter 7 begins with the reaction that followed from Price and Paine’s defence of the colonial cause. They agreed with the colonists that to live in dependence on the arbitrary will of someone else is what it means to be a slave, and consequently agreed that the colonists must have a natural right to free themselves from their servitude, if necessary by force. This was the moment when a large number of pro-imperial spokesmen came forward to claim that the colonists and their supporters were failing to understand what it means to speak of possessing or losing one’s liberty. They objected that we are not rendered unfree if we are merely subject to someone else’s will; we are only rendered unfree if we are restrained from acting in some particular way. Generally this definition of liberty has been seen as an invention of the late eighteenth century. But as this chapter shows, it arose out of a long tradition of legal and political argument that originated with Hobbes, Pufendorf and their followers. We already find it present in England in the early eighteenth century, and the pro-imperialist writers now brought it to the forefront of debate.
Chapter 4 examines the body of Whig propaganda in which the government was congratulated for having succeeded in establishing a free civil society within a free state. A large number of Anglican writers joined the spokesmen for the government in arguing that Britain had by now established a constitution that made her the envy of Europe. Everyone was now equally subject to the law; the law alone ruled, with no incursions of arbitrary power; and the law was at last being expertly administered, without any corruption or incompetence. As a result, the life, liberty and property of every subject was now fully secure, including the property that (as Locke had said) everyone may be said to possess in their own person. No one is any longer condemned to live in a state of subjection to the mere will and power of anyone else. The consequence is said to be a civil society in which everyone can hope to find their own pathway to prosperity and happiness. The chapter concludes with an examination of Whig celebrations of urban life as the best setting in which to lead a flourishing and happy life.
The conclusion reviews Schopenhauer’s conception of politics as the management of human strife. For Schopenhauer, politics was both indispensable and insufficient: rational political coordination can prevent society from descending into a chaos of mutual aggression, but because rationality itself is limited and metaphysically subordinate, it cannot redeem a fundamentally broken world. Schopenhauer’s attitudes – a sincere sensitivity to human and animal suffering, an uncompromising commitment to frank philosophizing, but also a fearful antidemocratic and anti-emancipatory view of society – place him outside the major ideologies of the modern age, such as liberalism, libertarianism, progressivism, and conservatism.
Variable sharing is a fundamental property in the static analysis of logic programs, since it is instrumental for ensuring correctness and increasing precision while inferring many useful program properties. Such properties include modes, determinacy, non-failure, cost, etc. This has motivated significant work on developing abstract domains to improve the precision and performance of sharing analyses. Much of this work has centered around the family of set-sharing domains, because of the high precision they offer. However, this comes at a price: their scalability to a wide set of realistic programs remains challenging and this hinders their wider adoption. In this work, rather than defining new sharing abstract domains, we focus instead on developing techniques which can be incorporated in the analyzers to address aspects that are known to affect the efficiency of these domains, such as the number of variables, without affecting precision. These techniques are inspired in others used in the context of compiler optimizations, such as expression reassociation and variable trimming. We present several such techniques and provide an extensive experimental evaluation of over 1100 program modules taken from both production code and classical benchmarks. This includes the Spectector cache analyzer, the s(CASP) system, the libraries of the Ciao system, the LPdoc documenter, the PLAI analyzer itself, etc. The experimental results are quite encouraging: we have obtained significant speedups, and, more importantly, the number of modules that require a timeout was cut in half. As a result, many more programs can be analyzed precisely in reasonable times.
Chapter 4 presents a review of the ISO 18000-63 protocol, including data encoding and modulation, and aspects of the transponder memory structure, security, and privacy, and presents real examples of reader–transponder transactions.
The chapter assesses whether the enforcement of extraterritorial sanctions through asset freezes is consistent with customary and treaty rules of international monetary law. After defining key concepts and describing the main characteristics of asset freezes, a definition of such measures through the lenses of international monetary law is provided. The research then moves, first, to discuss whether the imposition of asset freezes to enforce extraterritorial sanctions regimes can be deemed an exercise of internal or external monetary sovereignty and, second, whether unilateral (extraterritorial) sanctions can be considered to amount to exchange restrictions legitimately introduced for security reasons for the purposes of the Articles of Agreement of the International Monetary Fund (IMF). The chapter concludes with a critical assessment of the IMF legal regime on unilateral (extraterritorial) sanctions.
This chapter explains the performance of the Centro Democrático in Colombia and its concurrent success at the national level and underachievement at the subnational level. It argues that this disparity is linked to two interrelated variables: the security cleavage along which the Centro Democrático has developed its partisan identity, and the party’s weak subnational partisan structures. Security issues mobilize voters on the national level, but are too broad to be relevant in local elections.
US legislators show a remarkable variation in how many bills and resolutions they sponsor and cosponsor to support Taiwan. I argue that legislators’ perception of China and their partisan identity play a crucial role in shaping their support for Taiwan. To test my hypotheses, I conducted a quantitative analysis of all Taiwan-specific bills and resolutions introduced from the 110th to 116th House of Representatives. The results indicate that legislators who view China as a security threat to the US or a non-democracy and a human rights violator exhibit a higher level of support for Taiwan. However, seeing China as an economic challenger has the least significant effect. Furthermore, although there is a general consensus that Taiwan is a bipartisan issue in Congress, my research demonstrates that Republicans display a greater level of interest in supporting Taiwan compared to Democrats.
On the cusp of the First World War, the global transition from coal to oil as the predominant energy source for technological, military, and industrial purposes markedly augmented the strategic value of oil, a prominence it retained for subsequent decades. In reaction, the British government, which possessed a 51 per cent stake in the Anglo-Persian Oil Company, sanctioned a significant expansion of the industry within its sphere of indirect influence. As petroleum demand escalated during the conflict, this enlargement necessitated the prioritisation of workforce allocation and maintenance, essential for producing petroleum in its varied forms. In response, a novel labour recruitment policy was instituted in collaboration with the British Indian Raj, extending the scope of recruitment beyond the borders of Iran through the Persian Gulf. As the war intensified, the strategic significance of Iran – highlighted by its extensive oil reserves and the proximity of its oil fields and refinery to the Mesopotamian front – transformed it from a marginal theatre of war into a pivotal military operations centre, thereby rendering it a sustained zone of conflict. This shift profoundly affected the operations and security of the Iranian oil industry and markedly influenced the working and living conditions of the labour force throughout the duration of the war.
This chapter describes the conceptual and analytical premises used in the book’s country case studies. It uses the transition studies’ multilevel perspective as a starting point to begin exploring the diverse ways in which security and defense can be connected to sustainability transitions. It starts by discussing the landscape concept and how it ties into security. The chapter then moves onto outlining policy coherence at the regime level and ends with conceptualizing security in the transition processes of niche expansion and regime decline.