排序方式: 共有630条查询结果,搜索用时 0 毫秒
41.
42.
43.
44.
Deborah D. Avant Author Vitae 《Orbis》2006,50(2):327-342
Images of private forces in Iraq—killed and mutilated in Fallujah, implicated in prisoner abuse at Abu Ghraib, and shooting up civilian vehicles—have provided a dramatic illustration of the role private security companies (pscs) now play in U.S. military operations. Though the United States’ use of contractors on the battlefield is not entirely new, the increased number of contractors deployed and the use of private security forces to perform an escalating number of tasks has created a new environment that poses important trade-offs for U.S. policy and military effectiveness and for U.S. relations with other states. This article outlines the history of U.S. contractors on the battlefield, compares that with the use of private security in Iraq, discusses the benefits and risks associated with their use, and proposes some trade-offs that decision-makers in the United States should consider while contemplating their use in the future. 相似文献
45.
46.
47.
48.
49.
50.
Ida Madieha AzmiAuthor Vitae 《Computer Law & Security Report》2011,27(4):394-401
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics. 相似文献