Letteratura scientifica selezionata sul tema "Canadian Security Intelligence Act (Proposed)"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Canadian Security Intelligence Act (Proposed)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Canadian Security Intelligence Act (Proposed)"

1

Salter, Mark B., e Geneviève Piché. "The Securitization of the US–Canada Border in American Political Discourse". Canadian Journal of Political Science 44, n. 4 (dicembre 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.

Testo completo
Abstract (sommario):
Abstract. In this paper, the authors analyze the empirical process of securitization of the US–Canada border and then reflect on the model proposed by the Copenhagen School. We argue that securitization theory oversimplifies the political process of securitizing moves and audience acceptance. Rather than attributing securitization to a singular speaker addressing a specific audience, we present overlapping and ongoing language security games performed by varying relevant actors during the key period between the Intelligence Reform and Terrorism Prevention Act (IRTPA) in December 2004 and the signing of the Security and Prosperity Partnership of North America (SPP) in June 2005, showing how multiple speakers participate in the continuing construction of a context in which this issue is increasingly treated as a matter of security. We also explore the language adopted by participants in the field, focusing on an expert panel convened by the Homeland Security Institute. We conclude that in the securitization of the US–Canada border there are inconsistencies between truth and discourse, as well as significant distinctions between official and bureaucratic discourses, further emphasizing the importance of a comprehensive model of securitization.Résumé. Dans cet article, les auteurs font l'analyse du processus empirique de la sécurisation de la frontière Canado-Américaine à travers la réflexion sur le modèle proposé par l'École de Copenhague. Nous soutenons que cette théorie de sécurisation simplifie trop le processus politique de son initiation et de l'acceptation de l'auditeur. Au lieu d'attribuer la sécurisation à un orateur, s'adressant à un public particulier, nous présentons les jeux de langage continuels effectués par plusieurs acteurs pendant la période suivant la Intelligence Reform and Terrorism Prevention Act (IRTPA) en décembre 2004, jusqu'à l'approbation de la Security and Prosperity Partnership of North America (SPP) en juin 2005. Nous maintenons que plusieurs orateurs participent dans la construction continuelle du contexte dans lequel l'affaire est de plus en plus comprise dans le cadre de sécurité. Nous explorons aussi le langage employé par les participants dans le champ, observant surtout un groupe d'experts convoqué au Homeland Security Institute. Nous concluons que dans le cas de la sécurisation de la frontière Canado-Américaine il existe des incohérences entre le discours et le réel, ainsi que des distinctions significatives entre les discours officiels et bureaucratiques, mettant l'accent sur l'importance d'un modèle compréhensif de sécurisation.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

EDWARDS, J. LL J. "The Canadian Security Intelligence Act 1984—a Canadian appraisal". Oxford Journal of Legal Studies 5, n. 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Guilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, n. 1 (1 giugno 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.

Testo completo
Abstract (sommario):
On 9 December 2014, the New Zealand Security Intelligence Service Amendment Act 2014 amended the New Zealand Security Intelligence Service Act 1969 by removing the requirement for an intelligence or visual surveillance warrant in some situations of emergency or urgency. The warrant process is the primary mechanism for the purpose of ensuring surveillance powers are not exercised arbitrarily or unreasonably. Any departure from this process must be justified, limited and proportionate. After a brief look at the history of the Bill, this article will then consider the circumstances in which a warrantless authorisation shall be granted and information retained, with reference to the trigger concepts of "terrorist act", "foreign terrorist fighter" and "security". Amendments proposed include limiting the grounds for warrantless surveillance and information retention to countering "foreign terrorist fighters". It will then discuss the consistency of the Bill with the New Zealand Bill of Rights Act 1990, focusing on the authorisation structure and length. It will put forward a proposed amendment that restructures the power such that authorisation for surveillance in urgency will be provided by the Minister and Commissioner within 12 hours.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kumari, Rashmi, e Dr Priyanka Singh. "Weaponizing Artificial Intelligence". International Journal for Research in Applied Science and Engineering Technology 11, n. 6 (30 giugno 2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.

Testo completo
Abstract (sommario):
Abstract: The research paper delved into the concerns of chatbot users and the potential risks lurking in the shadows—security, privacy, data protection, and social quandaries. What emerged from the study was a disquietude among users, fearing the misuse or thievery of their personal information. Additionally, apprehension surfaced regarding the sinister deployment of chatbots in the realms of phishing scams and the propagation of deceitful news. To ensure a shielded experience when engaging with chatbots, users were provided with sagacious counsel. They were admonished to only divulge their valuable information to chatbots that have garnered a reputable and trustworthy stature. Moreover, a word of caution resonated, urging users to exercise vigilance in their cyber-surfing, refraining from clicking on dubious links and showing discretion when confronted with attachments or applications proposed by chatbots. Careful advice also dictated the periodic updating of devices and software, ensconcing the latest security fixes within their digital fortresses. As an added layer of defence, users were encouraged to change their passwords at regular intervals, an act of precautionary foresight guarding against potential breaches of security.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Shchukina, Tatiana. "Canada's Digital Charter becomes law". Russia and America in the 21st Century, n. 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.

Testo completo
Abstract (sommario):
Canadians increasingly rely on digital technology to connect with each other, to work and innovate. That’s why the Government of Canada is committed to making sure Canadians can benefit from the latest technologies, knowing that their privacy is safe and secure, and that companies are acting responsibly. In June 2022, the government proposed the Digital Charter Implementation Act, 2022, which will significantly strengthen Canada’s private sector privacy law, create new rules for the responsible development and use of artificial intelligence (AI), and continue advancing the implementation of Canada’s Digital Charter. Canada's Digital Charter sets out principles to ensure that privacy is protected, data-driven innovation is human-centred, and Canadian organizations can lead the world in innovations that fully embrace the benefits of the digital economy. Canadians must be able to trust that their personal information is protected, that their data will not be misused, and that organizations operating in this space communicate in a simple and straightforward manner with their users. This trust is the foundation on which Canadian digital and data-driven economy will be built. This legislation takes a number of important steps to ensure that Canadians have confidence that their privacy is respected and that AI is used responsibly, while unlocking innovation that promotes a strong economy. The Digital Charter Implementation Act, 2022 will include three proposed acts: the Consumer Privacy Protection Act, the Personal Information and Data Protection Tribunal Act, and the Artificial Intelligence and Data Act.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Carabash, Michael P. A. "Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional". Constitutional Forum / Forum constitutionnel 15, n. 1, 2 & 3 (24 luglio 2011): 2006. http://dx.doi.org/10.21991/c9hq17.

Testo completo
Abstract (sommario):
After six short weeks of debate, Bill C-36, The Anti-terrorism Act,1 passed into law on 28 November 2001. Bill C-36 was Parliament’s formal legislative response to the terrorist attacks upon the U.S. on September 11. Among other things, Bill C-36 amended the National Defence Act2 to grant the Minister of National Defence, in place of a judge, the power to authorize the Communications Security Establishment (CSE) to intercept private communications for the purpose of obtaining foreign intelligence under section 273.65. The CSE’s mandate includes acquiring and providing foreign signals intelligence.3 In this article, I argue that this amendment to the National Defence Act abolished an essential safeguard to arbitrary state actions and likely violates section 8 of the Canadian Charter of Rights and Freedoms.4 The eventual removal of section 273.65 from the National Defence Act would uphold the long-standing, appropriate, and constitutional doctrine that the power to authorize agents of the state to intercept private communications rests solely with the judiciary.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Laurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, n. 3 (19 agosto 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.

Testo completo
Abstract (sommario):
In November of 2016, the Federal Court of Canada published a scathing ruling pertaining to some of the Canadian Security Intelligence Service’s (CSIS) big data surveillance activities. Among other charges of wrongdoing, the ruling accused the agency of not having been forthcoming with the Court about the existence of its “Operational Data Analysis Center” (ODAC), an advanced analytics bulk metadata exploitation program that had been operational since 2006. The ruling also revealed that a significant portion of the metadata collected by CSIS should not have been retained in ODAC, a practice that the ruling declared illegal. Drawing from the ruling, a series of classified CSIS documents obtained via requests made under the Access to Information Act, various public reports from both CSIS and the Security Intelligence Review Committee, as well as a Senate Committee hearing transcript, this article examines CSIS’s conduct, justifications, and statements relating to its bulk metadata retention activities spanning from the year of ODAC’s inception in 2006 to the publication of the ODAC ruling in 2016. The paper demonstrates how CSIS engaged in various forms of secrecy and how it successfully constructed and disseminated its own big data related language to effectively “gerrymander” the national security narrative, thereby ultimately ensuring its tight control over the knowledge that the Court would have of big data surveillance and CSIS’s engagement with it. This would enable the Service to keep its metadata exploitation program out of sight and operational for ten years until the Court ended up declaring a significant portion of ODAC illegal in 2016.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Moraboena, Srikanthyadav, Gayatri Ketepalli e Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, n. 4 (30 settembre 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.

Testo completo
Abstract (sommario):
The security of computer networks is critical for network intrusion detection systems (NIDS). However, concerns exist about the suitability and sustainable development of current approaches in light of modern networks. Such concerns are particularly related to increasing levels of human interaction required and decreased detection accuracy. These concerns are also highlighted. This post presents a modern intrusion prevention deep learning methodology. For unattended function instruction, we clarify our proposed Symmetric Deep Autoencoder (SDAE). Also, we are proposing our latest deep research classification model developed with stacked SDAEs. The classification proposed by the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Canadian Institute for Cybersecurity -Intrusion Detection System (CICIDS 2017) data sets was implemented in Tensor Flow, a Graphics Procedure Unit (GPU) enabled and evaluated. We implemented and tested our experiment with different batch sizes using Adam optimizer. Promising findings from our model have been achieved so far, which demonstrates improvements over current solutions and the subsequent improvement for use in advanced NIDS.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Monaghan, Jeffrey. "Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada". Surveillance & Society 12, n. 4 (19 giugno 2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.

Testo completo
Abstract (sommario):
Security agencies in Canada have become increasingly anxious regarding the threat of domestic radicalization. Defined loosely as “the process of moving from moderate beliefs to extremist belief,” inter-agency security practices aim to categorize and surveil populations deemed at-risk of radicalization in Canada, particularly young Muslims. To detail surveillance efforts against domestic radicalization, this article uses the Access to Information Act (ATIA) to detail the work of Canada’s inter-agency Combating Violent Extremism Working Group (CVEWG). As a network of security governance actors across Canada, the CVEWG is comprised of almost 20 departments and agencies with broad areas of expertise (intelligence, defence, policing, border security, transportation, immigration, etc.). Contributing to critical security studies and scholarship on the sociology of surveillance, this article maps the contours and activities of the CVEWG and uses the ATIA to narrate the production and iteration of radicalization threats through Canadian security governance networks. Tracing the influence of other states – the U.S. and U.K., in particular – the article highlights how surveillance practices that target radicalization are disembedded from particular contexts and, instead, framed around abstractions of menacing Islam. By way of conclusion, it casts aspersions on the expansion of counter-terrorism resources towards combating violent extremism; raising questions about the dubious categories and motives in contemporary practices of the “war on terror.”
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Meng, Mingming, e Yuancheng Li. "SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks". PeerJ Computer Science 8 (29 giugno 2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.

Testo completo
Abstract (sommario):
The intelligence of energy storage devices has led to a sharp increase in the amount of detection data generated. Data sharing among distributed energy storage networks can realize collaborative control and comprehensive analysis, which effectively improves the clustering and intelligence. However, data security problems have become the main obstacle for energy storage devices to share data for joint modeling and analysis. The security issues caused by information leakage far outweigh property losses. In this article, we first proposed a blockchain-based machine learning scheme for secure data sharing in distributed energy storage networks. Then, we formulated the data sharing problem into a machine-learning problem by incorporating secure federated learning. Innovative verification methods and consensus mechanisms were used to encourage participants to act honestly, and to use well-designed incentive mechanisms to ensure the sustainable and stable operation of the system. We implemented the scheme of SFedChain and experimented on real datasets with different settings. The numerical results show that SFedChain is promising.
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Canadian Security Intelligence Act (Proposed)"

1

Kavchak, Andrew. Canadian national security and the CSIS Act. Toronto: MacKenzie Institute for the Study of Terrorism, Revolution and Propaganda, 1989.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

General, Canada Dept of the Solicitor. On course: National security for the 1990s : the government's responseto the Report of the House of Commons Special Committee on the Review of the Canadian Security Intelligence Service Act and the Security Offences Act. Ottawa: Department of the Solicitor General, 1991.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Canada, Canada Solicitor General. On course: National security for the 1990s : the government's response to the Report of the House of Commons Special Committee on the Review of the Canadian Security Intelligence Service Act and the Security Offences Act. [Ottawa]: Solicitor General Canada, 1991.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Canada. Parliament. House of Commons. Special Committee on the Review of the CSIS Act and the Security Offences Act. In flux, but not in crisis: A report of the House of Commons, Special Committee on the Review of the Canadian Security Intelligence Service Act and the Security Offences Act. Ottawa: Queen's Printer for Canada, 1990.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Canada. Parliament. House of Commons. Special Committee on the Review of the Canadian Security Intelligence Service Act and the Security Offences Act. In flux but not in crisis: A report of the House of Commons Special Committee on the Review of the Canadian Security Intelligence Service Act. Ottawa, Ont: Queen's Printer, 1990.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Hugh, Beale, Bridge Michael, Gullifer Louise e Lomnicka Eva. Part VII Criticism and Law Reform Proposals, 23 Criticism and Reform Proposals. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.003.0023.

Testo completo
Abstract (sommario):
This chapter discusses how aspects of law governing security over personal property, and especially the registration requirements for company charges and for bills of sale and the rules of priority, have been criticized for many years. There has been a series of reports recommending reform; some of these have recommended amendments to the Companies Act and the rules of priority of charges registered under the Act. Meanwhile, others have proposed more radical reforms that would replace both the Companies Act and the Bills of Sale Acts with a ‘notice filing’ scheme based on Article 9 of the United States Uniform Commercial Code and subsequently adopted, with slight variations, in many Canadian provinces and New Zealand.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Bailey, Jane, e Sara Shayan. Systematic Government Access to Private-Sector Data in Canada. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0007.

Testo completo
Abstract (sommario):
This chapter focuses on Canadian law as it applies to government access to private-sector data. The Canadian Charter of Rights and Freedoms implicitly provides constitutional protection of privacy by prohibiting unreasonable search and seizure by the state (s. 8) and by limiting government intrusion on life, liberty and security of the person (s. 7). With some exceptions, the Charter requires law enforcement agencies to seek prior authorization before accessing personal information. However, Canada’s national security intelligence agencies are subject to more relaxed standards. The Privacy Act regulates federal government institutions’ relationship with personal information, whereas the private sector is regulated by the Personal Information and Protection of Electronic Documents Act. However, numerous exceptions in both statutes allow for (and in some cases encourage), information sharing between private-sector and state entities.
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Canadian Security Intelligence Act (Proposed)"

1

Ergüner Özkoç, Esma. "Privacy Preserving Data Mining". In Artificial Intelligence. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.99224.

Testo completo
Abstract (sommario):
Data mining techniques provide benefits in many areas such as medicine, sports, marketing, signal processing as well as data and network security. However, although data mining techniques used in security subjects such as intrusion detection, biometric authentication, fraud and malware classification, “privacy” has become a serious problem, especially in data mining applications that involve the collection and sharing of personal data. For these reasons, the problem of protecting privacy in the context of data mining differs from traditional data privacy protection, as data mining can act as both a friend and foe. Chapter covers the previously developed privacy preserving data mining techniques in two parts: (i) techniques proposed for input data that will be subject to data mining and (ii) techniques suggested for processed data (output of the data mining algorithms). Also presents attacks against the privacy of data mining applications. The chapter conclude with a discussion of next-generation privacy-preserving data mining applications at both the individual and organizational levels.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Foltz, Kevin, e William R. Simpson. "Secure Server Key Management Designs for the Public Cloud". In Machine Learning and Artificial Intelligence. IOS Press, 2020. http://dx.doi.org/10.3233/faia200789.

Testo completo
Abstract (sommario):
The Enterprise Level Security (ELS) model focuses on designing secure, distributed web-based systems starting from basic principles. One area of ELS that poses significant design challenges is protection of web server private keys in a public cloud. Web server private keys are of critical importance because they control who can act as the server to represent the enterprise. This includes responding to requests as well as making requests within the enterprise and to its partners. The cloud provider is not part of this trusted network of servers, so the cloud provider should not have access to server private keys. However, current cloud systems are designed to allow cloud providers free access to server private keys. This paper proposes design solutions to securely manage private keys in a public cloud. An examination of commonly used approaches demonstrates the ease with which cloud providers can currently control server private keys. Two designs are proposed to prevent cloud provider access to keys, and their implementation issues are discussed.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia