884 research outputs found
The EU as a security actor in Africa
Instability and conflict in Africa create a range of security problems for Europe. Rapidly increasing migration via the Mediterranean Sea, extremism and terrorism, as well as cross-border crime, all have implications for security in Europe, but are spill-over effects of instability outside Europe. The European Union has a considerable interest in a stable Africa, and also seems willing to assume a special responsibility for the continent.
This Clingendael report focuses on the European Union’s role as a security actor in Africa. It considers the use of all the policy instruments at the EU’s disposal. The authors concentrate mainly on the question how the integrated approach is evolving, and what consequences this has for the Common Security and Defence Policy
Europe's security upside down
A existência de uma separação entre segurança externa e interna cessou de existir. Os efeitos de propagação de conflitos e da instabilidade em áreas como o Sahel e o Médio Oriente são sentidos na Europa. No presente e no futuro o crime organizado, o terrorismo, a emigração ilegal e os ciberataques
constituem uma preocupação de segurança, enquanto as ameaças militares - exceto no que respeita ao emprego de mísseis – desapareceram. Contudo, não existe uma resposta integrada a estes problemas de segurança por falta de interesse das nações e da UE. Continuam a existir estratégias, estruturas e acordos separados no plano externo (PCSD, Relações Externas e Defesa) e no plano dos atores internos de segurança (Justiça e Assuntos Internos – JAI). Uma exceção reside no desenvolvimento de capacidades, onde as comunidades civil e militar coordenam crescentemente programas, em particular no setor aéreo e espacial. Com o propósito de ultrapassar a clivagem interna-externa, a UE terá que tomar medidas práticas:
elaborar uma verdadeira Estratégia de Segurança Integrada articulando o domínio da PCSD com o da JAI; desenvolvimento holístico de capacidades e emprego de capacidades civis-militares em áreas como transporte, reconhecimento e comunicações; integração de sistemas de vigilância marítima civil e militar entre outras. Sem a liderança dos EUA, a Europa terá que assumir mais responsabilidades pela sua segurança. A força militar sendo necessária passará a fazer parte de um esforço mais amplo, colaborando com atores civis dentro e fora da Europa
Core Groups: The way to real European defence. Egmont Security Policy Brief No. 81 February 2017
Continuing the series of contributions from the speakers at the 6-7 February Egmont – Raytheon event on « The European Defence of Europe », Egmont publishes a policy brief by our Clingendael colleague Dick Zandee.
European countries continue to have different political views on the use of military force. Their armed forces also show a wide variety in terms of capabilities for operations low to high in the spectrum. Thus, European strategic autonomy in deploying armed forces for military operations requires a new approach. Rather than pursuing the impossible – acting at 28 – European countries should form core groups of partners with comparable intent, willingness and capabilities. France and the UK can provide the core for a European intervention force while Germany and Poland could constitute the core of a heavy land force formation. All core groups should support each other in a network, to be developed under the overarching umbrella’s of the EU and NATO
Conducting Research with Community Groups
Nurse scientists are increasingly recognizing the necessity of conducting research with community groups to effectively address complex health problems and successfully translate scientific advancements into the community. While several barriers to conducting research with community groups exist, community based participatory research (CBPR) has the potential to mitigate these barriers. CBPR has been employed in programs of research that respond in culturally sensitive ways to identify community needs and thereby address current health disparities. This manuscript presents case studies that demonstrate how CBPR principles guided the development of: (a) a healthy body weight program for urban, underserved African-American women, (b) a reproductive health educational intervention for urban, low-income, underserved, ethnically diverse women, and (c) a pilot anxiety/depression intervention for urban, low-income, underserved, ethnically diverse women. These case studies illustrate the potential of CBPR as an orientation to research that can be employed effectively in non-research intensive academic environments
De EU als veiligheidsactor in Afrika
Instabiliteit en conflicten in Afrika veroorzaken verschillende veiligheidsproblemen voor Europa. De snel toenemende migratie via de Middellandse Zee, extremisme en terrorisme, alsmede grensoverschrijdende criminaliteit hebben gevolgen voor de veiligheid in Europa, maar zijn spill-over effecten van instabiliteit buiten Europa. De Europese Unie (EU) heeft veel belang bij een stabiel Afrika en zij lijkt ook een bijzondere verantwoordelijkheid voor het continent op zich te willen nemen.
De verdiepingsstudie richt zich op de rol van de EU als veiligheidsactor in Afrika, waarbij het gaat om de inzet van het gehele beschikbare EU-instrumentarium. De auteurs concentreren zich vooral op de vraag hoe de geïntegreerde benadering van de EU zich verder ontwikkelt en welke gevolgen dit met zich meebrengt voor het Gemeenschappelijk Veiligheids- en Defensiebeleid
The role of critical incident monitoring in detection and prevention of human breast milk confusions
Feeding a mother's expressed breast milk to the wrong infant is a well-known misidentification error in neonatal intermediate care units (NICU) with potential harmful consequences for the neonate. In this study, we aimed to analyze the role of critical incident monitoring on detection and prevention of human breast milk confusions. The critical incident monitoring made us aware of this misidentification error on our NICU. Despite the implementation of system changes to make breast milk application clearer and safer, we failed to reduce the incidence of breast milk confusion
Recommended from our members
‘Proclaiming it to Greeks and Natives, along the rows of the chequer-board': readers and viewers of Greek, Latin and Demotic Acrostich inscriptions
Hellenistic and Roman acrostich inscriptions are usually full of verbal and visual clues, which point the reader in the direction of the ‘hidden message’ contained in the vertical lines of the text. The authors of such inscriptions want their audiences to appreciate the skill that has gone into their composition. There are several complementary ways in which the presence of an acrostich might be signalled to the reader or viewer and their attention directed towards it. These include direct verbal statements, or more subtle allusions, within the text of the inscription. But, even without having read its text, the viewer of an inscription containing a ‘hidden message’ is often immediately aware that some kind of wordplay is at work. Acrostichs, palindromes and various kinds of word square are all graphically striking, or their appearance may be enhanced to make them more so. Regular spacing, the repetition of the acrostich in a separate column and the use of painted or incised grids are all ways in which the layout of the text on the stone can invite the viewer to play a word game. In some cases, as I will argue in this paper, acrostich makers envisaged—even intended—the participants in this game to include the illiterate as well as the literate
Unifying Parsimonious Tree Reconciliation
Evolution is a process that is influenced by various environmental factors,
e.g. the interactions between different species, genes, and biogeographical
properties. Hence, it is interesting to study the combined evolutionary history
of multiple species, their genes, and the environment they live in. A common
approach to address this research problem is to describe each individual
evolution as a phylogenetic tree and construct a tree reconciliation which is
parsimonious with respect to a given event model. Unfortunately, most of the
previous approaches are designed only either for host-parasite systems, for
gene tree/species tree reconciliation, or biogeography. Hence, a method is
desirable, which addresses the general problem of mapping phylogenetic trees
and covering all varieties of coevolving systems, including e.g., predator-prey
and symbiotic relationships. To overcome this gap, we introduce a generalized
cophylogenetic event model considering the combinatorial complete set of local
coevolutionary events. We give a dynamic programming based heuristic for
solving the maximum parsimony reconciliation problem in time O(n^2), for two
phylogenies each with at most n leaves. Furthermore, we present an exact
branch-and-bound algorithm which uses the results from the dynamic programming
heuristic for discarding partial reconciliations. The approach has been
implemented as a Java application which is freely available from
http://pacosy.informatik.uni-leipzig.de/coresym.Comment: Peer-reviewed and presented as part of the 13th Workshop on
Algorithms in Bioinformatics (WABI2013
IL-10-producing, ST2-expressing Foxp3(+) T cells in multiple sclerosis brain lesions
CD4+Foxp3+ T regulatory (Treg) cells provide a key defence against inflammatory disease, but also have an ability to produce pro-inflammatory cytokines. The evidence for these two possibilities in multiple sclerosis (MS) is controversial. However, this has largely been based on studies of circulating Treg cells derived from peripheral blood, rather than the central nervous system. We show that Foxp3+ cells in the brains of MS patients predominantly produce interleukin-10 (IL-10) and show high expression of the IL-33 receptor ST2 (associated with potent Treg function), indicating that Treg in the inflamed brain maintain their suppressive function
- …
