Search results for "National security"

showing 10 items of 62 documents

Final Reflections: Global Challenges from Innovation and Connectivity

2020

Lattemann et al. summarize the discussions in the edited book on Huawei goes Global—with Vol. I examining the major global threads caused by the rise of tech-giant Huawei. They recap the debate about the tensions between China and the Western world about global leadership, geopolitical power, national security, ideological, and economic threats, global connectivity, and about the shape of the upcoming technological world order. The culminating point is the question about the link between Huawei and the Chinese Government. The 5G standard, pushed by Huawei, has the power to change the world. The closeness of the ties between Huawei and the Chinese Government will decide if the world will end…

GovernmentNational securitybusiness.industrymedia_common.quotation_subjectAuthoritarianismGlobal LeadershipGeopoliticsLiberalism (international relations)Political economyPolitical scienceIdeologybusinessChinamedia_common
researchProduct

Somalia: From the Errors of Colonialism to the Horrors of War

2012

Chapter 5 analyses the reality of the Republic of Somalia, a country which is currently facing the worst humanitarian crisis in history. The first descriptive part of the article shows how the current human catastrophe devastating the Somali people is the result of the incomprehensible de-composition of one of the most homogenous peoples in Africa, not only ethnically speaking, but also from a linguistic, religious and cultural point of view. This de-composition, which has led to Somalia being known as the “State without State”, is undoubtedly rooted in the errors and horrors suffered, in the first place, during the successive processes of colonization and de-colonisation, but also during t…

National securitybusiness.industrymedia_common.quotation_subjectHumanitarian crisisInternational lawHumanitarian interventionSomalilanguage.human_languageIndependenceGeographyPolitical economyDevelopment economicslanguagebusinessResponsibility to protectHuman securitymedia_common
researchProduct

La opinión pública ante la vigilancia masiva de datos. El difícil equilibrio entre acceso a la información y seguridad nacional

2015

RESUMEN: La transparencia y el acceso a la información convierten a la sociedad en una participante activa del proceso de rendición de cuentas de los poderes públicos. Pero, esa libertad informativa tiene límites, como lo es el secreto que necesariamente impone, en la mayor parte de las ocasiones, la salvaguarda de la seguridad nacional. El secreto - y por lo tanto, la excepción a la regla general de la publicidad- tiene como misión impedir que se conozcan ciertas actividades de inteligencia, que recaban y tratan información con la finalidad de garantizar el éxito de determinadas acciones de los servicios de inteligencia-defensa o de prevenir riesgos. En este trabajo se aborda la difícil co…

National securitySociology and Political ScienceDerechoFreedom of informationbusiness.industrymedia_common.quotation_subjectWelfare economicsControl (management)SafeguardingTransparency (behavior)Object (philosophy)GeographyState (polity)AccountabilitybusinessLawCartographymedia_common
researchProduct

CZYM JEST ASZ-SZABAB? ZARYS ATAKU NA GALERIĘ HANDLOWĄ WESTGATE

2017

: We wrześniu 2013 roku światem wstrząsnęła informacja o krwawym zamachu w Nairobi. Mimo zaangażowania mediów w relacjonowanie całego zajścia samo zjawisko organizacji Asz-Szabab nie zostało wyczerpująco wyjaśnione. Autorzy artykułu podjęli więc próbę ukazania złożoności i stopnia skomplikowania całego zagadnienia. W pracy starano się w sposób obiektywny zbudować wizerunek Asz-Szabab, jak i przedstawić sposób jej działania w ujęciu bezpieczeństwa wewnętrznego głównie kontynentu Afrykańskiego i Europejskiego. Dokonano tego analizując szczegółowo sam zamach w Kenii, jak i codzienne działanie organizacji na swoim terenie. Zarysowano również tło historyczne oraz kulturowe w celu określenia waru…

terroryzmInternational SecuritySomaliaAl ShabaabSzariatAsz-SzababterrorismAl KaidaSharia LawIslambezpieczeństwo międzynarodoweRoczniki Studenckie Akademii Wojsk Lądowych
researchProduct

The importance of strategic leadership in cyber security : Case of Finland

2019

Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this paper is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. The paper also asks (and answers) how the strategic leadership of cyber secur…

leadershipcyber securitystrategic leadershipsituational picturestrateginen johtaminennational securitykansallinen turvallisuuskyberturvallisuustilannekuvajohtajuusturvallisuuspolitiikka
researchProduct

Libre circulación de inversiones en la Unión Europea en tiempos de COVID-19

2020

Las inversiones extranjeras han fluido como nunca durante las últimas décadas, en el marco de una aceptación generalizada de sus beneficios. Esta situación, sin embargo, comienza a alterarse de forma acelerada en múltiples lugares del planeta. La presencia de un entorno geoestratégico más complejo y la aproximación crítica de muchos Estados hacia la globalización y lo que ella significa, está consolidando una visión más cautelosa hacia la libre circulación de inversiones extranjeras que, entre otros efectos, se plasma en la elaboración de normativas más restrictivas. La Unión Europea es un espacio económicamente integrado, muy abierto a las inversiones extranjeras y dotado además, de una po…

SiegeNational securityinversiones extranjerasbusiness.industryDret internacional privatseguridad nacionalInternational tradeForeign direct investmentcontrol de las inversiones extranjerasGlobalizationConsolidation (business)covid-19lcsh:K1-7720Political sciencelcsh:Law in general. Comparative and uniform law. Jurisprudencemedia_common.cataloged_instanceElement (criminal law)European unionunión europeabusinessCommon commercial policymedia_common
researchProduct

Introduction: Security, Criminal Justice and Human Rights in Countering Terrorism in the Post 9/11 Era

2012

In the aftermath of the 9/11 attacks on New York and Washington, many commentators claimed that the world had changed ‘forever’ with international terrorism constituting one of the defining global security challenges of the twenty-first century. The renewed focus on counter-terrorism law and policy also called into question whether the lessons drawn from previous terrorism emergencies are pertinent to the post-9/11 environment. Indeed, to what extent, if at all, are the principles identified for the liberal democratic response to traditional forms of terrorism applicable to a response to contemporary international terrorism? The historical, political and security implications of 9/11 notwit…

Theory of criminal justicePoliticsHuman rightsLawPolitical sciencemedia_common.quotation_subjectTerrorismPolitical violenceInternational securityDemocracyCriminal justicemedia_common
researchProduct

U.S. Grand Strategy Towards Russia 2001-2017

2019

Objectives<i>U.S. foreign policy towards Russia is of the utmost importance for the national security of the countries on the NATO eastern flank. Grand strategies are among the analytical concepts for classification and analysis of U.S. actions in the international arena. This paper uses grand strategy classification framework to classify and analyse U.S. strategy towards Russia from 2001 to 2017.</i>Methods<i>36 speeches about Russia by U.S. Presidents George Bush and Barack Obama and Vice President Joe Biden from 2001 to 2017 were used in content analysis. U.S. grand strategy classification framework was used as the tool for coding and classifying different foreign polic…

russialcsh:Military ScienceEconomyGrand strategylcsh:UPolitical scienceInternational securitygrand strategyGeopoliticsusaSecurity and Defence Quarterly
researchProduct

Young People and the Dark Side of Social Media: Possible Threats to National Security

2020

Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…

National securitypolicebusiness.industrysocial mediaInternet privacysosiaalinen mediapoliisi (organisaatiot)young peoplerikollisuusnuoretGreat RiftPolitical scienceinformaatiovaikuttaminenSocial medianational securitykansallinen turvallisuustietoturvabusinessinformation influenceriskitProceedings of the 19th European Conference on Cyber Warfare
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct