Search results for "National security"
showing 10 items of 62 documents
Final Reflections: Global Challenges from Innovation and Connectivity
2020
Lattemann et al. summarize the discussions in the edited book on Huawei goes Global—with Vol. I examining the major global threads caused by the rise of tech-giant Huawei. They recap the debate about the tensions between China and the Western world about global leadership, geopolitical power, national security, ideological, and economic threats, global connectivity, and about the shape of the upcoming technological world order. The culminating point is the question about the link between Huawei and the Chinese Government. The 5G standard, pushed by Huawei, has the power to change the world. The closeness of the ties between Huawei and the Chinese Government will decide if the world will end…
Somalia: From the Errors of Colonialism to the Horrors of War
2012
Chapter 5 analyses the reality of the Republic of Somalia, a country which is currently facing the worst humanitarian crisis in history. The first descriptive part of the article shows how the current human catastrophe devastating the Somali people is the result of the incomprehensible de-composition of one of the most homogenous peoples in Africa, not only ethnically speaking, but also from a linguistic, religious and cultural point of view. This de-composition, which has led to Somalia being known as the “State without State”, is undoubtedly rooted in the errors and horrors suffered, in the first place, during the successive processes of colonization and de-colonisation, but also during t…
La opinión pública ante la vigilancia masiva de datos. El difícil equilibrio entre acceso a la información y seguridad nacional
2015
RESUMEN: La transparencia y el acceso a la información convierten a la sociedad en una participante activa del proceso de rendición de cuentas de los poderes públicos. Pero, esa libertad informativa tiene límites, como lo es el secreto que necesariamente impone, en la mayor parte de las ocasiones, la salvaguarda de la seguridad nacional. El secreto - y por lo tanto, la excepción a la regla general de la publicidad- tiene como misión impedir que se conozcan ciertas actividades de inteligencia, que recaban y tratan información con la finalidad de garantizar el éxito de determinadas acciones de los servicios de inteligencia-defensa o de prevenir riesgos. En este trabajo se aborda la difícil co…
CZYM JEST ASZ-SZABAB? ZARYS ATAKU NA GALERIĘ HANDLOWĄ WESTGATE
2017
: We wrześniu 2013 roku światem wstrząsnęła informacja o krwawym zamachu w Nairobi. Mimo zaangażowania mediów w relacjonowanie całego zajścia samo zjawisko organizacji Asz-Szabab nie zostało wyczerpująco wyjaśnione. Autorzy artykułu podjęli więc próbę ukazania złożoności i stopnia skomplikowania całego zagadnienia. W pracy starano się w sposób obiektywny zbudować wizerunek Asz-Szabab, jak i przedstawić sposób jej działania w ujęciu bezpieczeństwa wewnętrznego głównie kontynentu Afrykańskiego i Europejskiego. Dokonano tego analizując szczegółowo sam zamach w Kenii, jak i codzienne działanie organizacji na swoim terenie. Zarysowano również tło historyczne oraz kulturowe w celu określenia waru…
The importance of strategic leadership in cyber security : Case of Finland
2019
Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this paper is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. The paper also asks (and answers) how the strategic leadership of cyber secur…
Libre circulación de inversiones en la Unión Europea en tiempos de COVID-19
2020
Las inversiones extranjeras han fluido como nunca durante las últimas décadas, en el marco de una aceptación generalizada de sus beneficios. Esta situación, sin embargo, comienza a alterarse de forma acelerada en múltiples lugares del planeta. La presencia de un entorno geoestratégico más complejo y la aproximación crítica de muchos Estados hacia la globalización y lo que ella significa, está consolidando una visión más cautelosa hacia la libre circulación de inversiones extranjeras que, entre otros efectos, se plasma en la elaboración de normativas más restrictivas. La Unión Europea es un espacio económicamente integrado, muy abierto a las inversiones extranjeras y dotado además, de una po…
Introduction: Security, Criminal Justice and Human Rights in Countering Terrorism in the Post 9/11 Era
2012
In the aftermath of the 9/11 attacks on New York and Washington, many commentators claimed that the world had changed ‘forever’ with international terrorism constituting one of the defining global security challenges of the twenty-first century. The renewed focus on counter-terrorism law and policy also called into question whether the lessons drawn from previous terrorism emergencies are pertinent to the post-9/11 environment. Indeed, to what extent, if at all, are the principles identified for the liberal democratic response to traditional forms of terrorism applicable to a response to contemporary international terrorism? The historical, political and security implications of 9/11 notwit…
U.S. Grand Strategy Towards Russia 2001-2017
2019
Objectives<i>U.S. foreign policy towards Russia is of the utmost importance for the national security of the countries on the NATO eastern flank. Grand strategies are among the analytical concepts for classification and analysis of U.S. actions in the international arena. This paper uses grand strategy classification framework to classify and analyse U.S. strategy towards Russia from 2001 to 2017.</i>Methods<i>36 speeches about Russia by U.S. Presidents George Bush and Barack Obama and Vice President Joe Biden from 2001 to 2017 were used in content analysis. U.S. grand strategy classification framework was used as the tool for coding and classifying different foreign polic…
Young People and the Dark Side of Social Media: Possible Threats to National Security
2020
Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
2009
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…