Information as an Evolving National Security Concern

2021 ◽  
pp. 389-408
Author(s):  
Adam Henschke
2019 ◽  
Vol 6 (2) ◽  
pp. 93-110 ◽  
Author(s):  
J. Reid Meloy ◽  
Alasdair M. Goodwill ◽  
M. J. Meloy ◽  
Gwyn Amat ◽  
Maria Martinez ◽  
...  

Author(s):  
Moses Thabo Katjisa Nkhoma ◽  
Albert Tchey Agbenyegah

The failure of the South African border security authorities to provide effective border security continues to be a national security concern. The inability to provide effective border security is due to factors such as ineffective methods of controlling and monitoring the borders. The aim of this study was to examine the practicability of employing space technology to address identified border security constraints. The study focused on border security authorities and the space technology sector in South Africa. To achieve this objective, a qualitative research methodology was used to ascertain the issues and constraints of border security in South Africa as well as the possibilities of utilising space technology to address border security constraints in South Africa. Findings indicate that there is a need to utilise space technology in South Africa to enhance the level of border security.


Author(s):  
Essien D. Essien

Discourses on the threats to cyber security in today's digital society have revealed that cyberspace has become an arena of complex national security concern. This lends credence to the fact that many countries, especially in Africa, need to urgently scale up their efforts to effectively secure the Internet and ICT infrastructures. Drawing upon extensive literature on cyber-security challenges, this chapter examines the phenomenon of cybercrime using Ronald Rogers' “protection motivation theory”. The study employs qualitative analysis of the current cyber-security landscape in Africa. Findings posit that with the risk and vulnerability of the cyberspace, cyber security in Africa poses a number of unique challenges which predicate a coordinated response for security and safety engagement. The study suggests collaborative measures to counter cybercrime through investigation, prosecution, and sharing information.


Author(s):  
Md. Saddam Hossain ◽  
Hao Zhang ◽  
Md. Sajjad Hosain ◽  
Li Yun

This paper aims at identifying the public and national security issues created by the Rohingya refugees in Bangladesh. Different published sources have been utilized in writing this review paper. The authors of this paper argue that the Rohingya issue is creating a number of security concerns for Bangladesh and a unified effort should be made in solving this issue involving Myanmar, Bangladesh, China, India and other neighboring countries. The authors further predict that although the issue is limited to Bangladesh at this moment, it will spread as a regional security concern soon if not solved as early as possible. Finally, the authors expect that this paper will be beneficial for further research on security issues postured by the Rohingyas.


2013 ◽  
Vol 4 (1) ◽  
pp. 1-37 ◽  
Author(s):  
Johan Sigholm

Abstract The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetric nature, the lack of attribution, the low cost of entry, the legal ambiguity, and its role as an efficient medium for protest, crime, espionage and military aggression, makes it an attractive domain for nation-states as well as non-state actors in cyber conflict. This paper studies the various non-state actors who coexist in cyberspace, examines their motives and incitements, and analyzes how and when their objectives coincide with those of nation-states. Literature suggests that many nations are currently pursuing cyberwarfare capabilities, oftentimes by leveraging criminal organizations and irregular forces. Employment of such non-state actors as hacktivists, patriot hackers, and cybermilitia in state-on-state cyberspace operations has also proved to be a usable model for conducting cyberattacks. The paper concludes that cyberspace is emerging as a new tool for state power that will likely reshape future warfare. However, due to the lack of concrete cyberwarfare experience, and the limited encounters of legitimate cyberattacks, it is hard to precisely assess future effects, risks and potentials.


2018 ◽  
Author(s):  
Tina Zheng

Cornell Law School J.D. Student Research Papers. 37Surveillance technology, which encompasses a large array of technologies used to observe individuals’ activities and communications, has advanced at a rapid pace and is becoming more widely available in the general marketplace. This trend is potentially caused by increasing fears of terrorism following the September 11 attacks as well the ability of surveillance technology manufacturers to produce the technology at lower costs. Although surveillance technology has long been used by the military and government intelligence agencies, the use of this technology by law enforcement and now private individuals in areas not of national security concern is new and raises privacy and evidentiary issues yet to be settled by U.S. courts.


The Lancet ◽  
2002 ◽  
Vol 360 (9336) ◽  
pp. 855 ◽  
Author(s):  
Roxanne Nelson

Sign in / Sign up

Export Citation Format

Share Document