How to Win the Digital Security Challenge in Terms of Governance?

2020 ◽  
pp. 131-141
Author(s):  
Walter Amedzro St-Hilaire
Keyword(s):  
Horticulturae ◽  
2021 ◽  
Vol 7 (7) ◽  
pp. 177
Author(s):  
Aurelia Scarano ◽  
Teodoro Semeraro ◽  
Marcello Chieppa ◽  
Angelo Santino

Neglected and underutilized species (NUS) are cultivated, semi-domesticated, or wild plant species, not included in the group of the major staple crops, since, in most cases, they do not meet the global market requirements. As they often represent resilient species and valuable sources of vitamins, micronutrients, and other phytochemicals, a wider use of NUS would enhance sustainability of agro-systems and a choice of nutritious foods with a strategic role for addressing the nutritional security challenge across Europe. In this review, we focused on some examples of NUS from the Apulia Region (Southern Italy), either cultivated or spontaneously growing species, showing interesting adaptative, nutritional, and economical potential that can be exploited and properly enhanced in future programs.


2021 ◽  
Vol 70 (4/2020) ◽  
pp. 123-149
Author(s):  
Marina Kostic

Treaty between the United States of America and the Russian Federation on measures for further reduction and limitation of strategic offensive arms (“New START”) is the last pillar of the arms control regime on which the end of the Cold War and the new world order rested. Its expiration on 5 February 2021 is a top security challenge and indicates a possible new strategic arms race. However, can the United States and Russia still preserve the existing strategic arms control by extending the Treaty for another five years? What are the prospects, the opportunities and obstacles for this extension? What are the most pressing issues USA and Russia face with in order to preserve strategic arms control and are they willing to do so? In order to answer to these research questions author analyses several key issues that are of paramount importance for extension of the New START: nuclear modernization processes, invention of new weapons and emergence of new warfare domains; transparency and verification and broader confidence building measures; missile defence and prompt global strike; tactical nuclear weapons in Europe and Asia; general US-Russia relations which include question of democratic capacity; and broader influence of this Treaty on nuclear non-proliferation regime. By using content and discourse analysis author concludes that, although it is obvious that the extension of the New START would be primarily in favour of Russia and that the USA has not much to gain, the character of strategic stability in the Third Nuclear Age gives reasons to believe that the New START will be extended for another five years.


2021 ◽  
Vol 21 (3) ◽  
pp. 110-109
Author(s):  
Alexander Kokeev ◽  
◽  
Maria Khorolskaya ◽  

The COVID-19 epidemic has become a major security challenge for Germany. The country was faced with the need to protect its own citizens, transform the health care system and support the economy. On the eve of the elections to the Bundestag, German elite concern how COVID-19 and restrictive measures will affect the electoral preferences of the population. At the same time, the pandemic has become a test for European solidarity. The first isolationist reaction of the EU member states gave way to attempts to find a solution at the supranational level. In a twopart article, the team of authors made an attempt to analyze how the German government solves the problems facing the country at the national and European levels, as well as to identify how citizens’ moods change under the influence of the pandemic, what predictions can be made about the results of the upcoming elections to the Bundestag. The first part is devoted to German anti-virus policy, as well as a study of economic damage and measures to support the economy. The second will analyze the FRG’s policy at the European level, as well as the impact of the pandemic on the mood in society and the political preferences of Germans.


2014 ◽  
Vol 19 (4) ◽  
pp. 27-31
Author(s):  
Muhammad Dahiru Shuni ◽  
◽  
Attahir Shehu Mainiyo
Keyword(s):  

Author(s):  
Gayatri Sahu ◽  
Pragyan Paramita Rout ◽  
Suchismita Mohapatra ◽  
Sai Parasar Das ◽  
Poonam Preeti Pradhan

World population is increasing day by day and at the same time agriculture is threatened due to natural resource degradation and climate change. A growing global population and changing diets are driving up the demand for food. The food security challenge will only become more difficult, as the world will need to produce about 70 percent more food by 2050 to feed an estimated 9 billion people. Production stability, agricultural productivity, income and food security is negatively affected by changing climate. Therefore, agriculture must change according to present situation for meeting the need of food security and also withstanding under changing climatic situation. Agriculture is a prominent source as well as a sink of greenhouse gases (GHGs). So, there is a need to modify agricultural practices in a sustainable way to overcome these problems. Developing climate smart agriculture is thus crucial to achieving future food security and climate change goals. It helps the agricultural system to resist damage and recover quickly by adaptation and mitigation strategies. Sustainable Intensification is an essential means of adapting to climate change, also resulting in lower emissions per unit of output. With its emphasis on improving risk management, information flows and local institutions to support adaptive capacity, CSA provides the foundations for incentivizing and enabling intensification. Since climate smart agriculture is defined along three pillars (productivity increases, building resilience and adapting, and GHG emission reduction), key concepts such as productivity, resilience, vulnerability and carbon sequestration provide indicators for future empirical measurements of the climate smart agriculture concept.


2018 ◽  
Vol 12 (3) ◽  
pp. 43
Author(s):  
Katarzyna Marzęda-Młynarska

<p>Celem artykułu jest analiza kryzysu migracyjnego w UE z 2015 roku z perspektywy niestandardowych problemów bezpieczeństwa. Podstawę rozważań stanowi teza, zgodnie z którą fala imigracji do UE, ze względu na dynamikę i skalę, stanowiła nie tylko wyzwanie humanitarne czy problem społeczny ale również zagrożenie dla bezpieczeństwa. Zgodnie bowiem z koncepcją niestandardowych problemów bezpieczeństwa, zjawiska takie jak nielegalna migracja, choroby zakaźne czy braki żywności, które do niedawna jedynie pośrednio wpływały na jego poziom, stanowią obecnie bezpośrednie zagrożenie dla przetrwania i rozwoju państw.</p>


10.28945/3557 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-016
Author(s):  
Grandon Gill ◽  
Joni Jones

Jeffrey Stiles pondered these seemingly straightforward questions. As IT Director of Jagged Peak, Inc., a developer of e-commerce solutions located in the Tampa Bay region of Florida, it would be his responsibility to oversee the implementation of security measures that went beyond the existing user name and password currently required for each user. Recent events suggested that a move towards increased security might be inevitable. In just the past year, highly publicized security failures at the U.S. Department of Defense, major healthcare providers and large companies, such as Sony and JP Morgan Chase, had made executives acutely aware of the adverse consequences of IT system vulnerabilities. In fact, a study of business risk managers conducted in 2014 found that 69% of all businesses had experienced some level of hacking in the previous year. The nature of Jagged Peak’s business made the security of its systems a particular concern. The company, which had grown rapidly over the years, reporting over $61 million in revenue in 2014, provided its customers with software that supported web-based ordering, fulfillment and logistics activities, built around a philosophy of “buy anywhere, fulfill anywhere, return anywhere”. To support these activities, the company’s Edge platform needed to handle a variety of payment types, including gift cards (a recent target of hackers), as well as sensitive personal identifying information (PII). Compounding the security challenge: each customer ran its own instance of the Edge platform, and managed its own users. When only a single customer was being considered, the addition of further layers of security to authenticate uses was an eminently solvable problem. A variety of alternative approaches existed, including the use of various biometrics, key fobs that provided codes the user could enter, personalized security questions, and many others. The problem was that where multiple customers were involved, it was much more difficult to form a consensus. One customer might object to biometrics because it users lacked the necessary hardware. Another might object to security keys as being too costly, easily stolen or lost. Personalized questions might be considered too failure-prone by some customers. Furthermore, it was not clear that adding additional layers of authentication would necessarily be the most cost-effective way to reduce vulnerability. Other approaches, such as user training might provide greater value. Even if Stiles decided to proceed with additional authentication, questions remained. Mandatory or a free/added-cost option? Developed in house or by a third party? Used for internal systems only, customer platforms only, or both? Implementation could not begin until these broad questions were answered.


Sign in / Sign up

Export Citation Format

Share Document