On the Way of Protecting MANETs Against Security Threats: A Proactive Approach

Author(s):  
Roberto Magán-Carrión ◽  
Bernabe Dorronsoro
2018 ◽  
Vol 4 (2) ◽  
pp. 10-22 ◽  
Author(s):  
Viljar Veebel ◽  
Illimar Ploom

AbstractThis study aimed to offer an in-depth insight into intellectual dilemmas associated with a comprehensive approach to national defence using Estonia as an example to demonstrate that comprehensive approach in itself may not be enough to feel safe and secure. The authors focused on two specific theoretical questions. First, how security threats are determined in Estonia, including the impact of such a phenomenon as macro-securitization? Second, how various levels of comprehensive approach relate to each other in the way that a shared security culture will be created? In this way, the aim of this article was not only to shake the foundations of national defence in Estonia but also to contribute to the improvement of the current model to ensure that it actually works in practice.


European View ◽  
2010 ◽  
Vol 9 (1) ◽  
pp. 65-69 ◽  
Author(s):  
Gerhard Sabathil

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EU's security. The new institutional framework for the EU's external action will allow it to make further progress in developing a comprehensive security policy, integrating both internal and external dimensions of security and mobilising the policies and instruments required to effectively respond to security threats. New initiatives could pave the way for a more cooperative management of ‘global home affairs’.


Author(s):  
Robin Singh Bhadoria ◽  
Vaibhav Agasti

The invention of blockchain technology has paved the way for the decentralization of existing systems. Blockchains have consistently delivered prominent applications, particularly in the finance sector. The most popular application of blockchain is cryptocurrency. Blockchain technology however has a variety of applications beyond cryptocurrencies. This article discusses the basics of blockchain technology along with some of its potential applications. With the rising use of this technology, the security of these systems is a major concern. The security threats and risks to blockchain systems are also reviewed along with the tools and methodologies to prevent and handle it in more sophisticated manner.


Author(s):  
Naheeda Praveen ◽  
Shweta Srivastava

According to Internet World Stats' statistics (2012), more than two billion people are linked to the Internet and this number shows that 30 per cent of the world population use the Internet. As a result, this can be used as an efficient marketing platform. The convenience of online shopping renders it to be an emerging trend among consumers. Online shopping involves sharing of personal and financial information from the buyer. This makes the e-tailer to stand in a fiduciary position against the buyer and he is required to act for the sole benefit of the buyer. He has to duly address the security issues involved in the online shopping transactions and exhibit highest order of diligence and care. This paper aims at identifying the potential security threats involved in the online shopping transactions and the remedial measures adopted by the e-commerce companies. The paper also exemplifies from Indian e-commerce as demonetization, along with rapid digitalization, has not paved the way for cashless transactions, but also, for the e-commerce crimes.


Author(s):  
Robin Singh Bhadoria ◽  
Vaibhav Agasti

The invention of blockchain technology has paved the way for the decentralization of existing systems. Blockchains have consistently delivered prominent applications, particularly in the finance sector. The most popular application of blockchain is cryptocurrency. Blockchain technology however has a variety of applications beyond cryptocurrencies. This article discusses the basics of blockchain technology along with some of its potential applications. With the rising use of this technology, the security of these systems is a major concern. The security threats and risks to blockchain systems are also reviewed along with the tools and methodologies to prevent and handle it in more sophisticated manner.


Author(s):  
Ian Talbot ◽  
Tahir Kamran

The chapter discusses the ways in which colonial rule transformed the circumstances of pilgrimage for Lahore’s residents both as a result of improvements in communication and the perceived health and security threats from a British perspective. There is examination of pilgrimage within the Punjab, pilgrimage to the Holy Places of Islam and the increased pilgrimage to the leading Sufi Shrine within the city of Hazrat Data Ganj Bakhsh. The chapter makes use of Hajj travelogues of Lahori residents such as Maulvi Feroze ud-Din who travelled to Mecca and Medina. It also uncovers the role of Thomas Cook and the Pilgrimage to Mecca during 1886-93 and how the Company’s withdrawal from the Indian pilgrim traffic opened the way for rival specialist shipping companies.


EDU-KATA ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 19-26
Author(s):  
Sumadi Sumadi

This study aims to describe (1) the form of conflict dynamics experienced by the figures and (2) the factors causing the conflict in Kidung Rindu novel in Tapal BatasAguk Irawan MN work. This research is a qualitative descriptive research using approach of Psychology Sastra.Data obtained by reading and record technique andanalyzed by qualitative descriptive analysis technique.The results of this study show: (1) There are two forms of conflict dynamics: internal and external conflicts, the five dominant ones include, anxiety over what has already happened, disagreements, fear of security threats, feelings of hurt, disappointment due to lack of attention, (2) Conflicting factors consisting of: trapped in complicated situations, discomfort with existing conditions, Differences in principles and mindset, reality is not in line with expectations, and the presence of new views. (3) The way to solve conflicts of characters includes, giving understanding, self-control, resignation to the circumstances, the search for truth, self-awareness,determination to makechanges, submitting to God.


Author(s):  
Sergio Caballero

Over the last few decades we have witnessed an emerging interest in security topics and mechanisms to analyse these. In the context of globalization, new threats have appeared (not only interstate, but mainly, intra- and trans-state), as well as theoretical approaches (such as Critical Security Studies, CSS) to deal with them. Regarding the South American region it is useful to consider the constitution of the Unasur as a forum to coordinate policies with a very relevant geostrategic and security influence. In this paper, I deal with the logics that motivated the birth of the UNASUR project, in order to examine the way this regional project acts against different types of security threats and regional crises until 2016-17, when Venezuelan crises escalated. Furthermore, empirical evidences are tested with the common characteristics proposed by Peoples and Vaughan-Williams for the CSS. Some conclusions are drawn as new aspects have been incorporated to the way UNASUR addressed regional conflicts (security as a derivate concept and a broader security agenda), while an important element remained the same: a state-centric perspective.


2018 ◽  
Vol 41 ◽  
Author(s):  
Maria Babińska ◽  
Michal Bilewicz

AbstractThe problem of extended fusion and identification can be approached from a diachronic perspective. Based on our own research, as well as findings from the fields of social, political, and clinical psychology, we argue that the way contemporary emotional events shape local fusion is similar to the way in which historical experiences shape extended fusion. We propose a reciprocal process in which historical events shape contemporary identities, whereas contemporary identities shape interpretations of past traumas.


Sign in / Sign up

Export Citation Format

Share Document