The Role of Extraordinary Creativity in Organizational Response to Digital Security Threats

Author(s):  
Maurizio Cavallari
Author(s):  
Lubna Sunawar

Following the 9/11 attacks, the national security policies — notably of the Western nations — have taken a fundamental shift towards viewing vulnerable and unstable states, such as Afghanistan, as security threats. The strategic interference of the United States and its allies, for state-building in Afghanistan, not only failed in achieving its intended outcomes but also brought untold suffering and severe repercussions to the Afghan people. The major powers involved in the post-9/11 war against terror in Afghanistan — particularly the United States — had to bear heavy costs in terms of capital, materials, and lives. Being a neighbor of Afghanistan and a responsible state committed to peace in the region, Pakistan has made genuine and consistent efforts to promote a peace process that is Afghan-owned and Afghan-led, in order to bring sustainable peace and stability to Afghanistan. Using the post 9/11 U.S. mission as an example, this article analyzes how the securitization of development has affected the peace process in Afghanistan. The securitization theory of the Copenhagen School is used as a basis to explain the dynamics of the peace process (led by the United States) with the Taliban.


Author(s):  
ADRIJANA DVORŠAK

The role of international security organizations is to create a consensus on values, norms and rules relating to cyber warfare. NATO produces cyber policy and provides for education and the exchange of information also through publicistic activity. To a lesser extent it has also developed operational capabilities for joint cyber defence and cyber warfare. NATO can expect initiatives for close cooperation in cyber defence and the establishment of common cyber capabilities, which are all rational responses to unconventional threats. The benefits stemming from such cooperation differ by state. The author is nonetheless convinced that the United States will benefit the most from the said cooperation as their economy is the most dependent on information and communication technology, the most globalised and allegedly the most frequent target of cyber attacks.


2020 ◽  
Vol 3 (2) ◽  
pp. 205-209
Author(s):  
Dwi Agustina ◽  
Edy Mulyadi

The community is responsible for the implementation of the community early awareness, meanwhile the government is obliged to facilitate it. A good role of the Community Early Awareness Forum or Forum Kewaspadaan Dini Masyarakat (FKDM) followed up by the government can save the community from security threat or disaster and minimize losses by anticipating the security threats and disaster. This research uses qualitative approach. Concept operationalization in this research refers to the used strategy, the SWOT analysis. The FKDM strategies in social conflict early prevention are: 1) inserting early warning system by increasing institutional capacities which include three elements; government, private sector, community through dialogue, 2) National Unity and Politics Agency or Badan Kesatuan Bangsa dan Politik (Kesbangpol) of DKI Jakarta actively making dialogue persuasively and finding solution, 3) budgeting of conflict handling according to the Government Regulation gives opportunity to strengthen community resilience to protect the community, encourage community participation, handle social conflict, and preserve local wisdom to maintain peace.


Author(s):  
Rajan R. ◽  
Venkata Subramanian Dayanandan ◽  
Shankar P. ◽  
Ranganath Tngk

A smart city aims at developing an ecosystem wherein the citizens will have instant access to amenities required for a healthy and safe living. Since the mission of smart city is to develop and integrate many facilities, it is envisaged that there is a need for making the information available instantly for right use of such infrastructure. So, there exists a need to design and implement a world-class physical security measures which acts as a bellwether to protect people life from physical security threats. It is a myth that if placing adequate number of cameras alone would enhance physical security controls in smart cities. There is a need for designing and building comprehensive physical security controls, based on the principles of “layered defense-in-depth,” which integrates all aspects of physical security controls. This chapter will review presence of existing physical security technology controls for smart cities in line with the known security threats and propose the need for an AI-enabled physical security premise.


Author(s):  
Felix Chidozie Chidozie ◽  
Augustine Ejiroghene Oghuvbu

This chapter addresses the under-reportage of the challenges confronting the male population of the IDPs by the mainstream media in Nigeria. It argues that the challenges facing the IDPs as a result of the Boko Haram terrorism, natural and man-made disasters, as well as the Hausa-Fulani mayhem, are peculiar to all the IDPs irrespective of demographic disparities. With the aid of 256 copies of questionnaires distributed among the male population of IDPs, recording 100 percent return rate and interviews conducted at Durumi Area One IDPs Camps in Abuja, FCT, the study answered the research questions posed here. Findings show that the plights of the male population of the IDPs ranging from hunger, starvation, water, electricity, accommodation shortages, and lack of sustainable occupation, portend serious human security threats for the country. It proposes policy-relevant actions for the government and other related agencies working with the IDPs; while concluding the role of media in trumpeting the challenges of the male population of the IDPs will mitigate their plights.


2012 ◽  
Vol 37 (2) ◽  
pp. 119-155 ◽  
Author(s):  
Omar Shahabudin McDoom

How do security threats mobilize social groups against each other? The strength of such threats lies in the power of group emotions, notably the primary emotion of fear. Fear works by activating psychological processes at the group level that polarize attitudes between different groups. An analysis of survey data, radio broadcasts, and interviews from Rwanda's civil war and genocide of 1990–94 reveals four psychosocial mechanisms at work in group polarization: boundary activation, outgroup derogation, outgroup homogenization, and ingroup cohesion. Additionally, scholarly debates on the role of emotions, material opportunities, and rationality in ethnic conflicts represent a false theoretical choice. Both emotions and material opportunities matter, and rationality and emotion are not incompatible. Two simple refinements to extant theoretical and empirical approaches are needed. First, scholars ought to distinguish between attitudes and violence in ethnic conflicts; emotions matter for the polarization of attitudes, but material and structural opportunities mediate their expression as violence. Second, scholars should pay greater attention to the extensive research in social psychology that shows that both emotion and reason interact in individual judgment and decisionmaking.


2019 ◽  
Vol 8 (4) ◽  
pp. 9030-9034

The article provides a comprehensive analysis of the concepts related to the information security of critically important information systems in Russia. Today, problems exist, which are associated with numerous threats to Russian information security due to the rapidly increasing role of the information sphere. To solve these problems, an effective mechanism is needed to prevent and eliminate these threats. To develop the organizational and legal basis of the mechanism, it is necessary to define a number of concepts, such as information security, critically important information system, information infrastructure, etc. The authors explore Russian legal regulation, as well as international experience and research on this topic. The article shows the main sources of information security threats and defines general principles and approaches to ensuring information security of critically important information systems. The concept and types of critically important information systems are identified and the necessity of developing and improving their legal regulation is substantiated. A number of legal and organizational measures aimed at ensuring the information system security of Russian infrastructure are proposed.


2021 ◽  
pp. 004711782110456
Author(s):  
Janis Grzybowski

Ontological security studies (OSS) in International Relations (IR) emphasize the role of identity, anxiety, and a sense of self in world politics. Yet suggesting that states act in certain ways because of ‘who they are’ also assumes that they are in fact states. In this article, I problematize the presupposition of state subjects in the context of separatist conflicts in which claims to statehood compete and overlap. Where unrecognized de facto states are pitted against their unyielding parent states, the two threaten each other’s very state personhood, thereby presenting a more radical challenge to their existence than traditional ‘physical’ and ‘ontological’ security threats. Separatist conflicts thus reveal a widely overlooked dimension of fundamental ontological security, provided by the constitution and recognition of states as such. Moreover, because of the exclusiveness of state subjects in the modern international order, any third parties attempting to resolve such conflicts inevitably face a meta-security dilemma whereby reassuring one side by confirming its claim to statehood simultaneously renders the other side radically insecure. Thus, rather than regarding particular state subjects as merely the starting point of quests for ontological security in international relations, they should also be understood as already their result.


Sign in / Sign up

Export Citation Format

Share Document