How Educational Ideologies Are Shaping Global Society: Intergovernmental Organizations, NGOs, and the Decline of the Nation-State. Joel H. Spring, Mahwah, NJ: Lawrence Erlbaum Associates, Inc., 2004, 215 pages, $27.50 (paperback)

2007 ◽  
Vol 6 (1) ◽  
pp. 96-97
Author(s):  
Yves Laberge
Author(s):  
Tetsuo Maruyama

Today, globalization is still far from creating a picture in our minds about an integrated global society with certain common values and ethics. However, the exchange and flow of people, goods, money, information and images are emerging on a transnational level and, in this global sphere, some values of dominant-particularity with pseudo-universality have prevailed. Most of these values originated in Western societies. This paper presents a tentative outline of alternative common values in the new global sphere, with reference to Japanese religions, especially Buddhist ideas, making comparison with modern rationalism that originated in the West. In the globalization process of human society, those values and norms which have been formed at the nation-state level become relativized and lead to the fluidity and instability of cultural identities. Furthermore, it also becomes clear that such dominant values based on modern rationalism have revealed their limitations. Hence, we need to search for alternative values common to all human beings. In this line of thought, it is useful to consider the possibilities or potentialities of Buddhist ideas as common values.


2000 ◽  
Vol 48 (4) ◽  
pp. 522-543 ◽  
Author(s):  
James Fulcher
Keyword(s):  

2022 ◽  
pp. 500-513
Author(s):  
Regner Sabillon

This chapter studies the phases to unify our national cybersecurity strategy model (NCSSM) in any nation cyber strategy that is either under development or improvement stages. This methodology consists of developing international cybersecurity strategies, alliances, and cooperation with different stakeholders at all possible levels. The research evaluated the best practices of 10 leading countries and five intergovernmental organizations in terms of developing effective cybersecurity strategies and policies. The authors also assessed a series of cybersecurity best practices that can be aligned with cyber governance and cyber law when countries wish to develop or enhance national cyber strategies. Furthermore, they propose guidelines to audit the national cyber strategies by utilizing their cybersecurity audit model (CSAM). CSAM could be considered for conducting cybersecurity audits in any nation state in pursuance of reviewing and measuring the cybersecurity assurance, maturity, and cyber readiness and to detect the needs to increase cyber awareness to defend and protect critical cyber assets.


1978 ◽  
Vol 4 (2) ◽  
pp. 263-275 ◽  
Author(s):  
Gernot Köhler

The concept of apartheid has significance far beyond the situation in South Africa which coined the term. Indeed, the concept can be generalized to apply to the present world situation. It provides both a better understanding of the present human condition and more effective guidelines for action to change it. The processes of interdependence, interpenetration and intercommunication in the present era have made the entire humanity into one global society. The present nation-state system, which obscures the appearance of this society, fails miserably in responding to the concerns and needs of the global community. The concept of global apartheid provides a more realistic and comprehensive view of the world and suggests appropriate ways of so acting as to make a beginning toward realizing a just, participatory, peaceful and humane global society.


This chapter studies the phases to unify our national cybersecurity strategy model (NCSSM) in any nation cyber strategy that is either under development or improvement stages. This methodology consists of developing international cybersecurity strategies, alliances, and cooperation with different stakeholders at all possible levels. The research evaluated the best practices of 10 leading countries and five intergovernmental organizations in terms of developing effective cybersecurity strategies and policies. The authors also assessed a series of cybersecurity best practices that can be aligned with cyber governance and cyber law when countries wish to develop or enhance national cyber strategies. Furthermore, they propose guidelines to audit the national cyber strategies by utilizing their cybersecurity audit model (CSAM). CSAM could be considered for conducting cybersecurity audits in any nation state in pursuance of reviewing and measuring the cybersecurity assurance, maturity, and cyber readiness and to detect the needs to increase cyber awareness to defend and protect critical cyber assets.


Sign in / Sign up

Export Citation Format

Share Document