The Analysis and Application of Decentralized Cyber Layer and Distributed Security Control for Interconnected Conurbation Grids under Catastrophic Cascading Failures

Author(s):  
Yuqi HAN ◽  
Jieying LIU ◽  
Yunkai LEI ◽  
Liyang LIU ◽  
Shengyong YE
2016 ◽  
Vol 46 (183) ◽  
pp. 289-305
Author(s):  
Angela Schweizer

The following article is based on my fieldwork in Morocco and represents anthropological data collected amongst undocumented sub-Saharan migrants in Morocco. They want to enter Europe in search for a better life for themselves and to provide financial support for their families. Due to heavy border security control and repression, they find themselves trapped at the gates of Europe, where they are trying to survive by engaging in various economic activities in the informal sector. The article begins with an overview of the European migration politics in Africa and the geopolitical and historical context of Morocco, in light of the externalization of European border control. I will then analyze the various economic sectors, in which sub-Saharan migrations are active, as well as smuggling networks, informal camps and remittances, on which they largely depend due to the exclusion from the national job market.


2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


Author(s):  
Myriam Dunn Cavelty

Due to heightened threat perceptions, states are currently expanding their coercive power in cyberspace. They attempt to reduce the risk of escalation in (cybered-)conflict through traditional norms building. At the same time, their strategic actions remain the biggest threat to stability. Cyber-exploitations are a major part of the problem, hindering the removal of known insecurities, thus reducing the effectiveness of any future order. At the same time, the forceful role that states aspire to play in cyber-security has led to questions of legitimacy. The security arrangements that emerged in the 1990s, focused on protection and risk management, had a high degree of legitimacy because they built on a pragmatic solution of distributed security provision. Unless a future order in cyberspace takes into account the interests of companies and consumers who shape this domain in peacetime, it will be met with considerable resistance, with high costs for all sides.


Sign in / Sign up

Export Citation Format

Share Document