ASPIDA: A client-oriented platform for assessing websites security practices adoption and reward

Author(s):  
Vasileios Vlachos ◽  
Ioannis Katsidimas ◽  
Emmanouil Kerimakis ◽  
Sotiris Nikoletseas ◽  
Stefanos Panagiotou ◽  
...  
Keyword(s):  
Author(s):  
Saipira Furstenberg ◽  
Edward Lemon ◽  
John Heathershaw

Abstract This article theorises the repressive security practices of authoritarian states in the context of transnationalism and globalisation. While emerging research on transnational repression has identified a range of extraterritorial and exceptional security practices adopted by authoritarian states, it has not fully studied the implications of such practices on space and statecraft. Using data from the Central Asia Political Exile Database project (CAPE) and interviews conducted with exiled Tajik opposition groups based in Russia and Europe, we theorise the spatial connections between the territorial and extraterritorial security practices using the concept of assemblages. We further outline how these practices escalate in a three-stage model, in which exiles go on notice, are detained and then rendered or assassinated. Such an approach sheds light on the inherent links between the normalisation of security practices and the creation of transnational space with distinct forms of geographical state power that is embedded in non-national spaces and is manifested through spatially organised actors, networks, and technologies within assemblages.


2021 ◽  
Vol 15 (1) ◽  
pp. 121-150
Author(s):  
Rocco Bellanova ◽  
Kristina Irion ◽  
Katja Lindskov Jacobsen ◽  
Francesco Ragazzi ◽  
Rune Saugmann ◽  
...  

Abstract Questions about how algorithms contribute to (in)security are under discussion across international political sociology. Building upon and adding to these debates, our collective discussion foregrounds questions about algorithmic violence. We argue that it is important to examine how algorithmic systems feed (into) specific forms of violence, and how they justify violent actions or redefine what forms of violence are deemed legitimate. Bringing together different disciplinary and conceptual vantage points, this collective discussion opens a conversation about algorithmic violence focusing both on its specific instances and on the challenges that arise in conceptualizing and studying it. Overall, the discussion converges on three areas of concern—the violence undergirding the creation and feeding of data infrastructures; the translation processes at play in the use of computer/machine vision across diverse security practices; and the institutional governing of algorithmic violence, especially its organization, limitation, and legitimation. Our two-fold aim is to show the potential of a cross-disciplinary conversation and to move toward an interactional research agenda. While our approaches diverge, they also enrich each other. Ultimately, we highlight the critical purchase of studying the role of algorithmic violence in the fabric of the international through a situated analysis of algorithmic systems as part of complex, and often messy, practices. Les questions concernant la manière dont les algorithmes affectent l’(in)sécurité deviennent de plus en plus courantes en sociologie politique internationale. Notre discussion collective s'appuie sur ces débats et les enrichit en abordant les questions portant sur la violence algorithmique. Nous soutenons qu'il est important d'analyser et de discuter de la manière dont les systèmes algorithmiques alimentent (et entretiennent) des formes spécifiques de violence, ainsi que de la façon dont ils justifient des actes violents ou redéfinissent les formes de violence jugées légitimes. Cette discussion collective réunit différents points de vue disciplinaires et conceptuels pour ouvrir un débat sur la violence algorithmique en se concentrant à la fois sur des exemples spécifiques et sur les défis à relever pour la conceptualiser et l’étudier. Cette discussion se concentre sur trois sujets de préoccupation : la violence qui sous-tend la création et l'alimentation des infrastructures de données, les processus de conversion en jeu dans l'utilisation de la vision informatique/machine à travers diverses pratiques de sécurité, et la gouvernance institutionnelle de la violence algorithmique, en particulier son organisation, sa limitation et sa légitimation. Notre double objectif est de montrer le potentiel d'une discussion interdisciplinaire et d'avancer vers un programme de recherche interactionnel. Bien que nos approches divergent, elles s'enrichissent mutuellement. Notre but est de mettre en évidence les possibilités analytiques ouvertes par l'étude de la violence algorithmique et de son role dans la fabrique des relations internationales, par le biais d'une étude des systèmes algorithmiques dans le cadre de pratiques complexes et désordonnées. Las preguntas acerca de cómo afectan los algoritmos a la (in)seguridad son cada vez más comunes en la Sociología Política Internacional. A fin de construir y sumar a estos debates, nuestro Debate Colectivo pone en primer plano las preguntas sobre la violencia algorítmica. Sostenemos que es importante abrir el debate acerca de cómo los sistemas algorítmicos alimentan (en) formas específicas de violencia, cómo justifican las acciones violentas o redefinen qué formas de violencia se consideran legítimas. A partir de la reunión de diferentes puntos de vista disciplinarios y conceptuales, este Debate Colectivo abre una conversación sobre la violencia algorítmica centrándose tanto en sus instancias específicas como en los desafíos de su conceptualización y estudio. En general, el debate converge en tres áreas de interés: la violencia que sustenta la creación y alimentación de las infraestructuras de datos, los procesos de traducción en juego en la utilización de la visión de la computadora/máquina a través de diversas prácticas de seguridad y el gobierno institucional de la violencia algorítmica, especialmente su organización, limitación y legitimación. Nuestro doble objetivo es mostrar el potencial de una conversación interdisciplinaria y avanzar hacia una agenda de investigación interactiva. Si bien nuestros abordajes divergen, se enriquecen mutuamente. Finalmente, destacamos la adquisición fundamental del estudio de las funciones de la violencia algorítmica en el tejido de lo internacional a través de un análisis situado de los sistemas algorítmicos como parte de prácticas complejas y, a menudo, desordenadas.


2013 ◽  
Vol 44 (5-6) ◽  
pp. 431-448 ◽  
Author(s):  
Aylin Güney ◽  
Nazif Mandacı

This article critically analyses Turkish security discourses connected to the meta-geography of the Broader Middle East and North Africa (BMENA) before and after the developments of the Arab Spring. A critical geopolitics approach and critical security theories in international relations provide the theoretical framework, as security discourses are considered to be a product of geopolitical imaginations and codes that, in turn, shape the making of foreign and security policies. First, the article examines the invention of BMENA as a meta-geography within Turkey’s new geopolitical imagination, as well as the new geopolitical codes underlying the new security discourses. Then, the article assesses the impact of the Arab Spring, which led to major changes in Turkey’s newly established geopolitical codes, formulated in the pre-Arab Spring period, and analyses the ruptures and continuities in Turkey’s security discourses in the light of those developments. Finally, the article concludes that the Arab Spring, especially the Syrian crisis, shifted the focus of Turkey’s foreign policy in BMENA from cooperation to conflict. This has led to a resecuritization of Turkey’s geopolitical codes, discourses and security practices in the region, revealing the limitation of Turkey’s current geopolitical imagination.


2017 ◽  
Vol 9 (2) ◽  
pp. 39-58 ◽  
Author(s):  
Valerie J.M. Watzlaf ◽  
Leming Zhou ◽  
Dilhari R. DeAlmeida ◽  
Linda M. Hartman

The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth.  Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions.Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth 


Author(s):  
A Abubakar

Young people need to be recognized and supported to play a major role as agents of peace. The society needs to partner with them to form a sine qua non (an essential condition) in promoting the global agenda for youth involvement in sustainable peace. Peacebuilding is broadly defined as an ‘action to identify and support structures which tends to strengthen and solidify peace in order to avoid a relapse into conflict.’ Therefore, peacebuilding is directed towards the eradication of the root causes of violence and is necessarily a multifaceted and multidimensional project that involves political, legal, economic, social, religious and cultural institutions and security practices, which are understood as complementary and mutually reinforcing. This paper examines how the involvement of youths in the peacebuilding process can promote sustainable peace in Maiduguri, Borno State, as a result of the Boko Haram conflict to avoid future occurrences of such conflict. The objective of the study is to explore the role Maiduguri youths can play in building sustainable and long-term peace in Maiduguri, Borno State as a critical stakeholder. The study employs the multidimensional research method also as a peer-review paper, the secondary source of data was used. The finding reveals that youth are critical stakeholders in peacebuilding and should be involved at all stages of the peace process. The study recommends that the Borno State Government should formulate policies and programs that are directed towards youth’s engagement in governance, address unemployment problem etc. since participatory democracy, youth empowerment, and social wellbeing are critical drivers of sustainable development, peace and security.


Sign in / Sign up

Export Citation Format

Share Document