scholarly journals POSITIONS OF STATES OF THE ASIA-PACIFIC REGION REGARDING THE ADOPTION OF RESOLUTIONS ON INTERNATIONAL INFORMATION SECURITY ISSUES WITHIN THE FRAMES OF THE UN

Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.

2020 ◽  
pp. 016555152098181
Author(s):  
Amir I Aliyev ◽  
Aytakin N Ibrahimova ◽  
Gulnaz A Rzayeva

The article is devoted to information security issues in the world and in Azerbaijan, in particular. The article compares laws and regulations of Azerbaijan and other countries in the cybersecurity policy between them. The article reveals the features of the organisational and legal regulation of the information security system as an integral part of state security. A number of aspects of ensuring information security through legal and technological means, as well as a number of features of ensuring the security of certain categories of information, are highlighted. Recommendations and conclusions from the policies of both jurisdictions are presented.


Laws ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 46
Author(s):  
Esther Salmerón-Manzano

New technologies and so-called communication and information technologies are transforming our society, the way in which we relate to each other, and the way we understand the world. By a wider extension, they are also influencing the world of law. That is why technologies will have a huge impact on society in the coming years and will bring new challenges and legal challenges to the legal sector worldwide. On the other hand, the new communications era also brings many new legal issues such as those derived from e-commerce and payment services, intellectual property, or the problems derived from the use of new technologies by young people. This will undoubtedly affect the development, evolution, and understanding of law. This Special Issue has become this window into the new challenges of law in relation to new technologies.


Agriculture ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 494
Author(s):  
Riccardo Lo Bianco ◽  
Primo Proietti ◽  
Luca Regni ◽  
Tiziano Caruso

The objective of fully mechanizing olive harvesting has been pursued since the 1970s to cope with labor shortages and increasing production costs. Only in the last twenty years, after adopting super-intensive planting systems and developing appropriate straddle machines, a solution seems to have been found. The spread of super-intensive plantings, however, raises serious environmental and social concerns, mainly because of the small number of cultivars that are currently used (basically 2), compared to over 100 cultivars today cultivated on a large scale across the world. Olive growing, indeed, insists on over 11 million hectares. Despite its being located mostly in the Mediterranean countries, the numerous olive growing districts are characterized by deep differences in climate and soil and in the frequency and nature of environmental stress. To date, the olive has coped with biotic and abiotic stress thanks to the great cultivar diversity. Pending that new technologies supporting plant breeding will provide a wider number of cultivars suitable for super-intensive systems, in the short term, new growing models must be developed. New olive orchards will need to exploit cultivars currently present in various olive-growing areas and favor increasing productions that are environmentally, socially, and economically sustainable. As in fruit growing, we should focus on “pedestrian olive orchards”, based on trees with small canopies and whose top can be easily reached by people from the ground and by machines (from the side of the top) that can carry out, in a targeted way, pesticide treatments, pruning and harvesting.


Author(s):  
Steven Feldstein

This book documents the rise of digital repression—how governments are deploying new technologies to counter dissent, maintain political control, and ensure regime survival. The emergence of varied digital technologies is bringing new dimensions to political repression. At its core, the expanding use of digital repression reflects a fairly simple motivation: states are seeking and finding new ways to control, manipulate, surveil, or disrupt real or perceived threats. This book investigates the goals, motivations, and drivers of digital repression. It presents case studies in Thailand, the Philippines, and Ethiopia, highlighting how governments pursue digital strategies based on a range of factors: ongoing levels of repression, leadership, state capacity, and technological development. But a basic political motive—how to preserve and sustain political incumbency—remains a principal explanation for their use. The international community is already seeing glimpses of what the frontiers of repression look like, such as in China, where authorities have brought together mass surveillance, online censorship, DNA collection, and artificial intelligence to enforce their rule in Xinjiang. Many of these trends are going global. This has major implications for democratic governments and civil society activists around the world. The book also presents innovative ideas and strategies for civil society and opposition movements to respond to the digital autocratic wave.


Author(s):  
I. Dezhina

The article evaluates science sectors and effectiveness of scientific research in the countries forming the BRICS group, as well as the current state of scientific and technological cooperation among the group members. The science sectors of the countries under consideration differ markedly, while facing similar problems relating to government regulations and external environments. The differences exist in total expenditures on research and development (as a share of GNP), in the scope of governmental funding (large in Russia and India, but small in China), and in the distribution of allocations among various areas and types of R&D activities. China appears to have the most well-adjusted science sector among the BRICS members. It includes not only strong universities but also high-tech companies that invest actively into research and development. The overall impact (inferred from citation indexes) of fundamental and exploratory research performed in BRICS countries remains low. BRICS's scientists prefer to collaborate with their colleagues from the world-leading countries rather than with their fellows from BRICS. Yet, in contrast to the world trend, in all BRICS countries, except Russia, a share of internationally co-authored publications is now decreasing. BRICS members have more similar interests and priorities in technological development, including infrastructural and large technological projects, than in science. Currently, bilateral cooperation in technology prevails, while the projects involving all members of the group still remain at the stage of preliminary evaluation and discussion. Russia cooperates most closely with China and India, including joint projects in such high-priority directions as new materials, photonics, biomedical, space and information technologies. For Russia, cooperation in technological development appears to be of most interest because it can lead not only to introduction of new technologies but also help to create large Russian innovative companies. Development of successful multilateral cooperation in science and technology among the BRICS members is the key for this group, originally formed for geopolitical reasons, to evolve into an effective economic union.


Author(s):  
E.B. LENCHUK ◽  

The article deals with the modern processes of changing the technological basis of the world economy on the basis of large-scale transition to the use of technologies of the fourth industrial revolution, shaping new markets and opens up prospects for sustainable economic growth. It is in the scientific and technological sphere that the competition between countries is shifting. Russia remains nearly invisible player in this field. The author tried to consider the main reasons for such a lag and identify a set of measures of state scientific and technological policy that can give the necessary impetus to the scientific and technological development of Russia.


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


2020 ◽  
Vol 20 (2) ◽  
pp. 382-394
Author(s):  
Tatyana Ivanovna Ponka ◽  
Mirzet Safetovich Ramich ◽  
Yuyao Wu

The subject of the study is the new course of the PRC information policy, which was launched by the Fifth generation of the PRC leaders after the 18th Congress of the Chinese Communist Party in 2012. As a result, after the 18th Congress of the CPC was started the implementation of the Strong cyberpower strategy, which implies not only ensuring cyber security in the country, but also the usage of network resources to develop the national economy. Chinas new information policy was caused by the sharply increased role of information and communication technologies in international processes and the shift in the focus of international relations to the Asia-Pacific region. The PRCs information policy is based on the most advanced technologies in the IT sphere and the cooperation with private companies on regulating external and internal information security. The relevance of the research topic is due to the increasing role of ICT in international processes. In this context, the most important are the positions of the leading countries of the world to regulate this area, as well as the mechanisms and tools used by them. The Peoples Republic of China is one of the leaders in the field of scientific and technical developments and actively uses its achievements to accomplish tasks in the field of domestic and foreign policy. In this regard, the purpose of the study is to analyze and compare the development strategies of the PRC information policy and the resources that are necessary for their implementation. The unique network landscape, which was formed under the influence of government policy on control over published content and the sharing of digital services market among the three largest information corporations (Baidu, Tencent and Alibaba), has become an essential part of the countrys information security system and requires detailed study. The purpose of the article is to identify the evolution of Chinas information policy development strategy and resources for its implementation. This article also discusses the threats to the information security of the Peoples Republic of China and analyzes the approaches to ensuring it. The results of the study are the conclusions that show the role and place of information policy in the PRC foreign policy, the structure of the information security system and strategic approaches to the regulation of international relations in cyberspace.


Author(s):  
Jakub Jerzy Czarkowski ◽  
Sylwia Strzelec

There are many dangerous situations for adult development related to the progress of new information technologies. The article presents a new approach to the issue of disability in the context of the changing ITC technologies and the phenomenon of aging populations. Polish society, like many European societies, is subject to the process of aging. People in late adulthood find it more difficult to learn to use new technologies more easily. This means that an increasing number of people may have problems in full-fledged functioning in society. They will become disabled in the light of the WHO definition. Appropriate education is the way to counteract this phenomenon.


Author(s):  
T. Venkat Narayana Rao ◽  
Vemula Shravan

In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a result exploits became rampant causing the usage of information security fields. Eventually, the need for vulnerability scanning for a particular network or a particular site has increased and the result was pre-emptive existence of penetration testers whose sole purpose is to execute an exploit using a payload for scanning a vulnerability far before others got the opportunity. Metasploit is a computer security tool that works like a penetration tester. The Metasploit Framework was developed with the intentions of making lives of security experts easier.


Sign in / Sign up

Export Citation Format

Share Document