Human and state security: from need to concept

Author(s):  
Maryna V. Andryiashka

The phenomenon of security since the time of Plato, who identified it as one of the human needs, belongs to that rare group of phenomena that will remain in demand forever, regardless of the change of ideologies and eras. Only technologies and mechanisms for ensuring security are changing, which is facilitated by the tech-nological singularity, the accelerated progress of information and communication technologies. Nevertheless, the question remains open of what comes first: the security of human or state. Even in the Modern Era, after the terrible world wars, terrorist attacks, man-made disasters, the approaches to answering this question have changed many times. In connection with the above, the purpose of this work is to trace the development of philosophical thought on security issues, as well as to de-termine approaches to the modern understanding of this phenomenon, prob-lems of meanings and values. Through the use of general logical, empirical and theoretical methods, an idea of new trends in the field of security is formed, which testify to the formation of the concept of human security.

Author(s):  
Shadi A. Aljawarneh

The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and credit facilities. One of the security concerns is a lack of data validation. Data that is not validated or not properly validated is the main issue for serious security vulnerabilities affecting online banking applications. In this chapter, the influences of security issues on world banks will be discussed. A number of data validation methods will be also reviewed to date to provide a systematic summary to banking environment. Based on the advantages and disadvantages of each method, the IT developer will decide which is best suited to develop the systematic online banking application. From this analysis, a global view of the current and future tendencies of data validation will be obtained and therefore provision of possible recommendations for solving the security and privacy issues for the online banking services.


Author(s):  
Shadi A. Aljawarneh

The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and credit facilities. One of the security concerns is a lack of data validation. Data that is not validated or not properly validated is the main issue for serious security vulnerabilities affecting online banking applications. In this chapter, the influences of security issues on world banks will be discussed. A number of data validation methods will be also reviewed to date to provide a systematic summary to banking environment. Based on the advantages and disadvantages of each method, the IT developer will decide which is best suited to develop the systematic online banking application. From this analysis, a global view of the current and future tendencies of data validation will be obtained and therefore provision of possible recommendations for solving the security and privacy issues for the online banking services.


Author(s):  
Ana Ferreira ◽  
Ricardo Cruz-Correia ◽  
Luís Antunes ◽  
David Chadwick

This chapter reports the authors’ experiences regarding security of the electronic medical record (EMR). Although the EMR objectives are to support shared care and healthcare professionals’ workflow, there are some barriers that prevent its successful use. These barriers comprise not only costs, regarding resources and time, but also patient / health professional relations, ICT (information and communication technologies) education as well as security issues. It is very difficult to evaluate EMR systems; however some studies already made show problems regarding usability and proper healthcare workflow modeling. Legislation to guide the protection of health information systems is also very difficult to implement in practice. This chapter shows that access control, as a part of an EMR, can be a key to minimize some of its barriers, if the means to design, develop and evaluate access control are closer to users’ needs and workflow complexity.


2014 ◽  
Vol 989-994 ◽  
pp. 4432-4436
Author(s):  
Gang Zeng

Cloud computing is getting more and more attention from the information and communication technologies industry recently, security issues is becoming more important. Forensics technology on cloud computing is becoming a researched focus. In this paper, we discuss the impact and challenges to digital forensics, finally we present the improved measure of log and forensics system based on logs on SaaS.


Author(s):  
Hakikur Rahman

Innovation includes almost all spheres of human life and society with the upsurge of technology. Ranging from basic human needs, societal requirements, capacity development, and knowledge management to advanced researches, all are dependent on technologies and invariably driven by innovation. Learning is an essential element of human development. From the very beginning of capacity development, learning has become an important aspect in terms of individual or collective knowledge acquisition. This chapter broadly focuses on human development through utilization of innovative approaches of Information and Communication Technologies (ICTs), especially the Internet. The specific research focus is to find out the trend of the Internet usage with respect to gender, age, and region, and deduct a relationship of the growth of the Internet user in adopting strategies like open innovation on introducing tools like interactive learning for the overall human development.


Author(s):  
Alexandre Cerveira ◽  
Leonilde Reis ◽  
José Gaivéo

Nowadays, globalization and information and communication technologies are main issues on organizations and societies, changing the way how people and organizations interact. These issues brought new and more challenges to people, organizations and societies, forcing them to change their perceptions of reality and consequently adopting new business solutions. In this context, people, capabilities and knowhow could make the difference between failure and success, particularly when organizations are facing new and emergent markets or changing their business process. It is important to protect business information, an asset whose relevance is increasing, in order to guarantee his confidentiality, integrity and availability. This issue must be coordinated with information systems and information and communication technologies usage to support information activities through the organization. Therefore, to succeed, the focus must be put on people and on their roles in the organizations, in order to obtain their commitment with information security, according organizational needs. In this sense, we pretend to provide the main roles identification on information security issues that people should take in account, and the options they could take to give a huge contribution to organizational performance.


Author(s):  
O. Saber ◽  
T. Mazri

Abstract. A smart city is an urban area based on a variety of services that uses information and communication technologies (ICTs) to improve operational efficiency and citizen's quality of life. It also leans towards meeting the economic, social, environmental, and cultural needs of dwellers. Technologies can add many benefits to smart city to facilitate communication and efficiently manage assets, resources, and services. However, technologies bring new security issues that need to be addressed to ensure data confidentiality, integrity, and availability. This paper provides an overview of the smart city concept by highlighting its main applications and services, presenting some susceptible attacks that can touch the security of applications, and some good practices to ensure the smart city security.


2020 ◽  
Vol 64 (12) ◽  
pp. 25-32
Author(s):  
N. Romashkina

Information and communication technologies (ICTs) have transformed society and the economy and expanded opportunities for international cooperation. However, the unique capabilities of ICTs are used not only for the common good of humanity. Today, we are talking about an accelerated increase in threats in the information and cyberspace. Many states consider them as additional, but often these are the main spaces for military-political confrontation. Thus, the issues of inadmissibility of application of ICTs with military and political purposes for realization of hostile actions and acts of aggression are critically urgent acute. For this reason, the task of ensuring international information security has become part of the agenda for one of the six main committees of the UN General Assembly (UNGA) – the First Committee, where states investigate threats to peace, seek for ways to promote global security and disarmament. Discussion on international information security issues within this Committee plays a crucial role and requires a deep analysis by the scientific and expert community. The article presents the results of this analysis, starting from 1998, when the problem of international information security was first discussed at the UN on the initiative of Russia. The study identifies and investigates the possibilities and prospects of implementing the main goal in the process of ensuring international information security: namely, the creation of an international legal regime to ban the development, production and use of information and cyber weapons. In addition, this paper includes the results of a study on the UN work and prospects for its success in maintaining international information security in a new format: within the framework of the Open Ended Working Group (OEWG) organized in 2019 at the suggestion of Russia, and the UN Group of Governmental Experts (GGE) proposed by the United States. The output of both groups is going to have a significant impact on information security trends and policies on a global scale. Therefore, a timely scientific analysis of the issue, current challenges and threats, as well as the forecast of trends and prospects for enhancing international information security, presented in the article, are currently among the most relevant tasks.


Sign in / Sign up

Export Citation Format

Share Document