scholarly journals Rethinking the taproot of the security challenges in Africa: bringing back the colonial legacy

2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Ahmed Badawi Mustapha ◽  
◽  
Haruna Abdallah Imam ◽  

This paper offers a counter-narrative to the constricted Western narratives that often discount how colonial domination, exploitation, and external interference have shaped Africa’s past and present, especially in the area of security. It focuses on the numerous security challenges in Africa and its complex historical nexus to the colonial legacy. The piece draws from the variegated dominant arguments and counterarguments on African (in)security issues, colonial rule, and the theoretical security models and concepts. The paper demonstrates, through an exploration of the formation of postcolonial states, that colonialism cannot be excused as some distant root cause of the security problem on the continent, but has deliberately crafted some specific subjects, societies and states that serve to perpetuate the challenges in the security complex of Africa. Keywords: security, colonial legacy, nation-state, Africa

2020 ◽  
Vol 13 (3) ◽  
pp. 394-417
Author(s):  
Alexandra Khudaykulova ◽  

Dominant security theories, being mostly Western by their origin, are concentrated on the Western experience and security models, with minimal attempts to analyze the postcolonial security landscape of the global “South” which heavily affects the security agenda. The predominant part of modern conflicts (with some exceptions) take place precisely in the developing countries of the global South Western and non-Western approaches to security are distinguished by an expanded (comprehensive) understanding, but in both cases the emphasis is different. Various readings of security create a conflict of perception and, according to many non-Western experts, reflect the Western strategy to initiate a new colonization. At the same time, neither Western understanding nor alternative non-Western critical security theories can claim to be universal. The article describes the dynamics of theoretical approaches to the conceptualization of security, mainly in the context of the dominant Western school of International Relations, demonstrates and explains the marginality of non-Western security issues, and provides an overview of key security issues and threats to the developing world. In addition, relatively new Western concepts of security (humanitarian intervention, human security, responsibility to protect) are being analyzed, which cause strong opposition from the entire developing world and are perceived by non-Western societies as a direct threat. The weakness of the “postcolonial” states, their apparent inability to cope with internal development problems and disorders, and to ensure the safety of the population within their borders, serve as a reason for becoming an object of political influence and interference. At the same time, the West and the non-West are making efforts to speak the same political language of security because of the indivisibility of the current threats. However, the Western practice of world regulation is rejected by the developing world, especially by rising powers. Considering the weight and significance of “the rest of humanity” in such conditions, it is difficult to hope for a rational dialogue on global issues if the discourse, interests, and ambitions of the two poles differ considerably.


2013 ◽  
Vol 4 (1) ◽  
pp. 57-62
Author(s):  
YAYA ITAI ◽  
AWODELE OLUDELE PhD ◽  
NICOLAE GOGA PhD

Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.      


2013 ◽  
Vol 846-847 ◽  
pp. 1628-1631
Author(s):  
Song Jie Gong ◽  
Lin Di Jin

With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Author(s):  
Edward Shizha

This article is a theoretical discussion on the social construction of knowledge in colonial and postcolonial Zimbabwe. It examines effects of hegemonic knowledge constructions and how they may be de-legitimated through incorporating indigenous knowledge in postcolonial school curricular. The article questions the importance attached to Euro-centric school knowledge and the devaluation of indigenous knowledge in postcolonial states. It further argues that indigenous knowledge as informal knowledge plays a major role in society and should be formalized in educational institutions to constitute a transformative and inclusive educational system. The article proposes hybridization of knowledge to give voice to the formerly marginalized in school curricular in Zimbabwe. It also proposes that knowledge as a historical, cultural, social, spiritual and ideological creation should be a product of collaborated efforts from all possible stakeholders to foster social development and self-confidence in individuals.


2020 ◽  
Vol 14 (2) ◽  
pp. 155-177
Author(s):  
João Paulo Madeira

This article is an exploratory, descriptive study, with a qualitative and interdisciplinary approach. It integrates concepts and perspectives of contemporary history, international relations, and security studies. Its main aim is to analyse security issues in Africa, taking as a reference the Cape Verde archipelago, which is part of the group of Small Island Developing States. This matter suggests a wider multidimensional approach that prioritizes the intersection of data obtained from a critical analysis in order to deepen regional cooperation and integration mechanisms. This can provide the Cape Verdean state with strategic options to prevent and mitigate potential security threats.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Massimiliano Rak ◽  
Massimo Ficco ◽  
Jesus Luna ◽  
Hamza Ghani ◽  
Neeraj Suri ◽  
...  

The cloud paradigm, based on the idea of delegating to the network any kind of computational resources, is showing a considerable success. The estimated trend is that the number of different cloud-based solutions, approaches, and service providers (CSP) will continue growing. Despite the big number of different cloud solutions that currently exist, most of them are “walled gardens” unable to interoperate. On the other side, a large effort is taking place in the cloud community to develop and identify open solutions and standards. In such a context the concept of cloud federation, an architecture that combines the functionalities of different CSP, is a hot topic. This chapter presents an overview of the cloud federation topic, with special focus on its most important security challenges. Furthermore, it proposes a taxonomy of possible approaches to federation. Then it proposes a comparison of security problems in cloud and grid environment, and a detailed analysis of two relevant security problems, identity management and Cyber Attacks analysis, trying to outline how they can be applied in a federated context.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Sign in / Sign up

Export Citation Format

Share Document