BULGARIA’S SECURITY AFTER 30 YEARS

2020 ◽  
Vol 18 (1/2020) ◽  
pp. 87-108
Author(s):  
Spasimir Domaradzki

This paper provides an overview of the Bulgarian security concerns over the last thirty years. Without claiming to be complete and all-embracing, the paper grasps the notion of security from both internal and external perspectives. While deliberating on the main security challenges in the context of the formal membership in the political and economic institutions of the Western world, the paper argues that the most tangible security threats for Bulgaria are internal and are related to the problems of organized crime and state capture.

2018 ◽  
Vol 17 (4) ◽  
pp. 420-440
Author(s):  
Anita Heber

Sex trafficking has become established as one of the most significant (crime) problems in the Western world. This article provides a greater understanding of how the work of certain actors, that is claims-makers, established sex trafficking as a prominent problem on the political and media agendas in Sweden during the 2000s. It can help us understand how certain crimes can achieve the position of social problems. The study analyses political texts and debates, newspaper articles and reports published by the Swedish police. The sex-trafficking discourses that were particularly dominant in the material were: ‘The ideal sex slave Lilya’ (referring to the film Lilya 4-ever), ‘The foreign threat from the East’ and ‘Hidden but well-established organized crime’. By defining sex trafficking as an important problem, with the aid of these three discourses, a large number of claims-makers were given the opportunity to emphasize threatening and racialized discourses about ‘sex slaves’, immigration and organized crime. These discourses on sex trafficking create moral borders between innocence and guilt, between belonging and unbelonging, and between purity and danger.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


2020 ◽  
Vol 62 (3) ◽  
pp. 124-142
Author(s):  
Svetlana Ristović

This paper presents the EU Western Balkan Strategy and focuses on solving security problems common to the region and the Republic of Serbia. The analysis of this strategic document and strategic orientation of Serbia in relation to main security issues shows their complementarity. First of all, these documents share essentially same views on security issues, for which the Western Balkan is not only a transit area, but a final destination and even the source, particularly organized crime, terrorism and irregular migration. Prevention and suppression of given issues determines priorities of the Serbian police, at the same time leading to successful response to crime and other security threats in Serbia, as well as achievements in meeting commitments in the EU accession process and adopting the European acquis.


Author(s):  
Sofía Sebastián

The hybrid and transnational nature of current conflicts poses one of today’s most pressing global security challenges, with crises ranging from western Africa to the Himalayas. This chapter evaluates the policies, strategies, and mechanisms in place in conflicts that encompass transnational security threats such as terrorism, organized crime, and cross-border sectarian insurgencies in the context of UN peace operations. International efforts aimed at addressing these threats have been ad hoc and piecemeal. Further work needs to focus on maximizing the use of existing regional initiatives and reinforcing the policy, operational, and political support for UN missions operating in these environments. The chapter draws from the Malian conflict to reflect on these issues.


2002 ◽  
Vol 23 (2) ◽  
pp. 37-55
Author(s):  
Louise I. Shelley

The murder of Valentin Tsvetkov, the governor of Magadan in central Moscow in broad day light in October 2002 highlights that organized crime and corruption are still alive and well and highly destructive of life and governance in Russia (Wines, 2002). His murder once again raises the question, “Why has Russia not been able to stop organized crime and high level corruption?” The answer is that Russia docs not have the political will at the national, regional or local level to fight these problems. This is true because the Kremlin and economic elite push their personal interests over those of the state and the society. Structural problems such as low salaries of state personnel and the embedding of organized crime and corruption make reform very difficult.


Unity Journal ◽  
2021 ◽  
Vol 2 ◽  
pp. 251-262
Author(s):  
Sumitra Karki

Nepal has been a home to diversified settlement in terms of ethnicity, religion, dialect and culture since its outset in civilization. It also lies between two great military and economic giants of Asia – India and China – that are hostile to each other. While these bring abundant opportunities for Nepal, it possesses several internal and external security threats. Nepal suffers from cyber-attack, environmental degradation, pandemic, ethnic, racial or religious conflicts, inequality and poverty, extremism, human trafficking, corruption, migration and trans-boundary crime. In addition, Nepal also faces several security threats, traditional and non–traditional, including terrorism and insurgency. These threats possess serious implications on peace and security of Nepal and the South Asian region. There is a need of serious study about the major internal and external security challenges that Nepal faces in recent decades. This study aims at examining some of the major security challenges, explore the factors behind it, and attempt to suggest few policy recommendations to the government of Nepal to deal with them. The study is conducted by reviewing the primary and secondary sources of data. The primary data includes documents of the government agencies, press release, joint statement and organizational reports. It also includes the interviews with security experts, bureaucrats, policy makers and academicians. Similarly, secondary data includes books, news reports, academic journals, seminars report and reports of research institutes and think tanks. The study highlights that Nepal should prepare itself to meet with the emerging internal and external security challenges what have emerged in recent times. With the rise of India and China, two adversarial powers in the region, Nepal possess extreme challenges in days to come. Similarly, hardly any countries of the world had prepared itself to deal with recent pandemic like COVID-19 that has shattered even the most powerful countries of the world. Taking lessons from these, it is time for Nepal to learn and prepare to mitigate the challenges.


2016 ◽  
Vol 8 (2) ◽  
pp. 148 ◽  
Author(s):  
Jason Qu

<p class="1Body">Despite of strong economy including highest GDP gross and self-sufficient feudal economy system, the late Qing Empire fell behind the world trend with its isolationist trade policies. As the Western world caught up technologically, economically, and politically, the former biggest economy had suffered from consecutive losses in wars. In order to preserve the feudal regime, the initiative reform, termed the Self Strengthening Movement was grandly carried out. However, without the true support from the supreme power on one hand, and without the support of the populace on the other, the Movement was an intermediate reform in attempt to preserve the royal system and forestall its continued decline. In policy, the reforms envisioned Western-style modernization without adjusting the political order, yet the entrenched conservatism of the Qing Imperial Court proved to be the decisive hindering factor in the failure of the Movement.</p>


Worldview ◽  
1968 ◽  
Vol 11 (6) ◽  
pp. 6-12
Author(s):  
Paul W. Blackstock

The Liberal's Dilemma and the Anarchism of Youth. The sensitive individual in the Western world has nearly always been impelled to protest the injustices of. the political and social order in which he finds himself. For example, very early in life Stephen Spender observed that "to be born is to be a Robinson Crusoe, cast up by elemental powers upon an island," that "all men are not free to share what nature offers here … are not permitted to explore the world into which they are born." Throughout their lives they are "sealed into leaden slums as into living tombs." To this general awareness of the plight of the poor, the New Left in this country has added a sense of burning moral indignation that the colored minority has also been sealed into ghettos and deprived of civil rights and human dignity.


Author(s):  
Alya Geogiana Buja

This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the learning environment is becoming an issue that has been considered by the community.  DePAN 1.0 and DePAN 2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-learning are authentication and accountability, access control, and non-repudiation issues. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-learning have been studied thoroughly.  A very feasible study has been conducted on the existing literature and related works to e-learning and e-learning.  The security threats are also reviewed in this paper.  Based on the established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.  The findings from this study can be added to the implementation of e-learning in the future.


Author(s):  
Mohammad Tariq Banday

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.


Sign in / Sign up

Export Citation Format

Share Document