scholarly journals ХИБРИДИЗАЦИЈА СИСТЕМА БЕЗБЕДНОСТИ У ФУНКЦИЈИ РЕАЛИЗАЦИЈЕ КОНЦЕПТА ЉУДСКЕ БЕЗБЕДНОСТИ

TEME ◽  
2020 ◽  
pp. 1013
Author(s):  
Ivica Lj Djordjevic ◽  
Ozren Dzigurski

Depending on the inclination of the authors and the focus of their security research, we recognize two most common approaches: the first focuses on the stability of national governance structures and territorial integrity (state and/or national security); while the second approach focuses on security as a civil right in daily life, the availability of necessary resources and the quality of life. The latter approach is known in theory as the concept of human security. Considering the fact that a comprehensive analysis of the security situation involves elements of both approaches, in the paper we consider the complex relationship between state and non-state security actors through the hybridization of the political system. The mismatch between the level of the national strategy and its operationalization at the level of meeting the needs of citizens requires the introduction of new elements in the space between the strategic and operational levels. The outlined approach can be called the Hybrid Security System because of its potential contribution to raising the level of Human Security (HS) in local communities. We will present the hybrid security system conceptually in the form of a decentralized computer network. The presented diagram of System Dynamics and the proposed model of HS operationalization through the hybridization of security systems using the potential of Information and Communications Technologies are a good basis for the analysis and raising the level of citizens’ security in relation to current threats.

2018 ◽  
Vol 2 (4-2) ◽  
pp. 360
Author(s):  
Deni Satria ◽  
Alde Alanda ◽  
Aldo Erianda ◽  
Deddy Prayama

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.


2018 ◽  
Vol 16 (45) ◽  
pp. 55-64
Author(s):  
Javier Cabo-Salvador ◽  
José Manuel Velarde ◽  
Verónica Cabo Muíños ◽  
Carlos De Castro Lozano ◽  
Javier Ramos López

This paper proposes an integrated model of social-health resources management. The authors present the actual challenges for health care, in an environment characterized by longer life expectancy and an increase in the number of patients with chronic pathologies, in a scenario of both, economic and financial crises. Their presentation includes management and financial issues, and the technological trends –such as the development of personalized and regenerative medicine– which will lead to an increase in health spending. The task of facing these challenges, they explain, cannot be postponed, the goals should be to improve: the efficiency in the use of health resources, the quality of health care and the level of patient satisfaction. Finally, they present some concepts about the application of information and communications technologies in health, show its relationship with the chronic patient care and present both, the current management models for this type of patient and the new proposed model.


2014 ◽  
Vol 1044-1045 ◽  
pp. 965-967 ◽  
Author(s):  
Lan Jiang

With the rapid development of economy and society, the growing prosperous computer network technology has now become one of the indispensable elements in human life. Small to every household personal computer systems, large to computer systems concerned countries, they are incorporated into the scope of computer network security systems. Enterprises are social living cells, with important role of financial intermediation, the mining technology and training personnel. Corporate computer systems is an important part to ensure high-speed operation of enterprises, summarize business information and protect trade secrets, therefore, the more developed computer network technology is, the more important the development and maintenance of corporate computer network security systems is. This article will explore the design and function of enterprise computer network security system implementations based on the characteristics of computer network security and enterprise computer network system.


Mousaion ◽  
2016 ◽  
Vol 33 (1) ◽  
pp. 23-42 ◽  
Author(s):  
Tinashe Mugwisi

Information and communications technologies (ICTs) and the Internet have to a large extent influenced the way information is made available, published and accessed. More information is being produced too frequently and information users now require certain skills to sift through this multitude in order to identify what is appropriate for their purposes. Computer and information skills have become a necessity for all academic programmes. As libraries subscribe to databases and other peer-reviewed content (print and electronic), it is important that users are also made aware of such sources and their importance. The purpose of this study was to examine the teaching of information literacy (IL) in universities in Zimbabwe and South Africa, and the role played by librarians in creating information literate graduates. This was done by examining whether such IL programmes were prioritised, their content and how frequently they were reviewed. An electronic questionnaire was distributed to 12 university libraries in Zimbabwe and 21 in South Africa. A total of 25 questionnaires were returned. The findings revealed that IL was being taught in universities library and non-library staff, was compulsory and contributed to the term mark in some institutions. The study also revealed that 44 per cent of the total respondents indicated that the libraries were collaborating with departments and faculty in implementing IL programmes in universities. The study recommends that IL should be an integral part of the university programmes in order to promote the use of databases and to guide students on ethical issues of information use.


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


Author(s):  
Fahad Nabeel

In 2016, the United Nations (UN) launched the Digital Blue Helmets (DBH) program under its Office of Information and Communications Technologies (OICT). The launching of DBH was a continuation of a series of steps that the UN and its related agencies and departments have undertaken over the past decade to incorporate cyberspace within their working methodologies. At the time of inception, DBH was envisioned as a team capacitated to act as a replica of a physical peacekeeping force but for the sole purpose of overseeing cyberspace(s). Several research studies have been published in the past few years, which have conceptualized cyber peacekeeping in various ways. Some scholars have mentioned DBH as a starting point of cyber peacekeeping while some have proposed models for integration of cyber peacekeeping within the current UN peacekeeping architecture. However, no significant study has attempted to look at how DBH has evolved since its inception. This research article aims to examine the progress of DBH since its formation. It argues that despite four years since its formation, DBH is still far away from materializing its declared objectives. The article also discusses the future potential roles of DBH, including its collaboration with UN Global Pulse for cyber threat detection and prevention, and embedding the team along with physical peacekeepers.


SAGE Open ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 215824402110326
Author(s):  
Guan Huang ◽  
Zhuang Cai

Understanding the development of social security systems constitutes the ultimate goal of social security research. This review traces and compares two schools of thought regarding social security development: the convergence and divergence schools. Using a thematic approach, this article first categorizes extant studies into one of these two schools and then identifies the broadly accepted mechanism of social security development by comparing them. After reviewing the extant research and its theoretical underpinnings, this article applies Mill’s methods of agreement and difference to show how the Chinese case contributes to and challenges our understanding of social security development. By discussing the assumptions of current research on social security development in light of the Chinese case, this article illuminates how political legitimacy serves as a common mechanism of social security development regardless of political context or structure.


Sign in / Sign up

Export Citation Format

Share Document