scholarly journals Security Issues in the Integrated Management Perspective

Author(s):  
Andrzej Potoczek

Abstract Security is a system of interrelated elements that interact with each other and must be effectively managed. At the same time, security is one of the key areas of administrative activity. Nowadays, an integrated approach to the development process in the context of shaping local security policy becomes extremely important. Integrated management is based on a territorial-functional approach and exposes mutually balanced links between the economic, social and environmental systems of which security is a common element.

2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2001 ◽  
Vol 43 (5) ◽  
pp. 61-68 ◽  
Author(s):  
B. Chocat ◽  
P. Krebs ◽  
J. Marsalek ◽  
W. Rauch ◽  
W. Schilling

Even though urban drainage has been practised for more than 5000 years, many challenges arising from growing demands on drainage still remain with respect to runoff quantity and quality; landscape aesthetics, ecology and beneficial uses; and operation of existing urban wastewater systems. Further advances can be achieved by adopting an integrated approach, optimal operation of the existing infrastructure, advanced pollution and runoff source controls, improved resilience of receiving waters, and adaptive water management. The specific research needs include new technologies and strategies for stormwater management, advanced treatment of urban wet-weather effluents, and tools for analysis and operation of drainage systems. High diversity of demands on, and region/site specific conditions of, urban drainage shapes the role of urban drainage experts – as mediators among the many stakeholders and fields involved.


2019 ◽  
Vol 11 (2) ◽  
pp. 170
Author(s):  
Remigius Seran

ABSTRACTThe urgency to set up the Border Between Indonesia and Timor-Leste and the border crossers is based on much more complex historical reasons than the arrangement of Indonesia's borders with other countries. Border governance policies between Indonesia and Timor-Leste are characterized by: border governance policies indicate a desire to adopt an integrated approach, governance practices tend to be fragmented where two very dominant approaches are the security approach and the socio-economic welfare approach. A border governance policy that ignores cultural identity variables leads to a reverse response, namely the use of cultural identity to challenge the country's dominant conception and policy in border governance. The phenomenon of "rat road" and other cross-border interaction networks called illegal by the state can be read as a form of local community resistance to the claim of state sovereignty over the border. In an integrated border governance policy, a cultural approach should be one of the main components that characterize other approaches. Jailly puts the four dimensions of the policy parallel, the cultural approach in border governance policy to the principles that fuel security policy, local politics and economic policy in border governance. The practical consequence of this study is the policy that border governance must move beyond the dominance of the economic security approach to an integrated approach. This study proposes the concept of trans-border social and cultural space as an important element in integrated border governance.Key Words: Border governance, Indonesia – Timor-Leste, Cultural crosser borders.


Author(s):  
Joshua Hurtado Hurtado

While there has been research focusing on security issues in Mexico in the context of the Mexican Drug War and the effects of violence on its population, little has been done to explore the relationship between public-official discourse, political practices and mourning at a societal level. Using the Logics of Critical Explanation (LCE) framework developed by Jason Glynos and David Howarth, and focusing on the notions of mourning and melancholia at a societal level, this paper argues that the conditions for mourning at a societal level have not been met in public-official discourse regarding the security policy and the Mexican Drug War, resulting in subjects experiencing blocked mourning. It views the Peace and Reconciliation Forums as a political logic that seeks to differentiate the approach taken by the incoming López Obrador administration in relation to security strategy formulation and attention to victims and Human Rights’ groups. It also argues that while the forums themselves have some attributes that could pave the way for successful mourning to occur, a comprehensive set of practices needs to materialize that addresses the concerns of violence-affected subjects.


Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


2004 ◽  
Vol 5 (1) ◽  
pp. 67-87
Author(s):  
Jeong-Yong Kim

This article presents the model of 'business-track diplomacy' to test a state's utilization of economic engagement strategy as security policy. The model provides ways to think around security issues and alternative security options that go beyond the traditional military containment approach to security in international relations. As a case study, the article investigates Hyundai Group's Mountain Kumgang tourism with North Korea. In this case study, it demonstrates that not only the Kim Dae-Jung government's strong policy-making will of business-track diplomacy towards North Korea but also the Hyundai Group's business will and vulnerability of the North Korean economy played important roles in realizing the tour project and thus, enhanced inter-Korean economic cooperation.


Author(s):  
Vincenzo De De Luca ◽  
Vanja Lazic ◽  
Strahil Birov ◽  
Klaus Piesche ◽  
Ozan Beyhan ◽  
...  

This article describes a user-centred approach taken by a group of five procurers to set specifications for the procurement of value-based research and development services for IT-supported integrated hypertension management. The approach considered the unmet needs of patients and health systems of the involved regions. The procurers established a framework for requirements and a solution design consisting of nine building blocks, divided into three domains: service delivery, devices and integration, and health care organisation. The approach included the development of questionnaires, capturing patients’ and professionals’ views on possible system functionalities, and a template collecting information about the organisation of healthcare, professionals involved and existing IT systems at the procurers’ premises. A total of 28 patients diagnosed with hypertension and 26 professionals were interviewed. The interviewees identified 98 functional requirements, grouped in the nine building blocks. A total of nine use cases and their corresponding process models were defined by the procurers’ working group. As result, a digitally enabled integrated approach to hypertension has been designed to allow citizens to learn how to prevent the development of hypertension and lead a healthy lifestyle, and to receive comprehensive, individualised treatment in close collaboration with healthcare professionals.


2021 ◽  
Vol 110 ◽  
pp. 31-36
Author(s):  
Cristina Petronela Simion ◽  
Traian Valeriu Popescu ◽  
Mirona Ana Maria Popescu ◽  
Andreea Maria G. Militaru

Many organizations have adopted or are adopting standards and / or specifications of management systems, such as ISO 9001, ISO 14001, OHSAS 18001, ISO / IEC 27001, ISO 22000, and ISO / IEC 20000, out of necessity or to align with trends. Unfortunately, it often results in a set of independent systems, with different goals and objectives. These fragmented systems are often documented in non-uniform styles, are under the control of different people and are audited separately. Integrated management systems (IMS) allow management to establish directions for the effective and efficient fulfillment of the organization's objectives. From managing employee needs to study the performance of competitors, encouraging good practice, and minimizing risk and maximizing resource utilization, the integrated management system approach can help the organization meet its strategic business objectives. Integration must be planned and implemented in a structured way. Many organizations have adopted the standards of the management system due to external pressures, following customer requests to implement a quality standard or external requirements to introduce an environmental system, and / or occupational health and safety [2]. On the other hand, the integration of management systems has beneficial effects on the whole business. Therefore, the first concern must be to understand the needs of the business, correlated with the mission and vision of the organization. In order to respond to the growing interest in an integrated approach to management systems and organizational risk management, the first step an organization must take is to define the common requirements of management systems. The authors aim in this article to present the advantages brought by IMS by their correct implementation within organizations. A review of the current integrated management systems is carried out and the problems that arise during use are exposed. The research includes a guide of good practices from the start to the end of an IMS implementation. Thus, the use of synergies and the integration of resources allows the creation of an efficient and simplified management system. Processes and procedures are viewed from several angles, in order to identify and optimize the IMS implementation process in order to obtain positive results.


Plant Disease ◽  
2021 ◽  
Author(s):  
Phinda Magagula ◽  
Nicky Taylor ◽  
Velushka Swart ◽  
Noëlani van den Berg

Rosellinia necatrix is the causal agent of white root rot (WRR), a fatal disease affecting many woody plants, including avocado (Persea americana). As with other root diseases, an integrated approach is required to control WRR. No fully effective control methods are available, and no chemical or biological agents against R. necatrix have been registered for use on avocado in South Africa. Fluazinam has shown promising results in the greenhouse and field in other countries, including Spain. The current study aimed to investigate the potential of a fumigant, chloropicrin, and biological control agents (B-Rus, Beta-Bak, Mity-Gro, and Trichoderma) against R. necatrix both in vitro and in vivo as compared with fluazinam. In a greenhouse trial, results showed that Trichoderma and B-Rus were as effective as fluazinam at inhibiting R. necatrix in vitro and suppressed WRR symptoms when applied before inoculation with R. necatrix. In contrast, Mity-Gro and Beta-Bak failed to inhibit the pathogen in vitro and in the greenhouse trial, despite application of the products to plants before R. necatrix infection. Fluazinam suppressed WRR symptoms in plants when applied at the early stages of infection, whereas chloropicrin rendered the pathogen nonviable when used as a preplant treatment. Plants treated with Trichoderma, B-Rus, and fluazinam sustained dry mass production and net CO2 assimilation by maintaining the green leaf tissues despite being infected with the pathogen. This study has important implications for the integrated management of WRR.


Geosciences ◽  
2019 ◽  
Vol 9 (7) ◽  
pp. 307 ◽  
Author(s):  
Karel Janečka

The geodetic point fields play a crucial role in measuring a terrain, in surveying, and mapping applications. Due to the rapid development in the domain of information technologies, it makes sense to consider using the database and web technologies to manage and disseminate the available information about the geodetic point fields. The paper presents the creation of a spatial database which integrates the information about the various kinds of established geodetic point fields (horizontal, vertical and gravitational) with the aim of enabling their effective management. Furthermore, based on the integrated spatial database, the prototype of the new information system of geodetic point fields has been developed. The functionality of the prototype also considers the requirements coming from the international efforts, i.e., the Infrastructure for Spatial Information in Europe (INSPIRE) directive. The prototype, based on Java Enterprise Edition (EE) technology, implements the features reflecting the cyber-security issues and ensures the modularity and scalability of the system, which is important for further development of the system and dissemination and accessibility of the information about the geodetic point fields via modern web technologies.


Sign in / Sign up

Export Citation Format

Share Document