scholarly journals Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan

2017 ◽  
Vol 4 (4) ◽  
pp. 267-274
Author(s):  
Farzana Zaheer Syed ◽  
Saba Javed

Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security concept and added up the non-traditional threats as necessary part in security planning. Non-Traditional threats, terrorism, ambiguous warfare, cyber threats, water security, human security and energy crises etc now have equal importance with the border security. To protect the state from these actors, Pakistan is now reassessing and reorganized its security strategies. But these policies need more deliberate efforts to deal with such internal and external factors that are slowly and constantly weakening the state.Int. J. Soc. Sc. Manage. Vol. 4, Issue-4: 267-274

2017 ◽  
Vol 41 (3) ◽  
pp. 44-71 ◽  
Author(s):  
Joseph S. Nye

Understanding deterrence and dissuasion in cyberspace is often difficult because our minds are captured by Cold War images of massive retaliation to a nuclear attack by nuclear means. The analogy to nuclear deterrence is misleading, however, because many aspects of cyber behavior are more like other behaviors, such as crime, that states try (imperfectly) to deter. Preventing harm in cyberspace involves four complex mechanisms: threats of punishment, denial, entanglement, and norms. Even when punishment is used, deterrent threats need not be limited to cyber responses, and they may address general behavior as well as specific acts. Cyber threats are plentiful, often ambiguous, and difficult to attribute. Problems of attribution are said to limit deterrence and dissuasion in the cyber domain, but three of the major means—denial by defense, entanglement, and normative taboos—are not strongly hindered by the attribution problem. The effectiveness of different mechanisms depends on context, and the question of whether deterrence works in cyberspace depends on “who and what.” Not all cyberattacks are of equal importance; not all can be deterred; and not all rise to the level of significant national security threats. The lesson for policymakers is to focus on the most important attacks and to understand the context in which such attacks may occur and the full range of mechanisms available to prevent them.


2019 ◽  
pp. 1189-1199
Author(s):  
David Gould

This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.


2018 ◽  
Vol 9 (4) ◽  
pp. 53-62
Author(s):  
David Gould

This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.


2019 ◽  
Vol 2 (4) ◽  
pp. 151
Author(s):  
Bashir Hadi Abdul Razak

The Arab-Israeli conflict is among the longest and most complex conflicts in the world today, a conflict that transcends borders or a difference of influence. It is a struggle for existence in every sense. Since the establishment of Israel in 1948, one of the regional forces whose political movement is determined by the Arab world has become the result of the internal and external factors and changes that affect it. This entity is hostile to the Arabs, Which would have a negative impact on the regional strategic situation.


2020 ◽  
Author(s):  
Niki O'Brien ◽  
Guy Martin ◽  
Emilia Grass ◽  
Mike Durkin ◽  
Ara Darzi ◽  
...  

BACKGROUND Health systems around the world are increasingly reliant on digital technology. Such reliance requires that healthcare organizations consider effective cybersecurity and digital resilience as a fundamental component of patient safety, with recent cyberattacks highlighting the risks to patients and targeted organizations. OBJECTIVE The purpose of this study was to explore the current global cybersecurity landscape and maturity in healthcare. METHODS We developed and administered a survey to examine the current cybersecurity landscape and preparedness level across global healthcare organizations. RESULTS Cyber threats were a common concern for the 17 healthcare organizations who participated. The principal concerns highlighted were data security, including the manipulation or loss of electronic health records; loss of trust in the organization; and risks of service disruption. Cybersecurity maturity scoring showed that despite the majority of organizations having established cybersecurity practices, levels of awareness and education were universally poor. CONCLUSIONS Policymakers should consider raising awareness and improving education/training on cybersecurity as a fundamental tenet of patient safety.


Unity Journal ◽  
2021 ◽  
Vol 2 ◽  
pp. 251-262
Author(s):  
Sumitra Karki

Nepal has been a home to diversified settlement in terms of ethnicity, religion, dialect and culture since its outset in civilization. It also lies between two great military and economic giants of Asia – India and China – that are hostile to each other. While these bring abundant opportunities for Nepal, it possesses several internal and external security threats. Nepal suffers from cyber-attack, environmental degradation, pandemic, ethnic, racial or religious conflicts, inequality and poverty, extremism, human trafficking, corruption, migration and trans-boundary crime. In addition, Nepal also faces several security threats, traditional and non–traditional, including terrorism and insurgency. These threats possess serious implications on peace and security of Nepal and the South Asian region. There is a need of serious study about the major internal and external security challenges that Nepal faces in recent decades. This study aims at examining some of the major security challenges, explore the factors behind it, and attempt to suggest few policy recommendations to the government of Nepal to deal with them. The study is conducted by reviewing the primary and secondary sources of data. The primary data includes documents of the government agencies, press release, joint statement and organizational reports. It also includes the interviews with security experts, bureaucrats, policy makers and academicians. Similarly, secondary data includes books, news reports, academic journals, seminars report and reports of research institutes and think tanks. The study highlights that Nepal should prepare itself to meet with the emerging internal and external security challenges what have emerged in recent times. With the rise of India and China, two adversarial powers in the region, Nepal possess extreme challenges in days to come. Similarly, hardly any countries of the world had prepared itself to deal with recent pandemic like COVID-19 that has shattered even the most powerful countries of the world. Taking lessons from these, it is time for Nepal to learn and prepare to mitigate the challenges.


2019 ◽  
pp. 227-232
Author(s):  
Edward B. Barbier

This concluding chapter looks at the future of water. There are two possible paths for managing water. First, if the world continues with inadequate governance and institutions, incorrect market signals, and insufficient innovations to improve efficiency and manage competing demands, most chronic water and scarcity problems will continue to worsen. The world will see a future of declining water security, freshwater ecosystem degradation, and increasing disputes and conflicts over remaining water resources. The alternative path to managing water is the one offered by this book. If, in anticipation of the coming decades of increasing water scarcity, humankind is able to develop appropriate governance and institutions for water management, instigate market and policy reforms, and address global management issues, then improved innovation and investments in new water technologies and better protection of freshwater ecosystems should secure sufficient beneficial water use for a growing world population.


Author(s):  
Marc C. Vielledent

The United States has long enjoyed an essentially unopposed ability to project power and sustain its security forces dispersed throughout the world. However, the uncertainty facing the global security environment, including tenuous alliances, fiscal constraints, and a decline in overseas basing, has increased tensions in emerging areas of potential conflict. These factors are driving change regarding the United States’ defense posture and access agreements abroad. While the preponderance of overseas capability outweighs the preponderance of U.S. forces, deterrence continues to underpin the overarching national security strategy. However, deterrence options impacted by the lack of resilience and investment in distributed logistics and sustainment are generating an additional range of variables and conditions for operators on the ground to consider in shared and contested domains.


2018 ◽  
Vol 5 (3) ◽  
pp. 218-223 ◽  
Author(s):  
M.H. Glantz

The notion of «the water world we want» is a spin-off of the United Nations campaign The World We Want. It is open to subjective interpretation, as people have different perceptions of a desired future. Each person or organization is likely to identify their own set of key concerns: food, clean (uncontaminated) water, sustained agricultural productivity, sustainable use of land and ocean resources, healthy lives and secure livelihoods. But whatever utopian world view one creates, it cannot be achieved without adequate sustained water supplies.In 2009, the then United Nations Secretary-General Ban Ki-Moon noted: It is well known that water is life; what this Report shows is that water also means livelihoods. It is the route out of poverty for individuals and communities. Managing water is essential if the world is to achieve sustainable development.This challenge is even more pressing as the world confronts the triple threats of climate change, rising food and energy costs, and the global economic crisis. All three are exacerbating poverty, inequality and underdevelopment.It is apparent that climate, water and weather-related concerns are mounting. Societies are becoming increasingly aware that impacts of extreme hydrometeorological events expected to occur in, say, the 2050s are starting to appear decades earlier. These extreme events — related to climate change — are likely to increase in frequency, intensity and severity. 


Sign in / Sign up

Export Citation Format

Share Document