scholarly journals THE NORMATIVE ROLE OF THE ALLIANCE IN NON-CONVENTIONAL SECURITY THREATS – CYBER DEFENCE OF MEMBER STATES

Author(s):  
ADRIJANA DVORŠAK

The role of international security organizations is to create a consensus on values, norms and rules relating to cyber warfare. NATO produces cyber policy and provides for education and the exchange of information also through publicistic activity. To a lesser extent it has also developed operational capabilities for joint cyber defence and cyber warfare. NATO can expect initiatives for close cooperation in cyber defence and the establishment of common cyber capabilities, which are all rational responses to unconventional threats. The benefits stemming from such cooperation differ by state. The author is nonetheless convinced that the United States will benefit the most from the said cooperation as their economy is the most dependent on information and communication technology, the most globalised and allegedly the most frequent target of cyber attacks.

2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


Author(s):  
Haitham ASSIRI ◽  
Priyadarsi NANDA ◽  
Manoranjan MOHANTY

The e-Government system leverages Information and Communication Technology (ICT) to transform the relationship between government bodies and citizens, businesses and other government ministries, departments, and agencies. The primary aim is to make government services more seamless, efficient and timely for every citizen and organisation. However, e-Government systems are now faced with security threats and cyber attacks, and these challenges have raised concerns about users’ privacy as well as the confidentiality and integrity of user data.


2019 ◽  
pp. 250-264
Author(s):  
Albert Olagbemiro

The overall implication of depicting cyberspace as a complex, adaptive ecosystem rather than its current representation as a bi-dimensional domain provides an avenue for further insight into the complexities associated with operating in cyberspace. This renewed perspective brings to the forefront the critical role of the civilian private sector in cyber warfare, due to the intermixing and heavy reliance of the United States Government (USG) on an infrastructure owned and operated by the civilian private sector. The implications of such a revisionist perspective leads to a theory of action, which suggests that given this heavy reliance of U.S.G entities to include DoD, on a cyber-infrastructure predominantly owned and operated by civilian private sector entities, authorization to wage offensive-styled cyber-attacks, as a defensive measure should not be limited exclusively to the DoD but also expanded to include authorized entities in the civilian private sector.


2015 ◽  
Vol 5 (4) ◽  
pp. 1-14
Author(s):  
Albert Olagbemiro

The overall implication of depicting cyberspace as a complex, adaptive ecosystem rather than its current representation as a bi-dimensional domain provides an avenue for further insight into the complexities associated with operating in cyberspace. This renewed perspective brings to the forefront the critical role of the civilian private sector in cyber warfare, due to the intermixing and heavy reliance of the United States Government (USG) on an infrastructure owned and operated by the civilian private sector. The implications of such a revisionist perspective leads to a theory of action, which suggests that given this heavy reliance of U.S.G entities to include DoD, on a cyber-infrastructure predominantly owned and operated by civilian private sector entities, authorization to wage offensive-styled cyber-attacks, as a defensive measure should not be limited exclusively to the DoD but also expanded to include authorized entities in the civilian private sector.


2016 ◽  
Vol 6 (4) ◽  
pp. 41-57
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


SAGE Open ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 215824402110376
Author(s):  
Lanu Kim

This article investigates whether the development of information and communication technology (ICT) contributes to the dispersion of wealthy and talented people and helps prevent the concentration of wealth in only a few cities. In between some authors’ positive speculation on the role of ICT in reducing the necessity of physical distance and others’ emphasis on the vital role of offline interaction, the current research takes a broader view and investigates whether the technology impacts the concentration of jobs across the U.S. cities in the years 2006 and 2016. Using data from Occupational Employment Statistics surveys and the Occupational Information Network, I measure the significance of location for occupations by exploring geographical concentration and the interdependence of occupation dyads. The results show there is no evidence to support the assertion that ICT skills required for occupation were negatively associated with the geographical dispersion of the occupation in the study period. Instead, the research indicates that occupational ICT strengthened the geographical interdependence of occupations. The finds show that, in particular, jobs requiring higher ICT skills continued to be bounded to locations between 2006 and 2016. Overall, the results show there is no evidence for the claim that ICT is associated with the dispersion of geographical locations of occupations. The results suggest that rising communication technology will not necessarily diminish the concentration of good jobs or wealth inequality between cities.


2017 ◽  
Vol 23 (1) ◽  
pp. 3-8
Author(s):  
R. P. BAIN ◽  
D. P. RAI ◽  
SIDDARTH NAYAK

If we want to convert our rural population into knowledge driven, progressive, self sufficient, self reliant, sustainable society, the role of Information and Communication Technologies (ICT’s) cannot be ignored. Timely availability information is considered as most important factor in Indian agriculture. At present ICT is the technology of this millennium. Transferring the developed technology to all end users is time-consuming and tiresome task and is often not completed due to paucity of resources and lack of manpower. In India, agriculture and rural development has gained significantly from ICT due to its widespread extension and adoption. In this era of internet, ICT is committed to provide real, timely accurate authentic information to the farmers and rural peoples.


2020 ◽  
Vol 3 (9) ◽  
pp. 181-185
Author(s):  
Jaspreet Singh ◽  
Amir Shamim Shiekh ◽  
Manmeet Kour ◽  
Pankaj Kumar

In the last few decades, Information Technology has transformed the entire world into a village, known as Global Village, as proposed by Marshal McLuhan. ICT has increased its influence in every field like the education sector, defense sector, technology etc. In the 21st century, information and communication technology (ICT) has become an important and integral part of most educational organizations throughout the world.. The use of ICT in classroom teaching and learning processes has become indispensable as it gives teachers and learners the opportunity to operate, store, control and retrieve data in addition to promoting self-regulated and active learning. (Ali, Haolader & Muhammad, 2013) Today we are dependent on technology and the role of ICT is increasing day by day and is believed to be a new normal. Keeping that in view, the present paper attempts to examine the relationship between information and communication technologies (ICT) and student learning. This conceptual paper  is based on secondary information collected from different sources such as books, journal articles, newspapers, reports of various government organizations, non-governmental organizations and soon.


Author(s):  
Salamatu Baba ◽  
◽  
Dikuma Ibrahim ◽  
Sanda Grema ◽  
◽  
...  

In order to promote utilizing the available resource made in any library information has to be taken to the door step of a clientele a such information and communication technology will serve as a catalyst in doing that. This paper has explored the role of information and communication technology ICT in academia and as well as the strategies used in propagating the available services in an academic library this is because tailor made information it is highly required so as to avoid wasting the precious time of academicians and this can be only achieving with the help of information and communication technology software, therefore, descriptive method was adopted in the methodology of this study.


Sign in / Sign up

Export Citation Format

Share Document