Hometown is the most reassuring place: The impact of ontological security threat on preference of hometown brands

2020 ◽  
Vol 52 (4) ◽  
pp. 513
2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


2015 ◽  
Vol 4 (2) ◽  
pp. 390 ◽  
Author(s):  
Alaa Zain ◽  
Heba El-khobby ◽  
Hatem M. Abd Elkader ◽  
Mostafa Abdelnaby

A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.


2021 ◽  
Vol 21 (4) ◽  
pp. 772-784
Author(s):  
Yury V. Borovsky

In the early 2020s the worlds transition from carbon-intensive to climate-neutral energy use has already become a discernible and a difficult-to-reverse process. With Joe Bidens election as US president, the United States have returned to the Paris Climate Agreement and have become a key driver of this process (along with the EU and China). As a result, the international community has reached a consensus on the ongoing energy transition. This process will require considerable effort and may take several decades. Nevertheless, the impact of energy transition on traditional approaches to energy security, which emerged largely as a result of the global oil crises of the 1970s and 1980s and are centered around the supply of fossil fuels, is already a relevant research topic. This problem is examined relying on the relevant terminological, theoretical and factual material. The article concludes that energy transition will ultimately undermine the carbon paradigm that has underpinned energy security policies since the 1970s. Rapid development of renewable and other low-carbon energy sources will certainly remove key energy security risks of energy importers and, possibly, allow them to achieve energy independence. However, a post-carbon era may also generate new risks. For countries that rely heavily on oil, gas and coal exports, energy transition will result in the loss of markets and revenues. It may present an energy security threat for them as well as it will require a costly and technologically complex process of the energy sector decarbonization. Some exporters, especially those with high fuel rents and insufficient financial reserves, may face serious economic and social upheavals as a result of energy transition. The EU and the US energy transition policies reflect provisions of all three fundamental international relations theoretical paradigms, including realism. This means that the EU and the US policy, aimed at promoting climate agenda, may be expected to be rather tough and aggressive. China as the third key player in energy transition is still following a liberal course; however, it may change in the future.


2021 ◽  
Vol IV(1) ◽  
Author(s):  
Dinu Turcanu ◽  
◽  
Natalia Spinu ◽  
Serghei Popovici ◽  
Tatiana Turcanu ◽  
...  

The process of implementing information technologies in all areas of economic, political, social life, etc. in the Republic of Moldova has also determined the evolution of cybercrime. New “virtual” dimensions of national infrastructure are being formed, which are becoming more and more important for local and international politics. As a result, in recent years it has been found that computer systems, networks and data are being used more and more frequently for criminal purposes, and the materials that could be evidence of these crimes are also stored and transmitted through these networks by perpetrators. Cybercrime, espionage, propaganda, diversion and excessive exploitation of personal data through electronic communications networks are used as basic tools at all stages of designing a hybrid security threat. Cyberspace-specific threats are characterized by asymmetry and accentuated dynamics and global character, which makes them difficult to identify and counteracted by measures proportional to the impact of the materialization of risks. Moldova is currently facing threats from cyberspace at the address of critical infrastructures, given the increasing interdependence between cyber infrastructures and infrastructures such as those in the financial banking, transport, energy and national defense sectors. The globality of cyberspace is likely to amplify the risks to them by affecting both the sector to the same extent private as well as public. Threats to cyberspace can be classified in several ways, but the most commonly used are those based on motivational factors and the impact on society. In the prevailing conditions cybersecurity is becoming one of the most important areas for ensuring internal security and the effective operation of state institutions in all spheres of social and economic life.


Author(s):  
Catherine Berry

This chapter describes the worrisome trend of resistance development in antibacterial agents with exponential increases in resistance to the most effective classes of antibiotics. Described by the World Health Organization as a major global health security threat, the annual deaths from drug-resistant infection are projected to increase from 700,000 to 10 million by 2050. This chapter outlines the impact of antimicrobial resistance in humanitarian settings and provides practical approaches which can be used by organizations and health providers.


2005 ◽  
Vol 31 (3) ◽  
pp. 519-540 ◽  
Author(s):  
BRENT J STEELE

Why did Great Britain remain neutral during the American Civil War? Although several historical arguments have been put forth, few studies have explicitly used International Relations (IR) theories to understand this decision. Synthesising a discursive approach with an ontological security interpretation, I propose an alternative framework for understanding security-seeking behaviour and threats to identity. I assess the impact Abraham Lincoln's Emancipation Proclamation had upon the interventionist debates in Great Britain. I argue that the Proclamation reframed interventionist debates, thus (re)engendering the British anxiety over slavery and removing intervention as a viable policy. I conclude by proposing several issues relevant to using an ontological security interpretation in future IR studies.


2021 ◽  
Vol 7 (Extra-B) ◽  
pp. 193-202
Author(s):  
Vasily Ivanovich Mladenov ◽  
Sergey Viktorovich Kononov ◽  
Yulia Victorovna Gavrilova ◽  
Ilona Valerievna Romanova

The research objective is a comparative analysis of the problems of religious threats in modern social security discourse in Western countries and Russia.  The methodological basis of the study is the phenomenological approach used in the process of explaining the meanings arising in the interaction of religion and society and the comparative approach aimed at analyzing the impact on the consciousness of believers in traditional and non-traditional religions. The result of the study is proof of the provision that the content of modern social discourse on the religious threat in the West is under the influence of a concept that separates the activities of religious organizations recognized as a security threat, and the content of religious doctrines not recognized as a threat. Another result is the statement that in Russia, the most socially influential concept reflects the problem of religious threats in the context of the friend-foe dichotomy, according to which non-traditional religious associations are considered to be the source of religious threats to social security.


Author(s):  
Abdul Rahim Anuar ◽  
Azhar Harun

The National Security Council of Malaysia has declared the east coast of Sabah as the Eastern Sabah Security Zone (ESSZONE) to inhibit security threats and enhance security in the east coast of Sabah. This study employed an in-depth interview with the stakeholders involved in security governance and development in the study area. The selection of stakeholders was based on expert sampling. Secondary data relating to maritime economic activities were also used to reinforce the findings of the in-depth interview. The study areas were Tawau (Sabah) and Sebatik Island. Sebatik Island is divided into two regions; the northern region is owned by Malaysia and the south is owned by Indonesia. This paper examined the impact of ESSZONE’s security policy toward economic activities in Tawau and Sebatik Island. The security policy implemented by the Eastern Sabah Security Command (ESSCOM) in Sabah’s east coast has a negative impact on maritime economic activities in Tawau and Pulau Sebatik. Therefore, the government must re-evaluate the security measures in Tawau and Pulau Sebatik waters, and the curfew regulations in particular, because the security threat is lower and more manageable than in Sandakan, Tawau, Kunak, Lahad Datu, Semporna, and Kinabatangan, which form the hot spot area. Furthermore, the government should consider appropriate measures to balance the objectives of security and economic interests, depending on the level of security threat zones.  


2021 ◽  
Vol 65 (11) ◽  
pp. 106-114
Author(s):  
O. Potyomkina

The article analyzes the impact of the Foreign Terrorist Fighters’ (FTF) phenomenon on the securitization of the European Union’s migration policy. The author follows the construction of the FTF as a serious security threat to the European Union’s strategies and action plans, and demonstrates the EU’s practical actions to respond the threat: criminalization of “suspicious travel”, strengthening border security, preliminary screening of asylum seekers at the border. The article pays special attention to the EU plans to achieve compatibility of the European Union information systems, while emphasizing new opportunities for the law enforcement bodies to access migration databases for combating terrorism. Exploring the new EU integration plan for migrants, the author notes that this is for the first time that the European Commission focuses its efforts not only on migrants, but also on the EU citizens with “migratory background”, which is undoubtedly dictated by a fear of the extremist ideology influence on young people. The article exposes certain similarities between the Commission’s methods to coordinate integration and inclusion of migrants, reintegration of the FTF and their families, which indicates that the migration policy is becoming a part of the EU security policy. That leads to a conclusion that securitization of migration policy aims not only and not so much at preventing the potential threat of the returnees’ terrorist activities, but at curbing migration flows as a whole and reducing the number of asylum seekers, in particular. Nevertheless, terrorism and migration seem to be closely linked in public discourse, despite the absence of an empirical basis to conclude that these factors directly influence each other. The author considers the most difficult problem of modern migration policy to be the definition of the red line beyond which its securitization can be justified.


Sign in / Sign up

Export Citation Format

Share Document