Hybrid Challenges Require Hybrid, Scientifically Based, Responses

2020 ◽  
Vol 20 (1-2) ◽  
pp. 25-33
Author(s):  
Gordan Akrap

New security challenges are looking for new security paradigms in order that state and societies can successfully face with them on preventive level. Due to the rapid influence of hybrid threats to almost all areas of our lives today, we must change our attitude toward those problems and introduce and transform existing intelligence and security studies as a separate science in order to prepare our societies for security challenges that are already here.

2020 ◽  
Vol 1 (1) ◽  
pp. 65-83
Author(s):  
Božidar Forca ◽  
Dragoljub Sekulović ◽  
Igor Vukonjanski

Security is one of the most common terms in the modern world. This statement is supported by the fact that the term security is used in a wide range of areas. The subject of this paper is national security and the challenges, risks and threats to that security in contemporary international relations. The purpose of the work is twofold. First, to show the diversity of theoretical understanding of the term challenge, risk and threat by various authors. On the other hand, the overriding goal is to analyze the relationship to the challenges, risks and threats in different countries. When it comes to national security, challenges, risks and threats, most often, are identified in a document called the national security strategy. This document, as one of the highest in the hierarchy of political acts of every state, when it comes to security, is passed by almost all modern states of the world. The analysis of numerous national security strategies has revealed that it is possible to identify: 1) the challenges, risks and threats that appear in all strategies, 2) the challenges, risks and threats of security that appear in most strategies, and 3) the challenges, risks and threats of security which are country specific.


Author(s):  
Mariana S. Leone ◽  
Sergio Caballero

La seguridad en Latinoamérica ha sido abordada tradicionalmente desde una visión estatocéntrica y marcadamente realista, destacando las amenazas que sufre el Estado frente a un actor externo o frente a desestabilizaciones internas. Este artículo busca resaltar la idoneidad de introducir los estudios feministas de seguridad y la ética del cuidado en los análisis de seguridad, en aras de redefinir las amenazas y qué implica “sentirse seguro”, máxime en el escenario generado por la pandemia de la COVID-19. Para ello, se evidencian las lagunas y los silencios de las teorías dominantes a la hora de entender el agravamiento de los desafíos a la seguridad en los primeros seis meses de pandemia y cómo desde la ética del cuidado sí se incorporan esos matices y percepciones de seguridad. Se concluye que la ética del cuidado conlleva un ensanchamiento conceptual a la hora de analizar —académica y políticamente— las amenazas a la seguridad en Latinoamérica. Abstract Security in Latin America has traditionally been addressed from a state-centric and notable realistic perspective, underlining the threats to the state, from an external actor or from internal destabilization. This paper aims to highlight the suitability of incorporating Feminist Security Studies and Care Ethics in security analysis in order to redefine threats and what “feeling safe” implies, especially in the scenario generated by the COVID-19 pandemic. To this end, the gaps and silences in mainstream theories in the diagnoses on the worsening of the security challenges in the first semester of the pandemic are evidenced. Also, the nuances and perceptions of security included in the Care Ethics approach are highlighted. It is concluded that the conceptual broadening that the Care Ethics approach entails is relevant to analyze —academically and politically— the security threats in Latin America.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Ieva Berzina

AbstractThe article discusses the idea of comprehensive national defence from a wide historical and geographical perspective. Countries facing different security challenges have used the concept of involving the entire society in state defence. From a historical perspective, ‘total defence’, with an emphasis on military components, was used primarily by non-aligned states during the Cold War; the breakdown of the Soviet Union reduced the importance of ‘total defence’; however, the emergence of hybrid threats in the 21st century has contributed to the rebirth of the concept in the form of ‘comprehensive national defence’, for application in circumstances wherein potential adversaries use military and non-military means in an integrated manner.


2019 ◽  
Vol 26 (3) ◽  
pp. 851-874 ◽  
Author(s):  
Stephan Klose

This article argues that interactionist role theory holds much potential for complementing the ontological security literature in the field of International Relations. Concretely, the article argues that an interactionist role theory perspective promises to supplement the ontological security literature in at least two significant respects. First, it allows for a better understanding of how an international actor’s (capacity to provide) ontological security is tied to its ability to realize its ‘self’ in society through the making and playing of roles (and the subsequent casting of others). Second, it emphasizes how reflective intelligence enables an international actor to address destabilizing disconnects between its ‘self’-image and societal role-play, and to develop a measure of ontological resilience (a capacity to constructively engage with – and to recover from – ontological security challenges). To illustrate this argument, the article provides a case study, which explores, from an interactionist role theory perspective, how the European Union’s ontological security has been strengthened, challenged and restored in its interaction with its Southern and Eastern Neighbourhood.


2016 ◽  
Vol 15 (4) ◽  
pp. 31
Author(s):  
Udai Rao

The Indian Ocean Region has today emerged as the most important region of strategic concern. With India and China trying to establish their clout over this region and using it to propel themselves to the title of a Superpower. Indian Ocean becomes an interesting site for maritime security studies. This article attempts to trace the different areas of concern for all the stakeholders involved in the management of this sub-regional maritime security challenge. Maritime cooperation and security would ensure secure and safe seas which in turn would allow resurgence of our economies in a mutually beneficial manner. The sub-regional grouping with Maldives and Sri Lanka has to transcend beyond the South Asia sphere,  encompassing  Seychelles and Mauritius and would be a ‘Bottom Up Approach’ to shaping the maritime strategic environment in the Indian ocean.


2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Ayaz Khan

Globalization has affected the education sector of Pakistan differently because of its peculiar and diversed security challenges. An extremely cunning hostile enemy on east who always stages all kind of clandestine operations against Pakistan. On the western border, Afghanistan has always remained a source of instability for Pakistan. US policy failures in Afghanistan and do more demand by Trump administration from Pakistan without acknowledging its sacrifices are a matter of concern. To retain their national interests transition-co forces are using fifth generation asymmetric warfare in this region. Almost all the segments of our society got affected by worst kind of terrorism and extremism in last fifteen years and the current target is our youth and educational institutes. According to the recent National Human Development Report published in May 2018, Pakistan has the largest percentage of youth ever recorded in its history. 64 percent of the total population is below the age of 30 while 29 percent is between the ages of 15 and 29 years. This youth buldge has critical implications for Pakistan because if not groomed and directed in right direction, will create internal implosion. Our enemy precisely identified our centers of gravity and attacking it with numerous means. Be it the Safora Ghot Karachi massacre of forty three innocent unarmed people by Saad Aziz - an Institute of Business Administration (IBA) Karachi graduate or the inhuman killing of human rights activist Sabeen Mahmood by the same man; the IS-indoctrinated and affiliated medical student Noreen Leghari’s case or the recent failed attempt on the MQM leader Khawaja Izharul Hassan by a Karachi University graduate, the incessant reality for Pakistani anti-terrorism strategists is that the extremists and terrorists have succeeded in infiltrating modern education institutions and the youth is being indoctrinated with the toxic ideology of the terrorists. With the defeat of the IS in Syria and Iraq the influx of militants to Pakistan could continue that could further complicate the situation.


Author(s):  
Jaya Singh ◽  
Ashish Maruti Gimekar ◽  
S. Venkatesan

Big Data is a very huge volume of data which is beyond the storage capacity and processing capability of traditional system. The volume of data is increasing at exponential rate. Therefore, there is the need of such mechanism to store and process such high volume of data. The impressiveness of the Big data lies with its major applicability to almost all industries. Therefore, it represents both, the tremendous opportunities and complex challenges. Such omnipotent eminence leads to the privacy and security related challenges to the big data. Nowadays, security of big data is mainly focused by every organization because it contains a lot of sensitive data and useful information for taking decisions. The hostile nature of digital data itself has certain inherited security challenges. The aim of Big data security is to identify security issues and to find the better solution for handling security challenges. The observation and analysis of different security mechanism related to the issues of big data and their solutions are focused in this chapter.


2019 ◽  
Vol 19 (1) ◽  
pp. 133-164
Author(s):  
Anuj Kumar Singh ◽  
B. D. K. Patro

Abstract Security has been a primary concern in almost all areas of computing and for the devices that are low on computing power it becomes more important. In this paper, a new class of computing device termed as Low Computing Power Device (LCPD) has been defined conceptually. The paper brings out common attributes, security requirements and security challenges of all kinds of low computing power devices in one place so that common security solutions for these can be designed and implemented rather than doing this for each individual device type. A survey of existing recent security solutions for different LCPDs hasve been presented here. This paper has also provided possible security solutions for LCPDs which include identification of countermeasures against different threats and attacks on these devices, and choosing appropriate cryptographic mechanism for implementing the countermeasures efficiently.


Web Services ◽  
2019 ◽  
pp. 13-24
Author(s):  
Jaya Singh ◽  
Ashish Maruti Gimekar ◽  
S. Venkatesan

Big Data is a very huge volume of data which is beyond the storage capacity and processing capability of traditional system. The volume of data is increasing at exponential rate. Therefore, there is the need of such mechanism to store and process such high volume of data. The impressiveness of the Big data lies with its major applicability to almost all industries. Therefore, it represents both, the tremendous opportunities and complex challenges. Such omnipotent eminence leads to the privacy and security related challenges to the big data. Nowadays, security of big data is mainly focused by every organization because it contains a lot of sensitive data and useful information for taking decisions. The hostile nature of digital data itself has certain inherited security challenges. The aim of Big data security is to identify security issues and to find the better solution for handling security challenges. The observation and analysis of different security mechanism related to the issues of big data and their solutions are focused in this chapter.


2016 ◽  
pp. 8-25
Author(s):  
Aleksandra Kułaga

This article presents the theories of critical security studies of the Copenhagen, Welsh and Paris schools approach. An important concept presented by researchers form the Copenhagen School is securitisation. It involves the transfer of security challenges to the category of threats. Classical realism is criticised for privileging military aspects, and the assumption that the state is the only referent object of security. The author claims that classical theory does not respond to the challenges of the XXI century. Today, economic factors are gaining importance, and they consist of the issues related to security of the energy sector, trade cooperation and technological advancement. The subject of this article is describing the objectives, methods and measures to ensure security of the political community, in the light of critical security studies. The author shows that the conduct of such research is necessary. Critical studies complement traditional theories with important safety features that cannot be ignored in the era of a changing reality in the international arena.


Sign in / Sign up

Export Citation Format

Share Document