scholarly journals TRENDS IN CYBERSECURITY REGULATIONS OF TAIWAN (REPUBLIC OF CHINA) – Phases of Pro motion of major cyber security plans and programs in the National Cyber Security Program of Taiwan (2021–2024)

2021 ◽  
Vol 1 (80) ◽  
pp. 199-216
Author(s):  
Weronika Jakubczak ◽  
Hon-min Yau

The authors of the article focus on the main trends observed within cyber security regulations of Taiwan (Republic of China). In fact, Taiwanese governmental websites faced approximately 5 million attacks every day in 2021 [8]. Despite these attacks, the Taiwanese government operates in a steady way to improve its cyber capability, progressing on its cyber security increase path. The main document behind it in the form of strategic regulation is the National Cyber Security Program of Taiwan (NCSP 2021–2024). It explains the structure of the entities responsible for cyber security and describes both goals that have been accomplished and the ones that are/will be implemented. In particular, Taiwan focuses on providing higher cyber security protection standards, including critical infrastructure elements, private-public cooperation, the use of new technologies, and scouting for new talents. International collaboration is also highly valued as an example of joint cyber exercises between Taiwan and the USA in 2019.

2021 ◽  
Vol 11 (1) ◽  
pp. 68-79
Author(s):  
Vlad Daniel Savin ◽  

Digital Revolution has forced previously isolated networks of critical infrastructures to become more digitally integrated. Recent cyber-attacks, including Stuxnet and Wiper, have exposed a new set of cybersecurity vulnerabilities in this field. This new environment has forced previously isolated networks of critical infrastructures like utilities or power plants to become more digitally integrated. This paper offers a view into the most efficient current defense solutions. It also offers a glimpse into the need for the further development of new protection mechanisms developed on the emerging new technologies. The risks posed by the integration of Information Technology solutions with Operational Technology systems have been a key topic also at the latest World Economic Forum conference, where cyber-attacks of critical infrastructures were discussed in the context of the most significant risks for the upcoming decade. The findings of this paper are applicable to other industries. The paper aims to highlight that by initially understanding the vulnerabilities of the IT components and by taking the right cybersecurity preventive measures, critical infrastructure can be protected against these kinds of threats. The research framework behind this paper was directed towards analysing the cyber risks associated with the convergence between the Information Technology solutions with the Operational Technology systems of critical infrastructure.


Author(s):  
O. Yatchuk ◽  
N. Kodatska

<div><p><em>The article presents the dynamics of the main factors for the development of modern television, the transition from traditional technologies of television broadcasting to the latest technologies. The process of developing digital television and broadband has been technically determined to address the challenge of integrating new technologies into traditional TV content. Ways of expanding the possibilities of interaction between the viewer and the television producer in the context of overcoming the crisis of traditional technologies are analyzed. It is determined that integration, development of mobile communications and Internet technologies are a hallmark of the modern world media space and have a significant influence on the formation of public opinion. The analysis of actual media researches concerning problems of the theory of mass communication is carried out. The phenomenon of «social television», which combines watching TV with simultaneous communication in social networks, is considered. The author draws attention to the disclosure of the determining factors of media communication, the study of the process of feedback from viewers on television. It is stated that the development of modern technologies, namely digital broadcasting and introduction of broadband Internet access to create a multimedia platform that combines Internet communication services and television content, contributes to improving the mechanism of interaction between the TV and the viewer. The theory of the conceptualization of journalism based on identity construction is examined: journalists understand their audience and, as members of that audience, connect with their communities. An analysis of integrated journalistic activity is conducted, which consists of three stages: gathering, editing and disseminating information. It is determined that the influence of the Internet allows the consumer to play his or her role at each stage, thus helping the journalist determine the degree of relevance of the story to himself and to the potential audience. The common features of modern telecontent were singled out and a comparative analysis of the trend of development of interactive TV programs of the USA, UK and Ukraine was made.</em></p></div><p><strong><em>Key words:</em></strong><em> public opinion, two-vector communication, feedback, communication methods, television audience, country telephony.</em></p>


Healthcare ◽  
2021 ◽  
Vol 9 (4) ◽  
pp. 441
Author(s):  
Md. Mohaimenul Islam ◽  
Tahmina Nasrin Poly ◽  
Belal Alsinglawi ◽  
Li-Fong Lin ◽  
Shuo-Chen Chien ◽  
...  

The application of artificial intelligence (AI) to health has increased, including to COVID-19. This study aimed to provide a clear overview of COVID-19-related AI publication trends using longitudinal bibliometric analysis. A systematic literature search was conducted on the Web of Science for English language peer-reviewed articles related to AI application to COVID-19. A search strategy was developed to collect relevant articles and extracted bibliographic information (e.g., country, research area, sources, and author). VOSviewer (Leiden University) and Bibliometrix (R package) were used to visualize the co-occurrence networks of authors, sources, countries, institutions, global collaborations, citations, co-citations, and keywords. We included 729 research articles on the application of AI to COVID-19 published between 2020 and 2021. PLOS One (33/729, 4.52%), Chaos Solution Fractals (29/729, 3.97%), and Journal of Medical Internet Research (29/729, 3.97%) were the most common journals publishing these articles. The Republic of China (190/729, 26.06%), the USA (173/729, 23.73%), and India (92/729, 12.62%) were the most prolific countries of origin. The Huazhong University of Science and Technology, Wuhan University, and the Chinese Academy of Sciences were the most productive institutions. This is the first study to show a comprehensive picture of the global efforts to address COVID-19 using AI. The findings of this study also provide insights and research directions for academic researchers, policymakers, and healthcare practitioners who wish to collaborate in these domains in the future.


2021 ◽  
Vol 6 (1) ◽  
pp. e000729
Author(s):  
Alexandra M P Brito ◽  
Martin Schreiber

Traumatic injury is the leading cause of death in young people in the USA. Our knowledge of prehospital resuscitation is constantly evolving and is often informed by research based on military experience. A move toward balanced blood product resuscitation and away from excessive crystalloid use has led to improvements in outcomes for trauma patients. This has been facilitated by new technologies allowing more front-line use of blood products as well as use of tranexamic acid in the prehospital setting. In this article, we review current practices in prehospital resuscitation and the studies that have informed these practices.


2020 ◽  
Vol 102 (913) ◽  
pp. 367-387
Author(s):  
Massimo Marelli

AbstractDigitalization and new technologies have an increasingly important role in today's humanitarian activities. As humanitarian organizations become more active in and reliant on new and digital technologies, they evolve from being simple bystanders to being fully fledged stakeholders in cyberspace, vulnerable to adverse cyber operations that could impact on their capacity to protect and assist people affected by armed conflict or other situations of violence.This shift makes it essential for humanitarian organizations to understand and properly map their resulting cyber perimeter. Humanitarian organizations can protect themselves and their activities by devising appropriate cyber strategies for the digital environment. Clearly defining the digital boundaries within which they carry out operations lays the groundwork for humanitarian organizations to develop a strategy to support and protect humanitarian action in the digital environment, channel available resources to where they are most needed, and understand the areas in which their operational dialogue and working modalities need to be adapted for cyberspace.The purpose of this article is to identify the unique problems facing international humanitarian organizations operating in cyberspace and to suggest ways to address them. More specifically, the article identifies the key elements that an international humanitarian organization should consider in developing a cyber security strategy. Throughout, the International Committee of the Red Cross and its specificities are used as an example to illustrate the problems identified and the possible ways to address them.


1991 ◽  
Vol 9 (1) ◽  
pp. 52-54 ◽  
Author(s):  
Tomakazu Kogure ◽  
Keiichi Kodaira

AbstractThe Japanese National Large Telescope is an 8-metre class optical-infrared reflector with a monolithic thin meniscus mirror, to be constructed at the Mauna Kea summit, Hawaii. The JNLT will be characterised by high quality performance in the optical and infrared regions, achieved by adopting new technologies such as active mirror support, fast optics and a thermally controlled dome. In particular, high infrared qualities are regarded as the most important characteristics among various design goals.The JNLT project is now close to the final study phase before construction. This paper reviews the scientific motivations and the special technical features of the JNLT. Finally, the promotion of international collaboration around the JNLT is emphasised.


2021 ◽  
Author(s):  
Fabian Krause

Major CO2 emitters such as individual states of the USA, the People's Republic of China and the European Union continue to rely on emissions trading systems to reduce CO2 emissions. Against this background, this thesis examines four emissions trading systems in the USA. For this purpose, the legal and economic fundamentals of emissions trading are presented in detail. Subsequently, emissions trading systems are analyzed from an economic as well as a legal point of view based on criteria defined for this purpose and the results are embedded in the context of national and international law. For this purpose, the author conducts extensive basic research by processing the available emissions and trade data.


Sign in / Sign up

Export Citation Format

Share Document