scholarly journals Analýza bezpečnostní politiky během Mistrovství světa ve fotbale 2014 v Brazílii

2015 ◽  
Vol 9 (2) ◽  
pp. 29-45
Author(s):  
Jakub Šiman ◽  
Josef Smolík

The case study analyzes the security policy of FIFA 2014 World Cup in Brazil. This study aims to present the greatest risks associated with organizing events of such magnitude and analyze strategic Brazils approach to ensure security during the championship. Among the biggest security risks of the championship were classified areas as terrorism, crime, social protests, spectator violence and hooliganism, cyber threats and health hazards. The paper also focuses on the actual process of championships and the consequences which brought about.

2020 ◽  
pp. 69-76
Author(s):  
O. Klevtsov ◽  
A. Symonov ◽  
S. Trubchaninov

The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2016 ◽  
pp. 100-128
Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2021 ◽  
pp. 1-21
Author(s):  
Andrea Ghiselli ◽  
Pippa Morgan

Abstract The nexus between China's human and economic presence abroad and its security policy is increasingly important. Within this nexus, this study statistically explores whether and to what extent Chinese contractors reduce the number of Chinese nationals they send to work in North Africa, the Middle East and the Horn of Africa when the security situation in host states worsens. We find no significant evidence that either warnings from Chinese embassies and consulates to leave host countries or expert perceptions of host stability influence the number of Chinese workers. Worker numbers appear to decrease significantly only in the aftermath of large-scale violent events. These findings suggest that Chinese companies are relatively acceptant of security risks and uncertainties, despite the decade-long regulatory efforts of the Chinese government to make them more security-conscious overseas and, thus, to reduce pressure to use diplomatically and economically expensive military means for their protection.


2014 ◽  
Vol 28 (1) ◽  
pp. 60-74 ◽  
Author(s):  
Ken Hodge ◽  
Graham Henry ◽  
Wayne Smith

This case study focused on the New Zealand All Blacks rugby team during the period from 2004 to 2011, when Graham Henry (head coach) and Wayne Smith (assistant coach) coached and managed the team. More specifically, this case study examined the motivational climate created by this coaching group that culminated in winning the Rugby World Cup in 2011. In-depth interviews were completed with Henry and Smith in March 2012. A collaborative thematic content analysis revealed eight themes, regarding motivational issues and the motivational climate for the 2004–2011 All Blacks team: (i) critical turning point, (ii) flexible and evolving, (iii) dual-management model, (iv) “Better People Make Better All Blacks,” (v) responsibility, (vi) leadership, (vii) expectation of excellence, and (viii) team cohesion. These findings are discussed in light of autonomy-supportive coaching, emotionally intelligent coaching, and transformational leadership. Finally, practical recommendations are offered for coaches of elite sports teams.


Sign in / Sign up

Export Citation Format

Share Document