security threat
Recently Published Documents


TOTAL DOCUMENTS

1018
(FIVE YEARS 474)

H-INDEX

21
(FIVE YEARS 5)

2022 ◽  
Vol 2 ◽  
pp. 8
Author(s):  
Rubén Arcos ◽  
Manuel Gertrudix ◽  
Cristina Arribas ◽  
Monica Cardarilli

The dissemination of purposely deceitful or misleading content to target audiences for political aims or economic purposes constitutes a threat to democratic societies and institutions, and is being increasingly recognized as a major security threat, particularly after evidence and allegations of hostile foreign interference in several countries surfaced in the last five years. Disinformation can also be part of hybrid threat activities. This research paper examines findings on the effects of disinformation and addresses the question of how effective counterstrategies against digital disinformation are, with the aim of assessing the impact of responses such as the exposure and disproval of disinformation content and conspiracy theories. The paper’s objective is to synthetize the main scientific findings on disinformation effects and on the effectiveness of debunking, inoculation, and forewarning strategies against digital disinformation. A mixed methodology is used, combining qualitative interpretive analysis and structured technique for evaluating scientific literature such as a systematic literature review (SLR), following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) framework.


2022 ◽  
Vol 1 ◽  
Author(s):  
Kirsten Nettles ◽  
Cameron Ford ◽  
Paola A. Prada-Tiedemann

The early detection and location of firearm threats is critical to the success of any law enforcement operation to prevent a mass shooting event or illegal transport of weapons. Prevention tactics such as firearm detection canines have been at the front line of security tools to combat this national security threat. Firearm detection canines go through rigorous training regimens to achieve reliability in the detection of firearms as their target odor source. Currently, there is no scientific foundation as to the chemical odor signature emitted from the actual firearm device that could aid in increased and more efficient canine training and performance protocols or a better understanding of the chemistry of firearm-related odorants for better source identification. This study provides a novel method application of solid phase microextraction-gas chromatography-mass spectrometry (SPME-GC-MS) as a rapid system for the evaluation of odor profiles from firearm devices (loaded and unloaded). Samples included magazines (n = 30) and firearms (n = 15) acquired from the local law enforcement shooting range. Headspace analysis depicted five frequently occurring compounds across sample matrices including aldehydes such as nonanal, decanal, octanal and hydrocarbons tetradecane and tridecane. Statistical analysis via principal component analysis (PCA) highlighted a preliminary clustering differentiating unloaded firearms from both loaded/unloaded magazines and loaded firearm devices. These results highlight potential odor signature differences associated with different firearm components. The understanding of key odorants above a firearm will have an impact on national security efforts, thereby enhancing training regimens to better prepare canine teams for current threats in our communities.


2022 ◽  
pp. 122-137
Author(s):  
Muhammad Anshari ◽  
Mohammad Nabil Almunawar ◽  
Abdullah Al-Mudimigh

The digital marketplace is a major competitor now for the conventional marketplace especially in Southeast Asian countries (ASEAN) where digital marketplaces are booming and developing at an aggressive rate. The study also focuses on the challenges of eBay as a leading digital marketplace in battling their privacy and security threat, handling customer complaints about their services, or how government intervention provides an impact to their business, and competing with similar service provides. The other challenges are also associated with geographical distribution for marketing strategic location and why eBay should maintain their business like any other conventional business practices. Finally, the authors explore how concerned they are towards customer service as fundamental for any business.


2022 ◽  
Vol 13 (1) ◽  
pp. 0-0

Any vulnerability in the software creates a software security threat and helps hackers to gain unauthorized access to resources. Vulnerability prediction models help software engineers to effectively allocate their resources to find any vulnerable class in the software, before its delivery to customers. Vulnerable classes must be carefully reviewed by security experts and tested to identify potential threats that may arise in the future. In the present work, a novel technique based on Grey wolf algorithm and Random forest is proposed for software vulnerability prediction. Grey wolf technique is a metaheuristic technique and it is used to select the best subset of features. The proposed technique is compared with other machine learning techniques. Experiments were performed on three datasets available publicly. It was observed that our proposed technique (GW-RF) outperformed all other techniques for software vulnerability prediction.


2021 ◽  
Vol 2 (2) ◽  
pp. 255-270
Author(s):  
Kishwar Munir ◽  
Iram Khalid ◽  
Wajeeh Shahrukh

Pakistan and India are water stressed countries and the seed of water conflict between the two has been sowed by the Punjab boundary commission at the time of Partition. Trans-boundary water treaties have played a significant role in resolving the water disputes though the mechanism of conflict resolution varies and structurally fails to address the future problems that may arise. Indus Water Treaty (IWT) has been examined as an efficacious Model of conflict resolution and induced cooperation from 1960s to 1980s. Pakistan claimed that India is violating IWT by building dams and diverting waters of Western Rivers flowing from India to Pakistan. Therefore, the research attempts to answer the following questions. What is the cumulative effect of Indian dams being constructed on the Western Rivers? Can India Unilaterally withdraw the treaty? What would be the implications if India violates the treaty? Holistic content analysis of qualitative method and conflict theory has been used to investigate the water conflict between Pakistan and India. The key findings are that violation of treaty by India is perceived as security threat by Pakistan and also increase its economic concerns. The tension between the two neighbours over water sharing can lead to water war which poses serious threats to regional peace and security.


Poligrafi ◽  
2021 ◽  
pp. 261-287
Author(s):  
Gökçe Balaban

How could one account for the discourse of security used by the Turkish state considering the Kurdish issue before 1984, when the terrorist attacks of the Partiya Karkaren Kurdistani (PKK) had not yet started, and hence there was no physical security threat against the state? This article aims to answer this question from the perspective of ontological (in)security. Based on Critical Discourse Analysis of state discourse, the article argues that the political, social and cultural traits of Kurdish identity created uncertainty in the Turkish self after the Sheikh Said rebellion in 1925. Tribal/religious structures that were influential among Kurds and the expression of Kurdishness as a distinct identity disrupted the autobiographical narratives about Turkishness, hence generating ontological insecurity for the Turkish state. To overcome this problem, the state relied on security discourse and securitized the traits of Kurdish identity, by which it felt threatened. As a result of this securitization, the state was able to legitimize the extraordinary measures taken against Kurds, such as forced resettlements. Securitization, in this sense, regenerated ontological security for the state, because the extraordinary measures served to suppress the Kurdish identity that threatened the certainty and continuity of the Turkish self.


2021 ◽  
Vol 9 (2) ◽  
pp. 137-156
Author(s):  
Gizela Brutovská ◽  
Matúš Béreš

Radicalisation of young people is a gradual process. Emptiness in a form of distrust has spread into all areas of human life (work, family, church, etc.) and has led to indifference and passivity. This, coupled with young person’s disintegration in terms of values and norms (disintegration) and social isolation (disorganization), prompts some sort of revolt. Losing footing in many life situations, the young person resorts to expressions of anger, which, if left unresolved, gradually grows into aggression and violence. The paper aims to identify and describe the sources of anger and frustration of young radicals in Slovakia. It also outlines the most common targets of their aggression. Close attention is paid to Slovak conscripts (Slovenskí branci), one of the radical groups in Slovakia. The Slovak Ministry of Defence regards this paramilitary group as a security threat. The theoretical part of the paper is based on works of sociologists who introduce the concept of indifferent society (Lipovetsky 2008) and examine barriers that hinder young people’s integration (Durkheim 1973). Defining aggression and violence that originate in anger is based on Arendt’s study (2004). The empirical part of the paper is a result of the qualitative research conducted among young radicals, aged 14-17 in Slovakia in a form of case studies. Keywords: indifference, disintegration, revolt, anger, aggression


2021 ◽  
Vol 21 (4) ◽  
pp. 772-784
Author(s):  
Yury V. Borovsky

In the early 2020s the worlds transition from carbon-intensive to climate-neutral energy use has already become a discernible and a difficult-to-reverse process. With Joe Bidens election as US president, the United States have returned to the Paris Climate Agreement and have become a key driver of this process (along with the EU and China). As a result, the international community has reached a consensus on the ongoing energy transition. This process will require considerable effort and may take several decades. Nevertheless, the impact of energy transition on traditional approaches to energy security, which emerged largely as a result of the global oil crises of the 1970s and 1980s and are centered around the supply of fossil fuels, is already a relevant research topic. This problem is examined relying on the relevant terminological, theoretical and factual material. The article concludes that energy transition will ultimately undermine the carbon paradigm that has underpinned energy security policies since the 1970s. Rapid development of renewable and other low-carbon energy sources will certainly remove key energy security risks of energy importers and, possibly, allow them to achieve energy independence. However, a post-carbon era may also generate new risks. For countries that rely heavily on oil, gas and coal exports, energy transition will result in the loss of markets and revenues. It may present an energy security threat for them as well as it will require a costly and technologically complex process of the energy sector decarbonization. Some exporters, especially those with high fuel rents and insufficient financial reserves, may face serious economic and social upheavals as a result of energy transition. The EU and the US energy transition policies reflect provisions of all three fundamental international relations theoretical paradigms, including realism. This means that the EU and the US policy, aimed at promoting climate agenda, may be expected to be rather tough and aggressive. China as the third key player in energy transition is still following a liberal course; however, it may change in the future.


2021 ◽  
pp. 003288552110691
Author(s):  
Ryan M. Labrecque

Prison officials often rely on restrictive housing to promote institutional safety and security. However, a growing body of research indicates this type of confinement has little impact on inmate behavior or institutional order. An alternative approach involves providing the most dangerous and disruptive inmates with increased case management services and other proactive programmatic opportunities. The success of this strategy requires an ability to prospectively and accurately identify the most problematic inmates. The results of this study indicate that Risk Assessment for Segregation Placement (RASP) and its revised Oregon version (RASP-OR) are valid predictors of segregation placement and institutional misconduct. The policy implications of these findings are discussed.


PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0261431
Author(s):  
Fakir Sharif Hossain ◽  
Taiyeb Hasan Sakib ◽  
Muhammad Ashar ◽  
Rian Ferdian

Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is unbreakable in a software platform’s reasonable time. AES has been proved to be the most robust symmetric encryption algorithm declared by the USA Government. Its hardware implementation offers much higher speed and physical security than that of its software implementation. The testability and hardware Trojans are two significant concerns that make the AES chip complex and vulnerable. The problem of testability in the complex AES chip is not addressed yet, and also, the hardware Trojan insertion into the chip may be a significant security threat by leaking information to the intruder. The proposed method is a dual-mode self-test architecture that can detect the hardware Trojans at the manufacturing test and perform an online parametric test to identify parametric chip defects. This work contributes to partitioning the AES circuit into small blocks and comparing adjacent blocks to ensure self-referencing. The detection accuracy is sharpened by a comparative power ratio threshold, determined by process variations and the accuracy of the built-in current sensors. This architecture can reduce the delay, power consumption, and area overhead compared to other works.


Sign in / Sign up

Export Citation Format

Share Document