security issue
Recently Published Documents


TOTAL DOCUMENTS

542
(FIVE YEARS 247)

H-INDEX

16
(FIVE YEARS 4)

2021 ◽  
pp. 575-580
Author(s):  
Yuliia Tatarinova ◽  
Olha Sinelnikova

Prioritizing bug fixes becomes a daunting task due to the increasing number of vulnerability disclosure programs.  When making a decision, not only the Common Vulnerability Scoring System (CVSS) but also the probability of exploitation, the trend of particular security issues should be taken into account. This paper aims to discuss the sources and approaches for measuring degree of interest in a specific vulnerability at a particular point in real-time. This research presents а new metric and estimation model which is based on vulnerability assessment. We compared several techniques to determine the most suitable approach and relevant sources for improving vulnerability management and prioritization problems. We chose the Google Trend analytics tool to gather trend data, distinguish main features and build data set. The result of this study is the regression equation which helps efficiently prioritize vulnerabilities considering the public interest in the particular security issue. The proposed method provides the popularity estimation of Common Vulnerabilities and Exposures (CVE) using public resources.


2021 ◽  
Vol 4 (3) ◽  
pp. 91-112
Author(s):  
Haesoo Yang

China is challenging the hegemony of the United States through its economic power, creating the so-called New Cold War. The consequent conflict between the US and China can cause selective coercion in South Korea. South Korea is highly dependent on the United States militarily and on China economically. In a conflict, if Korea is asked for selective support, there will be a dilemma in policymaking. Accordingly, I studied the geopolitical dilemma in South Korea resulting from the US–China competition and six security issues . I was able to identify six conflict factors related to Korean security: the North Korean nuclear problem, the role of US forces in South Korea, friction due to protectionism, the battle for the semiconductor market, the formation of the Pacific Coast Council, and the discharge of contaminated water from nuclear power plants in Japan. I examined the flexible survival strategies that Korea could choose for each security issue. I expected policy utility by dividing it into military, economic, and diplomatic fields.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Yahya Khan ◽  
Ali Algarni ◽  
Aisha Fayomi ◽  
Abdullah M. Almarashi

Hackers reveal sensitive information from encrypted conversations as the globe has become one community. As a result, steganography and cryptography are used together to safeguard sensitive data more effectively than previous approaches and newly developed algorithms. A double-secure algorithm for text steganography (DSTS) is the safest approach compared to the paragraph hiding method (PHM) and capital alphabet shape encoding (CASE) method. In this context, the paragraph hiding method uses ASCII coding, which is not a standard method, and the CASE method has a security issue that if someone understands its applicability, it can be easily attacked. DSTS algorithm overcomes its limitations by using UTF-16 coding and enhances the security of CASE with a one-time pad (OTP). The one-time pad is a theoretically unbreakable cryptographic method. Still, it is not feasible for long messages, however, it is usable for short messages such as a password or intelligence agency’s more secure messages. DSTS degrades the average hiding capacity in a PHM from 2.06% to 1% due to UTF-16 coding. Using the UTF-8 method, the authors have improved MDSTS and the CMPHM by 6.49% and 7.76% hiding capacity, which outperforms in existing procedures; in the CMPHM, there is one reason for the improvement in hiding capacity is using the LZW compression method. CMHPM algorithm optimization standard deviation is less than that of the HPM, DSTS, and MDSTS, ultimately increasing speed.


2021 ◽  
pp. 1532673X2110532
Author(s):  
Jason Gainous ◽  
Melissa K. Merry

Research suggests that framing climate change as a national security issue can shape opinion about climate change. This research is less clear about what exactly constitutes a “national security frame” and what aspects of this frame are most persuasive. We use a survey experiment to compare the relative effects of three types of national security frames we identify. Results show that a frame centered on energy dependence had the strongest effect and was the most consistent across partisanship. Surprisingly, the effects ran in the opposite direction for Democrats and Republicans on both outcomes—negative for Democrats and positive for Republicans. We also show that the energy dependence frame moderated the influence of respondents’ affect toward political candidates and parties on their climate change attitudes. The results suggest that the energy dependence frame can shape public opinion, but that it must be tailored to particular audiences to avoid backfire effects.


2021 ◽  
pp. 0095327X2110494
Author(s):  
Orlandrew E. Danzell ◽  
Jacob A. Mauslein ◽  
John D. Avelar

Weak coastal states often lack an adequate, sustained naval presence to monitor and police their territorial waters. Unpatrolled waters, both territorial and otherwise, may provide pirates with substantial financial opportunities that go far beyond any single country. Maritime piracy costs the global economy on average USD 24 billion per year. This research explores the impact of naval bases on acts of piracy to determine if naval presence can decrease the likelihood of piracy. To examine this important economic and national security issue, our research employs a zero-inflated negative binomial regression model. We also rely upon a newly constructed time-series dataset for the years 1992–2018. Our study shows that the presence of naval bases is essential in helping maritime forces combat piracy. Policymakers searching for options to combat piracy should find the results of this study especially useful in creating prescriptive approaches that aid in solving offshore problems.


2021 ◽  
Vol 10 (2) ◽  
pp. 368-381
Author(s):  
Lisa Belmiro Camara ◽  
Bruna Letícia Marinho Pereira ◽  
Tomaz Espósito Neto

For the last decades, it was observed that the migration subject was addressed as a security issue due to a social construction proposed by the state that sees immigrants as a threat to security, in which they are subconsciously considered as “the other”. Thus, migration issues started to be analyzed under the security bias, which resulted in the topic being securitized instead of politicized and discussed by all sectors of society and under the human rights scope. In 2006 the United Nations Human Rights Council created the Universal Periodic Review (UPR) mechanism, which allows all UN member states to have their human rights situations reviewed every four years and a half. In this respect, the paper aims at presenting how the UPR mechanism may be a tool to desecuritize the migration subject by using Spain as a study case, which is the country that receives more recommendations about migrants among all UN member states. Therefore, the research focuses on a comprehensive evaluation of documents on Spain outcomes in the first two UPR cycles, in order to identify the main recommendations about the migration subject and to understand the interventions related to Spain's position on accepting or not such recommendations. The purpose here is to check the effectiveness of the UPR as a tool that may contribute to the desecuritization of the migration subject under the human rights perspective. The research focuses on a review of documents and bibliographic references, with a qualitative approach and exploratory nature. The initial result points out that the interactive discussion promoted by the UPR mechanism can help support to desecuritize the migrant issue.


Author(s):  
Sidik Jatmika ◽  
Yogaswara Aji Pratama ◽  
Dama Rifki Adhipramana

This article aims to examine food security issue among the community at the Indonesia - Malaysia border at Pandemic COVID-19 era by using the theory of interdependence and the human security approach. The study is conducted using a qualitative research method to collect and analyze both primary and secondary data. Primary data were obtained through official documents and an in-depth interview with key informants among Indonesia households of the communities in Indonesia - Malaysia border and local leaders. Meanwhile, published materials and online documents such as books, journal articles and reports served as a secondary source of data. The findings indicate that pandemics COVID-19 create vulnerability to food insecurity at border community. Realizing this fact, the government should consider adopting the human security concept, which emphasizes community empowerment as a framework in policymaking, with the aims to eradicate food insecurity among vulnerable households and to ensure the well-being of every Indonesian.


Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2830
Author(s):  
Mitra Pooyandeh ◽  
Insoo Sohn

The network edge is becoming a new solution for reducing latency and saving bandwidth in the Internet of Things (IoT) network. The goal of the network edge is to move computation from cloud servers to the edge of the network near the IoT devices. The network edge, which needs to make smart decisions with a high level of response time, needs intelligence processing based on artificial intelligence (AI). AI is becoming a key component in many edge devices, including cars, drones, robots, and smart IoT devices. This paper describes the role of AI in a network edge. Moreover, this paper elaborates and discusses the optimization methods for an edge network based on AI techniques. Finally, the paper considers the security issue as a major concern and prospective approaches to solving this issue in an edge network.


2021 ◽  
Author(s):  
◽  
Ha Thi Thuy Nguyen

<p>Humanitarian Assistance and Disaster Relief (HADR) has never received as much attention from the world’s leaders as it does today. This is because in addition to causing economic losses, disasters -both natural and man-made - have increasingly impacted on the quality of human life and human dignity. Disasters have become ‘securitized’ and have become increasingly understood as part of a ‘non-traditional’ security (NTS) agenda. The goal of disaster reduction and mitigation has become a greater priority for governments. In the wake of the 2004 Indian Ocean tsunami, ASEAN countries have paid greater attention to HADR as a non-traditional security issue. HADR is one item under the ASEAN Socio Cultural Community, whose aim is to contribute to building a people-oriented and socially responsible ASEAN Community. HADR has also become the subject of various cooperation activities and mechanisms among regional and extra-regional countries, including the ASEAN Regional Forum (ARF) and the ASEAN Defense Ministers Meeting (ADMM). As a disaster-prone country, Vietnam has an interest in cooperating with regional states in dealing with, combating, preventing and reducing disasters. Active participation in regional HADR activities provides Vietnam with the chance to deal with its own natural disasters, and creates opportunities for Vietnam to pursue its wider objective of a open, diversified and multilateralized foreign policy.</p>


Sign in / Sign up

Export Citation Format

Share Document