security threat
Recently Published Documents


TOTAL DOCUMENTS

1018
(FIVE YEARS 474)

H-INDEX

21
(FIVE YEARS 5)

2022 ◽  
Vol 2 ◽  
pp. 8
Author(s):  
Rubén Arcos ◽  
Manuel Gertrudix ◽  
Cristina Arribas ◽  
Monica Cardarilli

The dissemination of purposely deceitful or misleading content to target audiences for political aims or economic purposes constitutes a threat to democratic societies and institutions, and is being increasingly recognized as a major security threat, particularly after evidence and allegations of hostile foreign interference in several countries surfaced in the last five years. Disinformation can also be part of hybrid threat activities. This research paper examines findings on the effects of disinformation and addresses the question of how effective counterstrategies against digital disinformation are, with the aim of assessing the impact of responses such as the exposure and disproval of disinformation content and conspiracy theories. The paper’s objective is to synthetize the main scientific findings on disinformation effects and on the effectiveness of debunking, inoculation, and forewarning strategies against digital disinformation. A mixed methodology is used, combining qualitative interpretive analysis and structured technique for evaluating scientific literature such as a systematic literature review (SLR), following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) framework.


2022 ◽  
Vol 1 ◽  
Author(s):  
Kirsten Nettles ◽  
Cameron Ford ◽  
Paola A. Prada-Tiedemann

The early detection and location of firearm threats is critical to the success of any law enforcement operation to prevent a mass shooting event or illegal transport of weapons. Prevention tactics such as firearm detection canines have been at the front line of security tools to combat this national security threat. Firearm detection canines go through rigorous training regimens to achieve reliability in the detection of firearms as their target odor source. Currently, there is no scientific foundation as to the chemical odor signature emitted from the actual firearm device that could aid in increased and more efficient canine training and performance protocols or a better understanding of the chemistry of firearm-related odorants for better source identification. This study provides a novel method application of solid phase microextraction-gas chromatography-mass spectrometry (SPME-GC-MS) as a rapid system for the evaluation of odor profiles from firearm devices (loaded and unloaded). Samples included magazines (n = 30) and firearms (n = 15) acquired from the local law enforcement shooting range. Headspace analysis depicted five frequently occurring compounds across sample matrices including aldehydes such as nonanal, decanal, octanal and hydrocarbons tetradecane and tridecane. Statistical analysis via principal component analysis (PCA) highlighted a preliminary clustering differentiating unloaded firearms from both loaded/unloaded magazines and loaded firearm devices. These results highlight potential odor signature differences associated with different firearm components. The understanding of key odorants above a firearm will have an impact on national security efforts, thereby enhancing training regimens to better prepare canine teams for current threats in our communities.


2022 ◽  
pp. 122-137
Author(s):  
Muhammad Anshari ◽  
Mohammad Nabil Almunawar ◽  
Abdullah Al-Mudimigh

The digital marketplace is a major competitor now for the conventional marketplace especially in Southeast Asian countries (ASEAN) where digital marketplaces are booming and developing at an aggressive rate. The study also focuses on the challenges of eBay as a leading digital marketplace in battling their privacy and security threat, handling customer complaints about their services, or how government intervention provides an impact to their business, and competing with similar service provides. The other challenges are also associated with geographical distribution for marketing strategic location and why eBay should maintain their business like any other conventional business practices. Finally, the authors explore how concerned they are towards customer service as fundamental for any business.


2022 ◽  
Vol 13 (1) ◽  
pp. 0-0

Any vulnerability in the software creates a software security threat and helps hackers to gain unauthorized access to resources. Vulnerability prediction models help software engineers to effectively allocate their resources to find any vulnerable class in the software, before its delivery to customers. Vulnerable classes must be carefully reviewed by security experts and tested to identify potential threats that may arise in the future. In the present work, a novel technique based on Grey wolf algorithm and Random forest is proposed for software vulnerability prediction. Grey wolf technique is a metaheuristic technique and it is used to select the best subset of features. The proposed technique is compared with other machine learning techniques. Experiments were performed on three datasets available publicly. It was observed that our proposed technique (GW-RF) outperformed all other techniques for software vulnerability prediction.


2021 ◽  
Vol 2 (2) ◽  
pp. 255-270
Author(s):  
Kishwar Munir ◽  
Iram Khalid ◽  
Wajeeh Shahrukh

Pakistan and India are water stressed countries and the seed of water conflict between the two has been sowed by the Punjab boundary commission at the time of Partition. Trans-boundary water treaties have played a significant role in resolving the water disputes though the mechanism of conflict resolution varies and structurally fails to address the future problems that may arise. Indus Water Treaty (IWT) has been examined as an efficacious Model of conflict resolution and induced cooperation from 1960s to 1980s. Pakistan claimed that India is violating IWT by building dams and diverting waters of Western Rivers flowing from India to Pakistan. Therefore, the research attempts to answer the following questions. What is the cumulative effect of Indian dams being constructed on the Western Rivers? Can India Unilaterally withdraw the treaty? What would be the implications if India violates the treaty? Holistic content analysis of qualitative method and conflict theory has been used to investigate the water conflict between Pakistan and India. The key findings are that violation of treaty by India is perceived as security threat by Pakistan and also increase its economic concerns. The tension between the two neighbours over water sharing can lead to water war which poses serious threats to regional peace and security.


Poligrafi ◽  
2021 ◽  
pp. 261-287
Author(s):  
Gökçe Balaban

How could one account for the discourse of security used by the Turkish state considering the Kurdish issue before 1984, when the terrorist attacks of the Partiya Karkaren Kurdistani (PKK) had not yet started, and hence there was no physical security threat against the state? This article aims to answer this question from the perspective of ontological (in)security. Based on Critical Discourse Analysis of state discourse, the article argues that the political, social and cultural traits of Kurdish identity created uncertainty in the Turkish self after the Sheikh Said rebellion in 1925. Tribal/religious structures that were influential among Kurds and the expression of Kurdishness as a distinct identity disrupted the autobiographical narratives about Turkishness, hence generating ontological insecurity for the Turkish state. To overcome this problem, the state relied on security discourse and securitized the traits of Kurdish identity, by which it felt threatened. As a result of this securitization, the state was able to legitimize the extraordinary measures taken against Kurds, such as forced resettlements. Securitization, in this sense, regenerated ontological security for the state, because the extraordinary measures served to suppress the Kurdish identity that threatened the certainty and continuity of the Turkish self.


2021 ◽  
Vol 9 (2) ◽  
pp. 137-156
Author(s):  
Gizela Brutovská ◽  
Matúš Béreš

Radicalisation of young people is a gradual process. Emptiness in a form of distrust has spread into all areas of human life (work, family, church, etc.) and has led to indifference and passivity. This, coupled with young person’s disintegration in terms of values and norms (disintegration) and social isolation (disorganization), prompts some sort of revolt. Losing footing in many life situations, the young person resorts to expressions of anger, which, if left unresolved, gradually grows into aggression and violence. The paper aims to identify and describe the sources of anger and frustration of young radicals in Slovakia. It also outlines the most common targets of their aggression. Close attention is paid to Slovak conscripts (Slovenskí branci), one of the radical groups in Slovakia. The Slovak Ministry of Defence regards this paramilitary group as a security threat. The theoretical part of the paper is based on works of sociologists who introduce the concept of indifferent society (Lipovetsky 2008) and examine barriers that hinder young people’s integration (Durkheim 1973). Defining aggression and violence that originate in anger is based on Arendt’s study (2004). The empirical part of the paper is a result of the qualitative research conducted among young radicals, aged 14-17 in Slovakia in a form of case studies. Keywords: indifference, disintegration, revolt, anger, aggression


2021 ◽  
Vol 21 (4) ◽  
pp. 772-784
Author(s):  
Yury V. Borovsky

In the early 2020s the worlds transition from carbon-intensive to climate-neutral energy use has already become a discernible and a difficult-to-reverse process. With Joe Bidens election as US president, the United States have returned to the Paris Climate Agreement and have become a key driver of this process (along with the EU and China). As a result, the international community has reached a consensus on the ongoing energy transition. This process will require considerable effort and may take several decades. Nevertheless, the impact of energy transition on traditional approaches to energy security, which emerged largely as a result of the global oil crises of the 1970s and 1980s and are centered around the supply of fossil fuels, is already a relevant research topic. This problem is examined relying on the relevant terminological, theoretical and factual material. The article concludes that energy transition will ultimately undermine the carbon paradigm that has underpinned energy security policies since the 1970s. Rapid development of renewable and other low-carbon energy sources will certainly remove key energy security risks of energy importers and, possibly, allow them to achieve energy independence. However, a post-carbon era may also generate new risks. For countries that rely heavily on oil, gas and coal exports, energy transition will result in the loss of markets and revenues. It may present an energy security threat for them as well as it will require a costly and technologically complex process of the energy sector decarbonization. Some exporters, especially those with high fuel rents and insufficient financial reserves, may face serious economic and social upheavals as a result of energy transition. The EU and the US energy transition policies reflect provisions of all three fundamental international relations theoretical paradigms, including realism. This means that the EU and the US policy, aimed at promoting climate agenda, may be expected to be rather tough and aggressive. China as the third key player in energy transition is still following a liberal course; however, it may change in the future.


2021 ◽  
pp. 003288552110691
Author(s):  
Ryan M. Labrecque

Prison officials often rely on restrictive housing to promote institutional safety and security. However, a growing body of research indicates this type of confinement has little impact on inmate behavior or institutional order. An alternative approach involves providing the most dangerous and disruptive inmates with increased case management services and other proactive programmatic opportunities. The success of this strategy requires an ability to prospectively and accurately identify the most problematic inmates. The results of this study indicate that Risk Assessment for Segregation Placement (RASP) and its revised Oregon version (RASP-OR) are valid predictors of segregation placement and institutional misconduct. The policy implications of these findings are discussed.


2021 ◽  
Vol 9 (3) ◽  
pp. 405-428
Author(s):  
Ngboawaji Daniel Nte ◽  
Oluka Nduka Lucas ◽  
Ridwan Arifin

This study is a modest but objective comparative evaluation of internal security threats facing two sub-regional large countries of Africa and South Asia-Nigeria and Pakistan. Considering the fact that ethnicity, sectarianism and economic instability are fundamental variables of internal security threats in both countries, the study argued that religious extremism has created an unenviable image of both nations in the eyes of the rest of the world, undoubtedly, this has affected both nations adversely. The study also identified inter-regional grievances as potential causes of damages to both federations. Also identified is ethno-sectarian problem as a major security threat to both nations. This in the opinion of the authors will remain a huge impediment to the goals of economic prosperity to both nations. Consequently, the focus of this study is to examine interdependence of these multifaceted challenges and their overall impact on internal security in both countries. To achieve this, the study employed qualitative research method in which analytical approach was used to examine the similarities in the security challenges in Nigeria and Pakistan. Structural questionnaire was used as the instrument for data collection.  The employment of thematic analytic approach was adopted to analyse data collected for the study. The study concludes among others, the need for both countries to individually address these national security threats and find viable solutions to the problems of socio-economic and political reforms and unemployment within a reasonable timeframe to mitigate future threats.Keywords: Internal Security; Ethnicity; Sectarianism; Challenges Dua Bangsa Satu Tantangan: Analisis Politik dan Hukum pada Ancaman Keamanan dalam Negeri (Internal Security) di Nigeria dan PakistanAbstrak Penelitian ini merupakan evaluasi komparatif sederhana namun objektif terhadap ancaman keamanan internal yang dihadapi dua negara besar sub-regional Afrika dan Asia Selatan-Nigeria dan Pakistan. Mempertimbangkan fakta bahwa etnisitas, sektarianisme, dan ketidakstabilan ekonomi adalah variabel fundamental dari ancaman keamanan internal di kedua negara. Penelitian ini berpendapat bahwa ekstremisme agama telah menciptakan citra yang tidak baik dari kedua negara di mata dunia. Tidak diragukan lagi, ini telah mempengaruhi kedua negara secara merugikan. Penelitian ini juga mengidentifikasi kasus-kasus antar-regional sebagai penyebab potensial kerusakan pada kedua federasi. Juga diidentifikasi masalah etno-sektarian sebagai ancaman keamanan utama bagi kedua negara, dimana akan tetap menjadi hambatan besar bagi tujuan kemakmuran ekonomi kedua negara. Fokus penelitian ini adalah untuk menguji saling ketergantungan dari tantangan beragam ini dan dampaknya secara keseluruhan terhadap keamanan internal di kedua negara. Untuk mendapatkan data tersebut, penelitian ini menggunakan metode penelitian kualitatif dimana pendekatan analitik digunakan untuk menguji kesamaan dalam tantangan keamanan di Nigeria dan Pakistan. Kuesioner struktural digunakan sebagai instrumen pengumpulan data. Penggunaan pendekatan analitik tematik diadopsi untuk menganalisis data yang dikumpulkan untuk penelitian ini. Studi ini menyimpulkan antara lain, perlunya kedua negara untuk secara individual mengatasi ancaman keamanan nasional ini dan menemukan solusi yang layak untuk masalah reformasi sosial-ekonomi dan politik dan pengangguran dalam jangka waktu yang wajar untuk mengurangi ancaman di masa depan.Kata Kunci: Keamanan dalam Negeri; Etnisitas; Sektarianisme; Tantangan Две нации, разные регионы, одинаковые вызовы: правовой и политический анализ угроз внутренней безопасности в Нигерии и Пакистане АбстрактныйЭто исследование представляет собой скромную, но объективную сравнительную оценку угроз внутренней безопасности, с которыми сталкиваются две субрегиональные крупные страны Африки и Южной Азии - Нигерия и Пакистан. Учитывая тот факт, что этническая принадлежность, сектантство и экономическая нестабильность являются фундаментальными переменными угроз внутренней безопасности в обеих странах, в исследовании утверждается, что религиозный экстремизм создал незавидный имидж обеих стран в глазах остального мира, несомненно, это повлияло на обе нации неблагоприятно. Исследование также определило межрегиональные жалобы как потенциальные причины ущерба для обеих федераций. Также определена этно-сектантская проблема как серьезная угроза безопасности для обеих стран. Это, по мнению авторов, останется огромным препятствием на пути достижения целей экономического процветания обеих стран. Следовательно, целью данного исследования является изучение взаимозависимости этих многогранных вызовов и их общего воздействия на внутреннюю безопасность в обеих странах. Для достижения этой цели в исследовании использовался качественный метод исследования, в котором использовался аналитический подход для изучения сходства проблем безопасности в Нигерии и Пакистане. Структурная анкета использовалась в качестве инструмента для сбора данных. Для анализа данных, собранных для исследования, был использован тематический аналитический подход. В исследовании, среди прочего, делается вывод о необходимости для обеих стран индивидуально противодействовать этим угрозам национальной безопасности и находить жизнеспособные решения проблем социально-экономических и политических реформ и безработицы в разумные сроки для смягчения будущих угроз.Ключевые слова: внутренняя безопасность; Этническая принадлежность; Сектантство; Вызовы


Sign in / Sign up

Export Citation Format

Share Document