Security Challenges Research Papers - Academia.edu (original) (raw)
A biztonságot veszélyeztető tényezők európai uniós és NATO olvasata
- by and +1
- •
- NATO, Security, European Union, Security Challenges
The "Internet of Things" is a new paradigm that includes smart hospitals, smart cities, and home automation, among other services. The "Internet of Things" has turned a small-scale Vehicular Ad-hoc Network (VANET) into a highly scalable... more
The "Internet of Things" is a new paradigm that includes smart hospitals, smart cities, and home automation, among other services. The "Internet of Things" has turned a small-scale Vehicular Ad-hoc Network (VANET) into a highly scalable and controlled "Internet of Vehicle" that is based on the internet (IoV). The Internet of Automobiles (IoV) is a vehicular network idea that comprises of linked motors, users, and other smart devices. It aims to provide a range of safety and pleasure services. Depending on which directions and other data are sent to each vehicle, the IoV system equips them with various sensors that record various types of data and send it to a computer unit for computation and analysis. We present a model overview of the IoV system in this research. Because every system failure directly affects user safety on the Internet of Things, security becomes crucial. We look at security concerns, various security assaults, and solutions from an IoV perspective. We also provide a system that support for vehicle-to-infrastructure (V2I) communication in the Internet of Vehicles.
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers... more
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
Nigeria as a country gained her independence on October 1st 1960 and after a temporary civilian government and a long reign of military power, which experienced a series of coup d’état it was restored to a democratic federation in 1999. A... more
Nigeria as a country gained her independence on October 1st 1960 and after a temporary civilian government and a long reign of military power, which experienced a series of coup d’état it was restored to a democratic federation in 1999. A country with a population of over 168 million and rich in both human and natural resources faces some concerns such as corruption and security challenges. These challenges are on the increase because of lack of solutions to the issues and as such posed several threats to its inhabitants as well as create economic implications.
There are some contentions as to whether the current systems handling security issues are effective. This paper will provide an in-depth analysis at the level of insecurity in Nigeria using past and current events. It will also examine existing domestic and external policies channelled towards managing the security concerns. This dissertation addresses these questions: Firstly, what is the highest form of security concern in the country? Secondly, what role do the leaders play in ensuring security? Thirdly, what can be done to counter the security challenges? And lastly, what are the possible causes of insecurity in Nigeria?
Following a careful review of existing literature, in spite of the growing security issues in Nigeria, there are limited academic works thus limiting in-depth insight into key areas of security concerns
This dissertation uses a mixed method approach which combines the collective use of qualitative and quantitative data methodology. From these findings, the study identifies evidence linking different group causes of the security issues and also loophole in the available policies. Such awareness can help the Nigerian Government, NGOs, International Organisations and other interested bodies improve policies for security challenges especially in developing diverse nationals.
Although, previous studies restrict findings to, identifying one cause of security challenges. This comprehensive study identifies both direct and indirect causes of the issues and as such allows for collective understanding. This bundling of the causes of security challenges in Nigeria will allow other researchers focus on providing possible solution to the issues.
KEYWORDS: Terrorism, Militancy, Corruption, Lawlessness, Unemployment, Illiteracy, Structure, Politics, Crude Oil, Ethnicity and Religion.
Cloud computing has transformed a large portion of the IT industry through its ability to provision infrastructure resources – computing, networking, storage, and software-as services. Software-Defined Networking (SDN) has transformed the... more
Cloud computing has transformed a large portion of the IT industry through its ability to provision infrastructure resources – computing, networking, storage, and software-as services. Software-Defined Networking (SDN) has transformed the physical underlying network infrastructure into programmable and virtualized networks. Network Functions Virtualization (NFV) has transformed physical telecommunication infrastructures and network functions into virtualised network functions and services. Cloud, SDN and NFV technologies and their associated software-defined infrastructures all rely on the virtualization technology to provision their virtual resources and offer them as services to users. These new technologies and infrastructures invariably bring with them traditional vulnerabilities and introduce new technology-specific security risks. In this paper, we discuss extensively cloud-, SDN-, and NFV-specific security challenges as well as approaches for addressing integrated infrastructural issues where cloud, SDN, and NFV all play their integral parts.
Late colonial and post-colonial attempts to suppress triad societies have occurred in the context of modernisation and socio-economic and political change in Hong Kong. Anti-corruption efforts, improved enforcement, a focus on illicit... more
Late colonial and post-colonial attempts to suppress triad societies have occurred in the context of modernisation and socio-economic and political change in Hong Kong. Anti-corruption efforts, improved enforcement, a focus on illicit entrepreneurs and tainted wealth have contributed to a decrease in public tolerance of triads and greater confidence in police. The scale, form, visibility and activities of triad societies have also changed with recent declines in triad-related lethal violence and membership activity. Following market reforms, rapid economic development in the People's Republic of China, notably in the Shenzhen Special Economic Zone, offered attractive illicit opportunities that encouraged triad-related commercial vice enterprises away from Hong Kong. 1 This paper discusses the impact of government countermeasures and socio-economic and political change upon triad societies in Hong Kong (HK). 2 The apparent 'decline' of triad societies since 1997 recalls s...
Realism in the African literature manifests itself in several forms and strata: some simple, some interwoven, some outrightly complex. Geocriticism is a realist study focusing on geographical setting captured in literary texts in order to... more
Realism in the African literature manifests itself in several forms and strata: some simple, some interwoven, some outrightly complex. Geocriticism is a realist study focusing on geographical setting captured in literary texts in order to unravel the interplay between geography, people and cultures. Here, it is aimed at analyzing the complexities of the consequences inherent in the artificial and arbitrary colonial boundaries imposed on Africa at the Berlin Conference of 1884/1885. Geography of course deals with physical land and territorial features, but no geography can be detached from the culture of the inhabitant people. This paper therefore examines through two works of Kourouma: The Suns of Independence and Allah is not Obliged some implications of cross-border geo-cultural relationship among the affected peoples. This has enabled the research study to appraise the contemporary security challenges in Nigerian in relation to the geo-cultural affinities of nationalities spreading across the Nigerian boundary linesinto neighbouring countries.
In the current digitalized world, everything is interconnected and accessible from everywhere. Although traditional networks are widely adopted, their management is complicated. Therefore, they are not effective in providing services to... more
In the current digitalized world, everything is interconnected and accessible from everywhere. Although traditional networks are widely adopted, their management is complicated. Therefore, they are not effective in providing services to the future Internet like a wide range of accessibility, high bandwidth, management, and security. On the other hand, Traditional network architecture relies on manual configurations of proprietary devices that are error-prone and inefficient to utilize the network devices properly. Softwaredefined Networking (SDN) has drawn massive changes in the traditional network paradigm by decoupling the network operations from the physical hardware and encouraging network control to be logically centralized. It provides network programmability and improves security by enabling a global view of the entire network and issues handled effectively by the centralized controller. As a result, SDN allows networks to monitor the traffic and detect vulnerabilities more effectively. It also simplifies the deployment of new services with more flexibility at a faster pace. On the other hand, the decoupling of control and the data planes introduces security threats such as Distributed Denial of Service (DDoS) attacks, Man in the Middle attacks, Saturation attacks, etc. As a result, SDN has attracted a lot of interest from both academics and industry. In this paper, we study security vulnerabilities on layers of SDN, the security frameworks that protect each layer, and many security methodologies for network-wide security.
Cloud computing is useful to companies and organizations as it eliminates the requirement for them to plan ahead for provisioning, and allows them to start with small resources and increase gradually as the service demand rises. There are... more
Cloud computing is useful to companies and organizations as it eliminates the requirement for them to plan ahead for provisioning, and allows them to start with small resources and increase gradually as the service demand rises. There are challenges in adopting cloud computing; but with obstacles, we have opportunities for research in several aspects of cloud computing. One of the main issue is the data security and privacy of information stored and processed at the cloud service provider's systems. In this work, we surveyed several research works on cloud computing related to security challenges and privacy issues. The primary goal of this paper is to provide a insight into the security challenges of cloud computing and fy approaches and solutions which have been proposed and adopted by the cloud service.
While this insight is fundamental, it is insufficient to encompass the breadth, history and subtle dynamics of this distinctive relationship providing Michal Lubina the opportunity to work systematically through each of these. One aspect... more
While this insight is fundamental, it is insufficient to encompass the breadth, history and subtle dynamics of this distinctive relationship providing Michal Lubina the opportunity to work systematically through each of these. One aspect of the bilateral relationship is its ‘top-down’ character. The senior leadership in each country are well-known to the other, but thereafter, warmth and familiarity falls away rapidly at the middle and lower levels of officialdom. At the community level, the two countries remain as alien and unknown to each other as they are to their Western interlocutors. A second characteristic is what Lubina terms their 'sinusoid' rise and fall in relations. Some of this variance derives from changes in relative power. In the latest phase, Russia has become the subordinate partner but has decided to make a virtue out of the asymmetric win-win share of gains. Foreign policies with respect to the United States are also important; there was cooling when Russia accepted President Obama’s offer of a reset in 2010, there was warming when the United States commenced its Pivot. A third characteristic is that each country is more oriented to the West than to each other; culturally, Russia is far closer to Europe than to China, while for its part China looks more to the West than Russia for technology and trade. What their partnership delivers, in the end, is a sense of safety in their rear areas, such that they can oppose the West’s liberal interventions and pursue their own irredentist projects (Crimea for Russia, Taiwan and South China Sea for China).
Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental... more
Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when it has had to be undesirably ...
Prof. Dr. Stépán Gábor: DINAMIKAI JELENSÉGEK A FORGALMI DUGÓKBAN • DYNAMICAL PHENOMENA IN TRAFFIC JAMS Dr. Bitay Enikő: TECHNIKATÖRTÉNETI KUTATÁSOK ÉS MŰSZAKI ÖRÖKSÉGVÉDELEM ERDÉLYBEN • THE HISTORY OF TECHNOLOGY RESEARCH AND THE... more
Prof. Dr. Stépán Gábor: DINAMIKAI JELENSÉGEK A FORGALMI DUGÓKBAN • DYNAMICAL PHENOMENA IN TRAFFIC JAMS
Dr. Bitay Enikő: TECHNIKATÖRTÉNETI KUTATÁSOK ÉS MŰSZAKI ÖRÖKSÉGVÉDELEM ERDÉLYBEN • THE HISTORY OF TECHNOLOGY RESEARCH AND THE PROTECTION OF TECHNICAL HERITAGE IN TRANSYLVANIA
Barabás Botond: NI AS A RAPID PROTOTYPING ENABLING TECHNOLOGY PROVIDER IN THE SMART CITY ERA
Dr. Dalibor Dobrilović: APPROACH IN EXPLORING WIRELESS TECHNOLOGY PERFORMANCE IN SMART CITY ENVIRONMENTS
Dr. Kovács Tünde Anna: A KÜLÖNBÖZŐ TUDOMÁNYTERÜLETEK EGYÜTTMŰKÖDÉSE AZ IPAR 4.0 MEGVALÓSÍTÁSÁÉRT • THE DIFFERENT SCIENCE DISTRICT INTEGRATION FOR REALIZE THE INDUSTRY 4.0
Kulcsár Sándor: OKOS VÁROS KONCEPCIÓ MAGYARORSZÁGON – VÍZIÓK VS. VALÓSÁG • SMART CITY CONCEPT IN HUNGARY – VISIONS VS. REALITY
Dr. Lados Mihály: OKOS VÁROS MODELLEK MAGYARORSZÁGON •
SMART CITY ATTITUDES OF HUNGARIAN CITIES
Prof. Dr. Rajnai Zoltán: SMART INFRASTRUKTÚRÁK BIZTONSÁGA •
SECURITY OF SMART INFRASTRUCTURE
Dr. Popa-Müller Izolda: KÁROSODÁSI FOLYAMATOK KINETIKÁJÁNAK BECSLÉSE • THE PREDICTION OF DAMAGE PROCESS KINETICS
Albini Attila: A FELHŐ-TECHNOLÓGIÁK ELMÉLETI VIZSGÁLATA •
THEORETICAL STUDY OF CLOUD TECHNOLOGIES
Iványi Tamás: „OKOSTURISTA” AZ OKOS VÁROSBAN – MULTIDIMENZIÓS MODELL A KÖZÖSSÉGI MÉDIA ÉS AZ OKOSTELEFONTECHNOLÓGIÁK FELHASZNÁLÁSÁRA A VÁROSMARKETINGBEN • SMART TOURISTS IN A SMART CITY - A MULTIDIMENSIONAL MODEL FOR CITY MARKETING USING SMARTPHONES AND SOCIAL MEDIA
Varga Péter: A REVIEW ON THE ELECTRIC CURRENT EFFECT ON THE IRRECOVERABLE DEFORMATION OF METALS
Wisnovszky Gábor György: A PEER-TO-PEER ONLINE PIACOK LAKÁSPIACRA GYAKOROLT HATÁSAI • HOW “SMART” PEER-TO-PEER ONLINE MARKETPLACES CHANGE THE HOUSING MARKET
Tusor Balázs: SZEMÉLYRE SZABOTT ÉTKEZÉSI TANÁCSADÓ- EGY INTELLIGENS TÉR ALKALMAZÁS • PERSONALIZED DIETARY ASSISTANT - AN INTELLIGENT SPACE APPLICATION
Szabó Zsolt Mihály: NYUGDÍJASOK - SMART CITY? - EGY ÉRTELMES NYUGDÍJRENDSZER LEHETŐSÉGEI • PENSIONERS IN SMART CITY - A VIEW OF AN INTELLIGENT PENSION SYSTEM
Szilágyi Győző Attila: KÜLÖNBÖZŐ NAGYVÁROSOK KÖZÖSSÉGI KÖZLEKEDÉSI HÁLÓZATAINAK TOPOLÓGIAI VIZSGÁLATA A HÁLÓZATOK SEBEZHETŐSÉGE SZEMPONTJÁBÓL • TOPOLOGICAL ANALYSIS OF THE PUBLIC TRANSPORT NETWORK OF THE DIFFERENT CITIES FROM THE ASPECT OF NETWORK VULNERABILITY
Nyikes Zoltán: A DIGITÁLIS KOMPETENCIA, KULCS A JÖVŐHÖZ •
DIGITAL COMPETENCE, KEY TO THE FUTURE
Kiss Leizer Géza Károly: KATASZTRÓFÁK SORÁN KELETKEZŐ HULLADÉKOKBIZTONSÁGTECHNIKAI KÉRDÉSEI A FOLYAMI, TAVI ÉS TENGERI KÖZLEKEDÉSBEN •RIVER, LAKE AND SEA TRAFFIC SAFETY ISSUES REGARDING WASTE GENERATED DURING DISASTERS
Werner Gábor: AZ EMBERI VISELKEDÉSI MINTÁK KINYERÉSE MESTERSÉGES INTELLIGENCIA SEGÍTSÉGÉVEL • PATTERN EXTRACTION OF HUMAN BEHAVIOR WITH ARTIFICIAL INTELLIGENCE
Szabó Anikó: AZ EMBERI ALKALMAZKODÁS TÁMOGATÁSA AZ OBJEKTUMVÉDELEMBEN • STANDING FOR THE HUMAN ADJUSTMENT TO THE SAFEGUARDING
Bréda Gábor: OKOS VÁROS OKOS TÁRGYALÓINAK BIZTONSÁGI KIHÍVÁSAI • THE SECURITY CHALLENGES OF SMART MEETING ROOMS IN SMART CITIES
Hell Péter: DRÓNOK AZ OKOS VÁROSBAN • DRONES IN SMART CITIES
Tokody Dániel: MOBILITÁS 4.0 - AUTONÓM INTELLIGENS JÁRMŰVEK •
MOBILITY 4.0 - AUTONOMOUS INTELLIGENT VEHICLE
Tokody Dániel: MOBILITÁS 4.0 - AZ ÚJ EURÓPAI TREND: A DIGITÁLIS VASÚT? AVAGY VAN-E MAGYAR DIGITÁLIS VASÚTI STRATÉGIA? •
MOBILITY 4.0 - A NEW TREND IN EUROPE? IS THERE ANY STRATEGY OF THE HUNGARIAN DIGITAL RAILWAY FOR SMART MOBILITY IN A SMART CITY?
in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the... more
in this paper focuses on development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a comprehensive privacy security protection framework.
The world has been gradually entering the fourth industrial revolution, where a new wave of technological advancement will bring humanity into a new era of globalization. Global supply chains will become more efficient while reducing... more
The world has been gradually entering the fourth industrial revolution, where a new wave of technological advancement will bring humanity into a new era of globalization. Global supply chains will become more efficient while reducing transport costs, which will contribute to opening new markets and drive economic growth. According to an analysis by the World Economic Forum, the fourth industrial revolution will increase the level of global income and quality of life for people around the world.
However, increasing intersectionality and emerging technological trends will expose humanity to new forms of security challenges, risks and threats such as Internet fraud and data theft, cyberattacks, large-scale spontaneous migration, climate change, etc., as stated in the 2020 Global Economic Forum’s Global Risk Report.
National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist... more
National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socioeconomic and political system of any country, including Vietnam. The security issues and concerns understood by those challenges and threats are posed for the international and national community, both from outside and from within. The national security issues and concerns should be constantly screened and updated as the world is evolving at unprecedented pace, with particular exposure to the rising, but not yet fully identified, unconventional challenges and threats that have never seen before. The article is using empirical analysis and case study as methodology for carrying out research, treating security and military science as interdisciplinary, but two of the branches of social science. The aim of this article is to focus on internal instability as challenging security issue that could pose a real threat and danger to the current socioeconomic and political system and based on that to draw some implications and propose some viable solutions for the Vietnamese authority to guard the safety and security of the people, society and also its political existence.
The study is an attempt to provide an answer to the question of whether the South Korean political leaders have a significant influence on North Korea policy during a security challenge. Specifically, does South Korea with a more... more
The study is an attempt to provide an answer to the question of whether the South Korean political leaders have a significant influence on North Korea policy during a security challenge. Specifically, does South Korea with a more cooperative leader more likely to response to the security challenges by a more cooperative policy, or do structural and domestic political constraints limit their significance? To answer the question, this thesis examines the effect of South Korea's presidential operational code beliefs on North Korea policy in security challenges. The study assessed every president's operational code beliefs from Kim Dae-Jung to Park Gun-shy (from 1998 to 2016), mainly focusing on the " image of the political universe " (P-1)and " strategic preference " (I-1). Operational codes were derived from the content analysis of public speeches of presidents using the computer-based Verbs In Context System (VICS). Operational code analysis findings showed that all of the president's operational codes were significantly related to the foreign policy outcomes.
This study examined the roles of Secondary school administrators in times of Security Challenges, One of the basic functions of a school administrator is to ensure, enhance and facilitate staff and students welfare with the provision and... more
This study examined the roles of Secondary school administrators in times of Security Challenges, One of the basic functions of a school administrator is to ensure, enhance and facilitate staff and students welfare with the provision and maintenance of school facilities. The study investigated the performance of secondary school principals have performed these duties in the midst of rising insecurity challenges confronting the school system. Three hypotheses guided the study while adopting the descriptive research design of the survey type. The population of the study consisted of all principals in senior and junior secondary schools in Ibadan metropolis, Oyo State. A total of 100 principals constituted the sample of the study using simple random sampling technique. Self developed instrument tagged "Managing Secondary Education during Security Challenge Questionnaire" (MSEDSC) was used to elicit relevant information from respondents following experts' screening and suggestions. A reliability coefficient of ‘r’-0.76 was obtained using the test retest method and correlation statistic was used to test the hypotheses. The result revealed that a significant relationship existed among students and staff welfare, school facilities and security challenges. Based on the findings, it was recommended that the protection of learning environments especially at the secondary school level must be given adequate attention to facilitate effective performance on the part of secondary school principals to attain the aims and objectives of secondary education.
The focus of this paper is on reinventing education across curriculum as it addresses security and human capital for sustainable educational development in Nigeria. In this paper, it is argued that, in addition to political leadership... more
The focus of this paper is on reinventing education across curriculum as it addresses security and human capital for sustainable educational development in Nigeria. In this paper, it is argued that, in addition to political leadership failure and other systemic institutional uncertainties/irregularities that exists in Nigeria, it is lack of proactive security planning that have given rise to the recurrent and multiplicity of school related insecurity challenges. As no nation grows beyond its level of educational development, the need to adequately secure vulnerable school environment cannot be overemphasized. There is need for the entire educational system and infrastructure to be securitized and overhauled. There is no 'correct' pedagogy for sustainability education, but there is a broad consensus that it requires a shift towards active, participative, and experiential learning methods that engage the learner and make a real difference to their understanding, thinking and ability to act. From the global trend, the extent of knowledge in ICT by any nation partly determines their level of human capital development and ability to deploy it for security check. This has implication for school curriculum. For instance, if learners are not caught young in ICT irrespective of specialization, the likelihood that Nigeria as a nation will get it right would be doubtful. It is recommended among others that human security (which includes personal and community security) as well as food security, economic security, health security environmental security and political security should be considered in the curriculum review while sustainability should be in all spheres of life including food, climate, biodiversity, ecological system and waste, water and energy.
As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of... more
As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with r...
This paper evaluates the potential for defence research to contribute to the long-term development of higher military education. Motivation for the paper emerged from recent organisational changes at the Ministry of Defence by which the... more
This paper evaluates the potential for defence research to contribute to the long-term development of higher military education. Motivation for the paper emerged from recent organisational changes at the Ministry of Defence by which the Strategic Research Institute (SRI), joined the University of Defence (UoD). Both institutions, SRI and UoD, are obligated and dedicated towards respecting and implementing national strategies, laws and norms related to scientific research and education as well as towards fulfi llment of prescribed accreditation standards for academic education and scientific research. The main idea here is to evaluate a scientific research approach conducted by the SRI, through the lens of the guiding principles for development of academic studies which are declared in the national strategy for education development. A few of the questions we tried to answer were: how relevant are the research topics?; who needs research results?; how should the research process be conducted?; and what about the quality of research results? Development of scientific research connections, higher education and practical needs of the military organisation are very important for all three domains, particularly for future security challenges. Military research organisations, along with the higher education component, have to be capable of perceiving future security challenges, conducting scientific research and offering some proposals based on scientific methodology. However, in the selection of the research topics, they have to respect the views, needs and priorities of other organisational entities which are part of the military organisation.
With the deployment of the Regional Assistance Mission to Solomon Islands in July 2003, the former Howard Government initiated its robust new engagement with Australia's Pacific island neighbours. Interventions with an initial... more
With the deployment of the Regional Assistance Mission to Solomon Islands in July 2003, the former Howard Government initiated its robust new engagement with Australia's Pacific island neighbours. Interventions with an initial security focus have been portals to broader and ambitious state-building exercises. The quest to integrate security and development agendas lies at the heart of 'the new interventionism'. This article examines the evolution and character of this approach, as well as reviewing its implementation in the two case studies of Solomon Islands (RAMSI) and Papua New Guinea (ECP). It also discusses the significance for Australia/Pacific relations of the recent change of government in Canberra and the differences (and similarities) to be anticipated under Prime Minister Rudd's Labor Government.
- by Saloni Salil
- •
- Trade, Indian Ocean, Commerce, IOR ARC
The frequency with which peacekeeping operations have proved inadequate to protect civilians has prompted substantial reform of peacekeeping mandates and practice. But it has also led to significant normative developments within the wider... more
The frequency with which peacekeeping operations have proved inadequate to protect civilians has prompted substantial reform of peacekeeping mandates and practice. But it has also led to significant normative developments within the wider UN system—not just in peacekeeping mandates and practice. This article charts the normative, institutional and operations contours of the protection of civilians in armed conflict within the UN, highlighting the particular contributions of the Australian government to that agenda. It concludes by identifying four pathways through which efforts to protect civilians can be improved. 1
— Cloud computing has generated a lot of interest and competition in the industry and it is recognize as one of the top 10 technologies of 2010[1]. It is an internet based service delivery model which provides internet based services,... more
— Cloud computing has generated a lot of interest and competition in the industry and it is recognize as one of the top 10 technologies of 2010[1]. It is an internet based service delivery model which provides internet based services, computing and storage for users in all market including financial, health care & government. In this paper we did systematic review on different types of clouds and the security challenges that should be solved. Cloud security is becoming a key differentiator and competitive edge between cloud providers. This paper discusses the security issues arising in different type of clouds.
This paper set out to explore whether the Syrian Conflict has impacted security issues outside its borders, in particular in Europe. With a wide range of challenges related to the conflict, now in its sixth year, issues such as the rise... more
This paper set out to explore whether the Syrian Conflict has impacted security issues outside its borders, in particular in Europe. With a wide range of challenges related to the conflict, now in its sixth year, issues such as the rise of ISIS and the refugee crisis in Europe have been linked to political destabilization on the continent and within the EU. By looking at data presented by the Global Terrorism Database and the United Nations Commissioner for Human Rights (UNHCR), this study set out to observe any patterns in Islamic terrorist activity and numbers of refugees in Europe during the period 2006 to 2015. Academic reports based on empirical studies as well as media reports were also analyzed to further the research and allow for in-depth assessment of the issue as a whole.
The 2013 Defence White Paper places greater emphasis than its predecessors on defence engagement, and begins to link regional security to the defence of Australia itself. It does not explain, however, what Australia has to do to achieve... more
The 2013 Defence White Paper places greater emphasis than its predecessors on defence engagement, and begins to link regional security to the defence of Australia itself. It does not explain, however, what Australia has to do to achieve its objectives, or what commitments it would have to enter to do so. Overall, the White Paper moves towards a reinterpretation of ‘self-reliance’ that focuses more on the way in which Australia would operate in a coalition conflict, but developing a new defence strategy that links force structure, posture and employment to the achievement of Australia’s strategic objectives is left to future White Papers.
National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist... more
National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socioeconomic and political system of any country, including Vietnam. The security issues and concerns understood by those challenges and threats are posed for the international and national community, both from outside and from within. The national security issues and concerns should be constantly screened and updated as the world is evolving at unprecedented pace, with particular exposure to the rising, but not yet fully identified, unconventional challenges and threats that...
Since the late 1980s, a succession of Australian-funded programs has sought to strengthen the Royal Papua New Guinea Constabulary (RPNGC). The results of these efforts have, to say the least, been extremely modest. This article critically... more
Since the late 1980s, a succession of Australian-funded programs has sought to strengthen the Royal Papua New Guinea Constabulary (RPNGC). The results of these efforts have, to say the least, been extremely modest. This article critically examines the underlying approach to donor assistance to the RPNGC, arguing, among other things, that it has failed to engage with the realities of normative and regulatory pluralism in Papua New Guinea’s famously diverse social landscape. More fulsome acknowledgement of these plural realities, and the adoption of more innovative approaches to internal security provision that can harness and better align the strengths of different providers is likely to yield better results than a continuing reliance on state police alone.