1. National security review -- 2. India's neighbours -- 3. Challenges for India -- 4. Assessing internal security situation -- 5. Changing global imperatives -- 6. Major powers : strategic profile / S. Samuel C. Rajiv -- 7. Chronology of major events 2013.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
In: Vojnotehnički glasnik: naučni časopis Ministerstva Odbrane Republike Srbije = Military technical courier : scientific periodical of the Ministry of Defence of the Republic of Serbia = Voenno-techničeskij vestnik : naučnyj žurnal Ministerstva Oborony Respubliki Serbija, Band 71, Heft 3, S. 748-768
Introduction/purpose: The digitization of healthcare has gained particular importance in the years since the emergence of COVID-19 and also has become one of the primary goals of the Government of the Republic of Serbia. Telemedicine is a good solution when the patient cannot come to a healthcare facility. Mobile healthcare applications are already widely used, but in both fields the important challenge is data security. The aim of this paper is to review solutions for data security in mobile healthcare from the technical side and possible challenges in the process of digitization of the healthcare system in Serbia. Methods: This review is based on current papers in this area, on the available relevant literature and the authors' many years of experience in this field. Experiences in the process of digitization of healthcare in Serbia are based on available articles and regulations. Finally, possible challenges are presented from the authors' perspective based on everything presented in the field of data security in mobile healthcare. Results: The analysis of the papers reviewed from the point of view of data security showed that users are often ready to sacrifice their privacy for the sake of convenience provided by mobile applications. Conclusion: Based on the review of the papers and clear data security requirements that include the presented safeguards, one of the main tasks of the entire community is to raise awareness of information security and awareness of the need for cyber hygiene of each individual, which is the basis for the safe use of e-health services.
"This book looks at food security from a socio-economic perspective. It offers a detailed and systematic examination of food security from its historical backgrounds, concepts and measurements, to the determinants and approaches to achieve food security. The book also introduces the key challenges and root causes of food insecurity. Through country-specific cases, the book highlights instances of both successful and disastrous national food security management and their outcomes. The invaluable learning experiences of these countries shed light on food security practices, and the straightforward demand-supply framework effectively guides readers in understanding food security issues. This is an essential resource for anyone who is keen to learn more about food security, particularly researchers and university students who are new to the field. The book endeavours to help us reflect on the current phenomenon and strategize better for the future"--
"This book investigates the goals and policy aspects of cyber-security education in the light of escalating technical, social and geopolitical challenges. The past ten years has seen a tectonic shift in the social and political significance of cyber-security education. Once the preserve of small groups of dedicated educators and industrial professionals, the subject is now on the frontlines of geopolitical confrontation and business strategy, and global shortages of talent have created pressures on corporate and national policy for workforce development. This book offers an updated approach to the security education problem as we enter the next decade of technological disruption and political threats. The contributors include scholars and education practitioners from leading research and education centres in Europe, North America and Australia. This book provides essential reference points for education policy on the new social terrain of security in cyberspace and aims to reposition global debates on what education for security in cyber space can and should mean. This book will be of interest to students of cyber-security, cyber education, and public policy generally, as well as practitioners and policymakers"--
Security certification processes for information systems involve expressing security controls as functional and non-functional requirements, monitoring deployed mechanisms that satisfy the requirements, and measuring the degree of confidence in system compliance. With the potential for systems to perform runtime self-adaptation, functional changes to remedy system performance may impact security control compliance. This impact can extend throughout a network of related controls causing significant degradation to the system's overall compliance status. We represent security controls as security assurance cases and implement them in XML for management and evaluation. The approach maps security controls to softgoals, introducing achievement weights to the assurance case structure as the foundation for determining security softgoal satisficing levels. Potential adaptations adjust the achievement weights to produce different satisficing levels. We show how the levels can be propagated within the network of related controls to assess the overall security control compliance of a potential adaptation.
Testimony issued by the General Accounting Office with an abstract that begins "GAO discussed the usage of the Social Security number (SSN), focusing on: (1) the ways that the federal government uses SSNs and current restrictions on these uses; (2) the nonfederal purposes for which the number is used; and (3) what businesses and state governments believe the effect would be if federal laws limiting the use of SSNs were passed."
In: Bulletin of peace proposals: to motivate research, to inspire future oriented thinking, to promote activities for peace, Band 16, Heft 4, S. 349-361
THIS PAPER DEFINES WHAT CONFIDENCE IS IN THE CONTEXT OF DISARMAMENT TALKS. THE AUTHOR CLAIMS IT IS AN INTERMEDIARY PHASE IN INTERNATIONAL RELATIONS DESIGNED TO DETERMINE PREDICTABILITY, AND REASSURANCE. THEN CONSIDERS THE BEST FORMS OF CONFIDENCE-BUILDING, HOW IT IS BEING USED AT THE STOCKHOLM CONFERENCE, HOW IT IS USED IN THE NEGOTIATION STRATEGIES OF THE MAJOR POWERS, AND WHAT THE FUTURE IS FOR CONFIDENCEBUILDING NEGOTIATIONS.
Bucknell III, Howard: Energy and the National Defense. - Lexington: University Press of Kentucky, 1981 + Krapels, Edward N.: Oil crisis management: Strategic stockpiling for international security. - Balitmore : The Johns Hopkins University Press, 1980 + Our energy: Regaining Control / Ross, Marc H. ; Williams, Robert H. (Hrsg.) - New York : McGraw-Hill, 1981. + Ebinger, Charles K. : The critical link: Energy and national security in the 1980s. - Cambridge, Mass. : Ballinger, 1982 + The world energy triangle: A strategy for cooperation / Hoffman, Thomas ; Johnson, Brian (Hrsg.) - Cambridge, Mass. : Ballinger 1981
Although a body of law has developed around the use of confidential informants in criminal investigations, the role of informants in national security matters is less clearly defined. This Note first examines the limitations on the use of informants in the criminal context that are imposed by the Fourth Amendment, a detailed set of guidelines issued by the Attorney General, and other sources of law. It then turns to the treatment of informants by the major sources of national security law, including the Foreign Intelligence Surveillance Act. Ultimately, this Note concludes that in the national security context, government agents are free from many of the restrictions placed on the use of informants in criminal investigations. Although this relative freedom may be necessary given the immediate challenge of combating international terrorism, care should be taken that the executive branch does not use informants in a way that violates individual privacy or oversteps other proper investigative boundaries.
National Security Strategy is a document of the highest strategic importance in one state that defines core values, interests, challenges, risks and threats to national security, as well as the organization of the national security system and national security policy in order to secure and achieve national interests. The Republic of Serbia defined its strategic priorities for the first time when it adopted the first National Security Strategy in 2009, and updated them in the new National Security Strategy adopted in 2019. An important part of the first Strategy was the concept of human security, which was indication that the Republic of Serbia formally considered the needs and values of an individual on an equal footing with the values of the state. This Strategy was deemed to be an expression of determination of the Republic of Serbia to create conditions for improving human security in economic, health, political and other aspects and through transparency, rule of law and responsibility. However, the new Strategy does not explicitly mention human security as a specific part of the integral concept of national security. Furthermore, it introduces several novelties that are in contrast with the prevailed human-centric mission of the previous strategy, and these novelties are focused towards territorial integrity, sovereignty and other state-centric issues. Bearing this in mind, the questions arising are: why this strategic turn was made and what are to be the implications of this change for human security. The main hypothesis is that the strategic turn to state-centrism instead of the human-centric approach promoted by the previous National Security Strategy was made because it corresponds to the global trend of revival of nationalism and sovereignty. However, this indisputably leaves room for criticism because people are the most important factor in the equation of integral national security and disregarding them in the national security strategies and policies can be problematized on multiple levels.
The eleventh volume of a highly acclaimed series on critical infrastructure and homeland security, Information Technology Protection and Homeland Security is an eye-opening account of a complex sector. This book describes the processes needed to identify assets, assess risk, implement protective programs, and measure their effectiveness.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
"Twenty-five years after the end of the Cold War, Euro-Atlantic security is under pressure. Faced with major geopolitical shifts, instability at its frontiers and financial crisis at home, the European nations and their American Allies will have to rethink how to design common security. Failure to animate the European Union (EU) and to reinvigorate the North Atlantic Treaty Organisation (NATO) as efficient tools for peace and security might lead the West back to the spectre of divided security, to fragmentation and renationalisation. This book addresses the main challenges to Western security from the perspective of two European Allies: Germany and Norway"--Provided by publisher