Information & Security: An International Journal最新文献

筛选
英文 中文
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers 人权与伦理视角下的安全和人的尊严:叙利亚寻求庇护者个案研究
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3302
F. Vietti, Roberto Franzini Tibaldeo
{"title":"A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers","authors":"F. Vietti, Roberto Franzini Tibaldeo","doi":"10.11610/isij.3302","DOIUrl":"https://doi.org/10.11610/isij.3302","url":null,"abstract":"The article tackles the plural and evolving concepts of security by ana-lysing their relation to human rights and ethics. Although the general impression is that seldom the security discourse is associated with the respect of human rights and ethics, at least from a theoretical point of view security is indeed intertwined with those normative features (first thesis). Moreover, ethics and human rights can be valuably and usefully employed to clarify issues related to security and eventually to suggest improvements in the political management of security issues (second thesis). We argue our theses by focusing on a case study of particular relevance to the present day debate on security: the Syrian asylum seekers headed to Europe. In our ethical and human rights enquiry into this case study we consider multiple as-pects related to security (‘de jure’ or normative, ‘de facto’ and perceptive-societal) and the interpretative lens provided by ethics and human rights sheds light on the crucial and manifold centrality played by the notion of human dignity.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security 如果区块链不能被屏蔽怎么办?加密货币与国际安全
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4301
Sean Costigan, G. Gleason
{"title":"What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security","authors":"Sean Costigan, G. Gleason","doi":"10.11610/isij.4301","DOIUrl":"https://doi.org/10.11610/isij.4301","url":null,"abstract":"Pariah states and criminal gangs are often early adopters of disruptive technologies. With blockchain, the possibilities for circumventing controls and systems— or creating new ways of business—are rich grounds for such early adopters. What has gone widely ignored in the buzz around cryptocurrencies is the role that states play and their changing perspectives on the matter. This article analyzes the geo-strategic implications of a suite of technologies that has the possibility of altering core economic tenets about money and, along the way, attracting the attention of those who would skirt the law. A R T I C L E I N F O : RECEIVED: 21 MAY 2019","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-Models and Methods for Project Management in the Public Area 公共领域项目管理的电子模型与方法
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1106
G. Pavlov, J. Karakaneva
{"title":"E-Models and Methods for Project Management in the Public Area","authors":"G. Pavlov, J. Karakaneva","doi":"10.11610/ISIJ.1106","DOIUrl":"https://doi.org/10.11610/ISIJ.1106","url":null,"abstract":"a. Transform operational need into a description of system performance parameters and a system configuration through the use of an iterative process of definition, synthesis, analysis, design, test, and evaluation; b. Integrate related technical parameters and ensure compatibility of all physical, functional, and program interfaces in a manner that optimises the total system definition and design; c. Integrate reliability, maintainability, safety, survivability, human, and other requirements into the total engineering effort to meet cost, schedule, and technical performance objectives.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bulgaria in NATO:New Roles and Capabilities of the Navy 保加利亚在北约:海军的新角色和能力
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1301
Emil Lyutzkanov
{"title":"Bulgaria in NATO:New Roles and Capabilities of the Navy","authors":"Emil Lyutzkanov","doi":"10.11610/ISIJ.1301","DOIUrl":"https://doi.org/10.11610/ISIJ.1301","url":null,"abstract":"In a comprehensive manner this article presents roles and missions of Bulgaria’s Navy, and the capabilities it develops to deal with the 21 century security challenges in cooperation with other services, security organizations, and allied navies. In the process of transformation, the Navy has developed ambitious plans to insert advanced technologies, commensurate to its new missions and tasks. This article looks specifically at plans to introduce advanced communications and information technologies in order to achieve required naval capabilities and to facilitate individual, crew, and staff training. New Roles, Missions, and Responsibilities of the Navies Facing 21 st Century Security Challenges Historically, the term ―national security‖ had various specific definitions and dimensions; however, they all had one common meaning – the reliable protection of the territorial integrity and the independence of a sovereign state. The challenge in this respect was how to approach and in what manner to realize this ―national security.‖ The turmoil of the political and societal changes in Europe in the 1990s and thereafter, the dissolution of a number of multinational states, e.g., the Soviet Union and the Socialist Federal Republic of Yugoslavia, the unification of Germany, the processes of globalization and unification of Europe, as well as the aggravation of demographic, ecological, economic and social problems and, most importantly, the expansion of the international terrorism and organized crime, brought forward a number of issues related to the notion of national security and the ways to realize it. In the last few years, the notion of national security went beyond the boundaries of a separate state. Of increasing importance are the notions of Individual Security, Collective Security, Bulgaria in NATO: New Roles and Capabilities of the Navy 10 Figure 1: Constituents of the Cooperative Security System. Collective Defense, and Promotion of Stability, constituting a system for common /cooperative/ security (This interaction of terms and notions is presented graphically in Figure 1). Security is based not only on military force and government actions, activities of national institutions and non-governmental organizations within a state, but also on international (bilateral and multilateral) treaties and organizations. In this respect I am proud to state that, since 1991, Bulgaria’s naval forces stand firmly behind the Atlantic idea. The Navy incorporated in its plans variety of activities aimed to increase the confidence and to foster collective security in the Black Sea region and to promote stability. Even prior to the ―Partnership for Peace‖ Initiative, in 1993 Varna hosted the international symposium ―Black Sea Naval Review‖—the first of its kind—on the topic ―The Naval Forces in the New Geopolitical Environment.‖ Under excellent organization, more than 100 participants form 13 countries actively discussed 26 reports. As a continuation of this effort,","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stakeholder Engagement Framework 利益相关者参与框架
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3802
P. Smith
{"title":"Stakeholder Engagement Framework","authors":"P. Smith","doi":"10.11610/ISIJ.3802","DOIUrl":"https://doi.org/10.11610/ISIJ.3802","url":null,"abstract":"Early Childhood Development), or in the case of some materials, by third parties (third party materials). No part may be reproduced by any process except in accordance with the provisions of the Copyright Act 1968, the National Education Access Licence for Schools (NEALS) (see below) or with permission. An educational institution situated in Australia which is not conducted for profit, or a body responsible for administering such an institution may copy and communicate the materials, other than third party materials, for the educational purposes of the institution.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks 考虑故障和网络攻击的关键基础设施监控多无人机任务规划
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4906
V. Kharchenko, I. Kliushnikov, H. Fesenko, O. Illiashenko
{"title":"Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks","authors":"V. Kharchenko, I. Kliushnikov, H. Fesenko, O. Illiashenko","doi":"10.11610/isij.4906","DOIUrl":"https://doi.org/10.11610/isij.4906","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standards Integration in E-Learning, Simulations, and Technical Manuals 电子学习、模拟和技术手册中的标准集成
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1406
J. Krinock
{"title":"Standards Integration in E-Learning, Simulations, and Technical Manuals","authors":"J. Krinock","doi":"10.11610/ISIJ.1406","DOIUrl":"https://doi.org/10.11610/ISIJ.1406","url":null,"abstract":"istance Learning (DL), Computer Based Training (CBT) and e-Learning today encompass a broad range of technologies and teaching theories and practices, all of which are being aggressively explored by various groups, enterprises, industries and interests around the world. This huge arena of exploration involves incalculable combinations of technologies and learning theories. Where all of this will lead cannot be clearly projected, neither in terms of the technologies that will apply tomorrow, nor how the teaching methods encompassed and affected by those technologies will be shaped and altered.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Generation Principles Impact Cybersecurity 公钥生成原则影响网络安全
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4717
N. Stoianov, Andrey Ivanov
{"title":"Public Key Generation Principles Impact Cybersecurity","authors":"N. Stoianov, Andrey Ivanov","doi":"10.11610/isij.4717","DOIUrl":"https://doi.org/10.11610/isij.4717","url":null,"abstract":"A R T I C L E I N F O : RECEIVED: 22 JUNE 2020 REVISED: 08 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : public key cryptography, Miller–Rabin primality test improvement, cybersecurity Creative Commons BY-NC 4.0 Introduction Nowadays the growing use of online communications over the Internet and the associated threats to the data we exchange, requires sufficient and reliable protection of the information exchanged. One of the most reliable and basic method to make information secure, when two communicating parties don't know each other, is public key cryptography. Hard-to-solve mathematical problems are used to realize the mathematical foundations of the existing algorithms using public key cryptography. 2 In this mathematics, integer operations with large numbers are used and are based on modulo calculations of large prime numbers. Large prime numbers are also used to produce the user’s cryptographic keys (public and private). N. Stoianov & A. Ivanov, ISIJ 47, no. 2 (2020): 249-260 250 We could state that the security of the exchanged data protected by public key cryptography is due to two main facts: the difficulty of solving a mathematical algorithm and the reliability of the generated prime numbers used as keys in such a system. In this paper we will consider deterministic and probabilistic primality tests and will focus over the most widely used in practice an algorithm for testing prime numbers, that of Miller-Rabin 3, 4 and we will propose a new addition to it, which will increase the reliability of the estimation that this probabilistic algorithm gives. Public Key Generation and The Importance of The Prime Numbers Public key cryptography algorithms are based on two main things: difficult to solve mathematical problems and prime numbers with big values that serve as user private keys. If that prime numbers are generated not according to the prescribed rules or are not reliably confirmed as such, the security strength of protected data could be not enough. In an effort to ensure better protection of information, new algorithms and rules for generating private keys and the prime numbers involved in their compilation are created and proposed. 6 The more than 85% from certificate authorities (CA) based their root certificate security by using RSA encryption and signing scheme. Approximately of 10% of CA combinate both RSA and ECDSA cryptographic schemes to protect their public key infrastructure (PKI). This statement is based on our study in which we analysed the certificates stored into Windows, Android and Linux operating systems (OS) certificates stores. These operating systems are the most commonly used worldwide. We can say that a reliable estimate of divisibility of numbers is essential. Connected with this we will consider algorithms for primality testing. In practice, they are divided into two main types. Deterministic and probabilistic algorithms. Deterministic Primality Testing The most elementary approach to primality proving is tr","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AN AGENT-BASED APPROACH TO THE DEVELOPMENT OF INFORMATION SYSTEMS FOR MILITARY LOGISTICS 基于代理的军事后勤信息系统开发方法
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0813
S. Stojanov, R. Venkov, R. Radev.
{"title":"AN AGENT-BASED APPROACH TO THE DEVELOPMENT OF INFORMATION SYSTEMS FOR MILITARY LOGISTICS","authors":"S. Stojanov, R. Venkov, R. Radev.","doi":"10.11610/ISIJ.0813","DOIUrl":"https://doi.org/10.11610/ISIJ.0813","url":null,"abstract":"The development of modern information systems in various application areas (e-commerce, logistics, and intelligent telecommunication services) presents a serious challenge to software technologies. This can be acknowledged to the difficulty, complexity, heterogeneity and distributed functionality of the systems. It is still a difficult task to find a homogeneous technological framework for the effective solution of these problems. Different models and standard frameworks have been developed for this kind of systems.1 Although they posses certain advantages, the requirement for generality makes their application in specific domains relatively expensive. In addition, considerable resources are needed for their adaptation.2 Agent-based systems solve some of these problems, especially those systems developed in e-commerce applications.3 The agent-based technology offers flexibility and easier adaptation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel 西非和萨赫勒地区组织间合作与反恐斗争
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.4811
O. Ajala
{"title":"Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel","authors":"O. Ajala","doi":"10.11610/ISIJ.4811","DOIUrl":"https://doi.org/10.11610/ISIJ.4811","url":null,"abstract":"The transnational nature of security threats in the 21st Century are such that interorganizational cooperation is necessary to effectively combat these threats. This article explores a key organization, the Multinational Joint Task Force (MNJTF), charged with curtailing the threat posed by terrorism in certain parts of the Sahel and West Africa. Using the theoretical framework of Walt’s balance of threat and a combination of data obtained from ACLED and expert interviews, the article argues that the MNJTF has not been successful in achieving its mandate. This could be attributed to five lapses in the restructuring of the organization in 2015 to combat terrorism. The article concludes that for interorganizational security cooperation to be successful, the allies must equally acknowledge that they face the same existential threats which will make them commit to the demands of the organisation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信