• Title/Summary/Keyword: Security Governance

Search Result 153, Processing Time 0.024 seconds

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

National Information Security Agenda and Policies (국가 정보보안 이슈 및 정책방안에 관한 연구)

  • Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • This study is to propose national information security policies based on the policy framework, which has four components: government, industry/company, individual, and environments. According to the framework, the four policy agenda are derived: national information security governance scheme, information security industry competitiveness and corporate security level enhancement, eco-system for security professionals, and finally related laws & regulations modification and security culture movement. Specific issues and policies in each agenda are proposed.

Features of the Discussion Method in the Training of Students in the Context of Distance Learning

  • Irina Gladilina;Svetlana Sergeeva;Lyudmila Pankova;Vladimir Kolesnik;Ekaterina Svishcheva
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.77-82
    • /
    • 2023
  • The article considers online discussion as an interactive learning method in the conditions of distance learning. The essence of discussion and the stages of its organization are described. The main objective of discussion in distance learning is defined as the stimulation of interest in learning and the involvement of various viewpoints in an active discussion of the stated problems. The key role in ensuring the efficiency of a discussion is identified. The article develops a model for organizing asynchronous online discussions on the Moodle platform, highlighting the sequence of stages and their content. An experimental study of the use of the discussion method in the training of students in distance learning conditions is carried out. Based on the results of the methodological experiment, conclusions are drawn about student interest in online discussions. The authors conclude that the interest of students of different specialties in asynchronous online discussions varies, and the greatest interest is demonstrated by linguistics students. Nevertheless, the differences in student interest in online discussions by groups (specialties) are more likely attributable to subjective factors, which do not affect the overall picture in a major way.

Collaborative Governance, Decent Work and Innovation: An Analytical Framework for Sustainable Workplaces Based on the Case of Philippine Science and Technology Parks

  • SALE, Jonathan
    • World Technopolis Review
    • /
    • v.5 no.1
    • /
    • pp.71-82
    • /
    • 2016
  • This paper explores, explains and describes a framework for analyzing collaborative governance, decent work and innovation as fundamental elements of sustainable workplaces through case study of Philippine science and technology (S & T) parks. Rules, or the legal infrastructure, are particularly significant considerations that facilitate or hinder collaboration. Industrial relations/human resource (IR/HR) practices are essential to collaboration and decent work. Employee consultation and labor-management council or committee are examples of IR/HR practices that might contribute to collaboration and decent work in firms and workplaces in S & T parks as they are team approaches to production, too. Collaboration and decent work enhance the capacity to innovate. In the long run, collaborative governance, decent work and innovation tend to converge in the concept of sustainable development. The interdependencies and interactions among collaborative governance, decent work and capacity to innovate in firms operating in S & T parks make possible new solutions to new problems (i.e., innovation) and, thus, sustainable workplaces.

Transnational Labor Migration in Southeast Asia and Regional Governance: In Search of Good Governance (동남아시아의 이주노동과 지역 거버넌스)

  • Choi, Horim
    • The Southeast Asian review
    • /
    • v.20 no.2
    • /
    • pp.135-178
    • /
    • 2010
  • This study is to seek alternatives for regional governance related to transnational labor migration issues in Southeast Asia. This study examined the present situation and trends of labor migration in the region, reviewed involved transnational issues, and identified the current issues of governance to seek alternatives for regional governance. The increase in cross-border labor migration is no doubt a sign of growth and dynamism of the region and greater integration of their economies. But it also poses complex policy and management issues as well as transnational issues over such as unequal economic profits, illegal migration, human rights, and social security issues. In this reality, regional governance is a very important theme and the efforts to manage their migration inherently involve fundamental conflict and tension between related countries and regions. However, politics and governance of transnational migrant workers in Southeast Asia are still pursued at the national level. To resolve these issues, it is urgently required to secure not only collaboration between the parties concerned but also governance at the regional level. Findings of this study are: First, although labor migration has been a relatively long-time transnational issue, the history of addressing the issue at the regional governance is very short and still inceptive. Second, given its size, labor migration in Southeast Asia requires effective regional governance but no breakthrough was possible due to the conflict of interests between origin and destination countries and the conflict of logic between the labor market and the state. Third, the issue of labor migration is an important element for the formation of economic and socio-cultural communities the ASEAN countries have pursued. Fourth, it is urgently needed to seek alternatives for good and effective regional governance as a key to resolving these issues over migrant workers in Southeast Asia.

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

A Study on the Development of Consortium Blockchain Governance Framework (컨소시엄 블록체인 거버넌스 프레임워크 개발에 관한 연구)

  • Park, Jin-Sang;Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.89-94
    • /
    • 2019
  • Due to the limitations of public and private blockchain, several organizations are implementing consortium blockchain systems. In order for an organization to conduct business using blockchain, it must consider 'blockchain governance' factors, such as decision rights, accountability and incentives over on-chain and off-chain, depending on the organization's strategy and objectives. If an organization conducts business without blockchain governance, it cannot achieve its strategy and objectives systematically, effectively and efficiently, and cannot comply with internal external requirements such as the expectations of stakeholders and laws. However, as businesses using consortium blockchain expand, there is no research on consortium blockchain governance. Thus, in this study, the consortium blockchain governance framework, including functions, roles and responsibilities, was developed to help organizations effectively and efficiently conduct business using consortium blockchain. In addition, to review the feasibility of the developed consortium blockchain governance framework, the framework was reviewed through an advisory committee consisting of experts on blockchain and governance over two occasions. As a result of the review, components of the consortium blockchain governance framework, including functions, roles and responsibilities, were considered complete and relevant.

Problems of Applying Information Technologies in Public Governance

  • Goshovska, Valentyna;Danylenko, Lydiia;Hachkov, Andrii;Paladiiichuk, Sergii;Dzeha, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.71-78
    • /
    • 2021
  • The relevance of research provides the necessity to identify the basic problems in the public governance sphere and information technology relations, forasmuch as understanding such interconnections can indicate the consequences of the development and spreading information technologies. The purpose of the research is to outline the issues of applying information technologies in public governance sphere. 500 civil servants took part in the survey (Ukraine). A two-stage study was conducted in order to obtain practical results of the research. The first stage involved collecting and analyzing the responses of civil servants on the Mentimeter online platform. In the second stage, the administrator used the SWOT-analysis system. The tendencies in using information technologies have been determined as follows: the institutional support development; creation of analytical portals for ensuring public control; level of accountability, transparency, activity of civil servants; implementation of e-government projects; changing the philosophy of electronic services development. Considering the threats and risks to the public governance system in the context of applying information technologies, the following aspects generated by societal requirements have been identified, namely: creation of the digital bureaucracy system; preservation of information and digital inequality; insufficient level of knowledge and skills in the field of digital technologies, reducing the publicity of the state and municipal governance system. Weaknesses of modern public governance in the context of IT implementation have been highlighted, namely: "digitization for digitalization"; lack of necessary legal regulation; inefficiency of electronic document management (issues caused by the imperfection of the interface of reporting interactive forms, frequent changes in the composition of indicators in reporting forms, the desire of higher authorities to solve the problem of their introduction); lack of data analysis infrastructure (due to imperfections in the organization of interaction between departments and poor capacity of information resources; lack of analytical databases), lack of necessary digital competencies for civil servants. Based on the results of SWOT-analysis, the strengths have been identified as follows: (possibility of continuous communication; constant self-learning); weaknesses (age restrictions for civil servants; insufficient acquisition of knowledge); threats (system errors in the provision of services through automation); opportunities for the introduction of IT in the public governance system (broad global trends; facilitation of the document management system). The practical significance of the research lies in providing recommendations for eliminating the problems of IT implementation in the public governance sphere outlined by civil servants..

Past, Present and Future of Blockchain Technology (블록체인 세대별 기술 동향)

  • Park, J.S.;Park, J.Y.;Choi, S.M.;Oh, J.T.;Kim, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.139-153
    • /
    • 2018
  • The explosive interest in block chain, which was triggered by Bitcoin in 2009, is leading to substantial investment and the development of block chain technology. There is no dispute among experts that block chain will be the next generation of innovation. However, despite the high expectations for block chains, the related technology still has certain limitations. In addition to improving issues such as a low transaction throughput, inefficient agreement algorithms, and an inflexible governance structure, it is necessary to solve various problems for commercialization and full-scale spreading owing to the trilemma problem among the scalability, security, and decentralization. Under this situation, identification of the technology characteristics according to the generation is helpful for the development of the core technology requirements and commercialization blueprint in establishing an R&D direction. Therefore, in this article, the development of blockchain technology is divided into generations and analyzed in terms of the operational structure, consensus algorithm, governance, scalability, and security.