772 results
Search Results
2. Science and Security: Strengthening US-China Research Networks through University Leadership. Research & Occasional Paper Series: CSHE.11.2021
- Author
-
University of California, Berkeley. Center for Studies in Higher Education (CSHE) and Farnsworth, Brad
- Abstract
This paper describes the current criticisms of academic research collaboration between the US and China and proposes a university-led initiative to address those concerns. The article begins with the assertion that bilateral research collaboration has historically benefitted both countries, citing cooperation in virology as an example. The paper continues with a discussion of the criticisms leveled by several US government agencies against the Chinese government, especially with regard to the Thousand Talents Program (TTP). A close examination of publicly available appointment letters under the TTP suggests that Chinese universities are given wide discretion when it comes to defining the specific terms of scholarly collaboration. Along with additional supporting arguments, the paper concludes that the most significant violations of commonly accepted research norms are owing to the behavior of individual Chinese institutions and are not directed by the TTP or the Chinese national government. The paper then suggests several steps for addressing these issues at the university level, beginning with a convening of campus leaders from both countries.
- Published
- 2021
3. Two City-States in the Long Shadow of China: The Future of Universities in Hong Kong and Singapore. Research & Occasional Paper Series: CSHE.10.2021
- Author
-
University of California, Berkeley. Center for Studies in Higher Education (CSHE), Penprase, Bryan E., and Douglass, John Aubrey
- Abstract
Hong Kong and Singapore are island city-states that exude the complicated tensions of postcolonial nationalism. Both are influenced directly or indirectly by the long shadow of China's rising nationalism and geopolitical power and, in the case of Hong Kong, subject to Beijing's edicts under the terms of the 1984 Sino-British Joint Declaration. Both have productive economies dependent on global trade, and each has similar rates of population density--Hong Kong's population is 7.4 million and Singapore is home to 5.8 million people. It remains to be seen whether Hong Kong's peripheral nationalist identity will be retained, or whether the increasingly assertive influence and control by mainland China will prevail and fully assimilate Hong Kong. But it is apparent that Hong Kong is at a turning point. Throughout 2019, protesters filled the streets of the city, worried about declining civil liberties, specifically Beijing's refusal to provide universal suffrage as promised previously in law and the disqualification of prodemocracy candidates, along with the growing control of Hong Kong's government and universities by Chinese central government designates and fears of an ever-expanding crackdown on dissent. Singapore provides a less dramatic but relevant example of the tension caused by the influx of foreign national students and academics who often displace native citizens, combined with government-enforced efforts to control dissent in universities. And like Hong Kong, the long shadow of China influences the role universities are allowed to play in civil society. The following is an excerpt from the book "Neo-Nationalism and Universities: Populists, Autocrats and the Future of Higher Education" (Johns Hopkins University Press) that explores the implications of nationalist movements on universities in Hong Kong and Singapore. In both, university leaders, and their academic communities, value academic freedom and the idea of independent scholarship. Yet the political environment is severe enough, and the opportunity costs great enough, that they, thus far, remain generally neutral institutions in a debate over civil liberties and the future of their island states. The exception is the key role students have played in the protest movement in Hong Kong, but for how long?
- Published
- 2021
4. Senator John D. (Jay) Rockefeller IV papers
- Author
-
Rockefeller, John D. and Rockefeller, John D.
- Subjects
- Child welfare., Coal miners--West Virginia, Democratic Party, National security., Steel industry and trade., United States. Congress -- History -- 20th century, Veterans United States., Wireless communication systems Law and legislation., Anciens combattants États-Unis., Veterans, Child welfare, National security, Steel industry and trade, Wireless communication systems Law and legislation, United States
- Abstract
The "View now" link directs to the finding aid only. Please email wvrhcref@westvirginia.libanswers.com or call 304-293-3536 for more information about accessing collection A&M 4050 Senator John D. (Jay) Rockefeller IV papers, 1960-2015. John Davison (Jay) Rockefeller IV (b. 1937) represented West Virginia in the United States Senate for five terms. He was elected as a Democrat to the Ninety-ninth Congress and served from January 15, 1985, to January 3, 2015. He was not a candidate for reelection in 2014. Rockefeller previously served in the West Virginia House of Delegates (1966-1968); as Secretary of State of West Virginia (1968-1972); president of West Virginia Wesleyan College (1973-1976); and Governor of West Virginia (1977-1985). From 1964-1966, he was a volunteer in the Volunteers In Service To America (VISTA) program in Emmons, West Virginia. The bulk of the Senator John D. (Jay) Rockefeller IV papers document his 30-year career in the United States Senate with additional materials related to his earlier political career.
- Published
- 2023
5. All talk, no walk?: A review of the 2016 defence white paper
- Author
-
Le, Felicity
- Published
- 2021
6. Critical review of intelligence issues and recommendations relevant to the next defence white paper
- Author
-
Dudley, Jake
- Published
- 2021
7. Peter Dutton backs release of Iraq war papers after Morrison government failure; Department claims key documents outlining reasoning behind joining US-led invasion were not included in an 'apparent administrative oversight'
- Subjects
National security ,Prime ministers ,News, opinion and commentary - Abstract
Byline: Sarah Basford Canales and Amy Remeikis Peter Dutton has thrown his support behind the release of documents relating to Australia's decision to join the Iraq war following the failure [...]
- Published
- 2024
8. Intelligent Learning in Studying and Planning Courses -- New Opportunities and Challenges for Officers
- Author
-
Saastamoinen, Kalle, Rissanen, Antti, and Mutanen, Arto
- Abstract
There were two projects at the National Defence University of Finland (NDU), which both ended by the end of 2022. One of them tried to find the answers to the main question: How artificial intelligence (AI) could be used to improve learning, teaching, and planning? The other tried to find the answer to the main question: What new skills do officers need when artificial intelligence is coming? We did literature reviews and found out that intelligent technology combined with data analytics can offer several improvements to traditional classroom teaching. From literature reviews, we also found some new skills that officers might need to be able to handle AI-based technologies. This is a position paper presenting the arguable opinions of the writers. We have found lots of benefits that the use of intelligent learning technology can bring, mainly by supporting individual learning paths. There is also an obvious need for AI officers who should have a deeper understanding of the AI-supported technology than normal officers. This project and some other similar projects have raised a lot of discussions, one seminar series about artificial intelligence and we do have some trained AI officers as well. [For the full proceedings, see ED629086.]
- Published
- 2023
9. Court Papers Offer Glimpse of Trump’s Defense in Classified Documents Case
- Author
-
Feuer, Alan
- Subjects
National security ,Public prosecutors -- Planning ,Ex-presidents -- Planning ,Company business planning ,News, opinion and commentary - Abstract
The former president’s lawyers may question whether the documents he took from the White House were related to national defense and whether the country’s security was damaged. Lawyers for former [...]
- Published
- 2024
10. Beijing calls for equality in new tech governance; Position paper to UN hits out at US curbs and seeks system that benefits all countries
- Author
-
Zhen, Liu
- Subjects
National security ,Technology ,News, opinion and commentary ,United Nations - Abstract
China has hit out at United States-led tech curbs in its latest position paper to the United Nations, calling for an “open, fair, equal and non-discriminative” environment for all countries [...]
- Published
- 2023
11. Why the Pentagon Papers Leaker Tried to Get Prosecuted Near His Life’s End
- Author
-
Savage, Charlie
- Subjects
United States. Department of Justice ,Pentagon Papers (Nonfiction work) ,National security ,Espionage ,News, opinion and commentary ,Espionage Act of 1917 - Abstract
When Daniel Ellsberg was 42, a judge threw out Espionage Act charges against him. At 90, he sought such charges again in hope of challenging their constitutionality. In the last [...]
- Published
- 2023
12. Paper ‘turned radical after Lai US trip’; Staff were excited about high-level Washington meeting, ex-publisher says
- Author
-
Wong, Brian
- Subjects
National security ,Publishing industry ,Publishing industry ,News, opinion and commentary - Abstract
The now-defunct Apple Daily tabloid newspaper turned “radical” after its founder Jimmy Lai Chee-ying met top US leaders such as Mike Pence and Mike Pompeo to seek their support for [...]
- Published
- 2024
13. Tycoon ‘started English paper to win U.S. support’; Court told how Lai wanted American politicians to subscribe to digital outlet as this would offer ‘political protection’ against Beijing crackdown
- Author
-
Wong, Brian and Wong, Natalie
- Subjects
National security ,Security guards ,News, opinion and commentary - Abstract
An English language edition of the now-closed Apple Daily tabloid was created at founder Jimmy Lai Chee-ying’s request in a bid to drum up international support and head off a [...]
- Published
- 2024
14. Journalists at foreign-owned outlets in Australia could face jail for exposing ADF war crimes, paper suggests; Press freedom policy paper says Australia's foreign interference laws could be used to target journalists who 'prejudice national security'Get our free news app, morning email briefing or daily news podcast
- Subjects
Podcasting ,Electronic mail systems ,National security ,Journalists ,Freedom of the press ,War crimes ,E-mail ,News, opinion and commentary ,University of Queensland - Abstract
Byline: Daniel Hurst Journalists working for foreign-owned outlets could face jail under Australia's foreign interference laws for exposing defence force war crimes or misuse of surveillance powers, a new paper [...]
- Published
- 2022
15. Trump regretted not declassifying retained military document in recording; Federal prosecutors have obtained audio in which the former president acknowledged he retained a classified paper on Iran
- Subjects
National security ,Ex-presidents ,News, opinion and commentary - Abstract
Byline: Hugo Lowell in Washington Federal prosecutors obtained audio recording of a summer 2021 meeting where Donald Trump suggested he should have declassified a military document about Iran he admitted [...]
- Published
- 2023
16. McCarthy says documents are safer in bathrooms than garages. Is he right? Construction experts say bathrooms are -- believe it or not -- one of the worst spots for keeping papers secureUS politics -- live updates; Construction experts say bathrooms are -- believe it or not -- one of the worst spots for keeping papers secureUS politics -- live updates
- Subjects
National security ,News, opinion and commentary - Abstract
Byline: Wilfred Chan Let's say you're a world leader who has improperly retained juicy national security secrets after leaving office. What would be a safer place to stash them: your [...]
- Published
- 2023
17. Reports of Chinese spy base plan for Cuba ‘not accurate’; Pentagon dismisses paper’s claim Beijing offered Havana billions of US dollars for secret station
- Author
-
Delaney, Robert and Patrick, Igor
- Subjects
National security ,Company business planning ,News, opinion and commentary - Abstract
The White House and Pentagon called media reports on Thursday of Chinese plans to build a spy facility in Cuba inaccurate, capping a day in which new concerns about national [...]
- Published
- 2023
18. Australia : Review of secrecy provisions consultation paper released
- Subjects
National security ,Business, international - Abstract
The Albanese Government has commenced public consultations as part of its landmark review of Commonwealth secrecy offences. The consultation paper, which advances the Governments press freedom agenda, includes a complete [...]
- Published
- 2023
19. (Critical Review) Repositioning Science and Technology Education for Security and National Economic Growth and Development in Nigeria
- Author
-
Isa, Ibrahim Mohamm
- Abstract
This article examined the repositioning of science and technology education for security and economic growth and development in Nigeria. The wreck on the nation's image by the incidences of insurgency has caused negative effects on the nation's security and economic development. Security issues are presently major challenges in Nigeria, especially in Northern Nigeria. Furthermore, the continuous rise in insecurity and deterioration in the economic development in Nigeria has called for concern among researchers and policymakers over the years. This article highlights the need for rebranding Nigerians through the internal process of repositioning the science and technology education system for national security and economic sustainability. Literature and other research papers using to gather information. The paper recommends that the nation adopt a proactive approach to improving the teaching and learning of science and technology education professionally and empowering youth while taking everlasting measures to curtail the issues of insurgencies in Nigeria. In other words, we need to reposition our youth's mental reasoning and economically empower them to certify the demands of the modern world. Repositioning Nigerian is one of the fruitful tools to achieve this objective, and rebranding directs the power and energy of Nigerians toward academic and productive goals.
- Published
- 2022
20. Government Cloud Computing and National Security
- Author
-
Abd Al Ghaffar, Hedaia-t-Allah Nabil
- Published
- 2024
- Full Text
- View/download PDF
21. First Thing: Court battle begins over Trump's special master review of papers; Should the former president lose, the materials seized from Mar-a-Lago will be available for the criminal investigation. Plus, your daily update on the Qatar World Cup
- Subjects
National security ,Criminal investigation ,Ex-presidents ,News, opinion and commentary - Abstract
Byline: Nicola Slawson Good morning. The justice department will ask a court today to void the special master review examining documents seized from Donald Trump's Mar-a-Lago residence and make the [...]
- Published
- 2022
22. Lebedev papers withheld despite promise to publish
- Subjects
National security ,General interest - Abstract
Byline: Mason Boycott-Owen MINISTERS have been accused of a 'cover up' after withholding the security advice on Evgeny Lebedev's peerage. The Cabinet Office did not publish the detailed advice in [...]
- Published
- 2022
23. The Nexus of Public Diplomacy, Soft Power, and National Security: A Comparative Study of International Education in the U.S. and Canada
- Author
-
Desai-Trilokekar, Roopa and El Masry, Hani
- Abstract
This paper examines how international education (IE), as an important tool of public diplomacy (PD) and soft power (SP), faces unique challenges as issues of national security (NS) become more prominent in this era of new geopolitics. It presents a model to understand the relationship between PD, SP and NS and then applies this model to a comparative study. The contrasting histories, approaches and perspectives of IE as it operates as a component of foreign policy and at the nexus of PD, SP and NS in both the U.S. and Canada are analysed. The paper concludes with three challenges faced by IE in the contemporary context: first, the diminishing role of the university as a distinct and valued non-state actor; second, the weakening of foreign policy as an outward looking, distinctly international investment; and third, the problem with choosing isolation over engagement as a strategy.
- Published
- 2022
24. Teaching with Biosecurity Content in the Social Sciences Learning Area: A Year 13 Social Science Teacher's Experience
- Author
-
Ram, Rajesh
- Abstract
In this era of pandemics, asylum seekers, and conflict between super powers, social sciences are a critical subject that can help develop young people who can not only recognise racial and social discrimination but also injustices at a regional, national, and global scale. Mainstream subjects, such as sociology, routinely support learning in the social sciences area. As a science/biology teacher, I wanted to find out whether biosecurity science could be used to support learning in the social sciences area. My interest in biosecurity stems from personal and professional experiences in New Zealand. Further, in my own pedagogical experience, teaching science/biology in schools, I found young people (15-18 years) were unfamiliar with the concept of biosecurity in New Zealand. Considering my experiences, I set out to conduct research to look at the efficacy of using biosecurity in teaching and learning. This paper reports on the experience of one Year 13 social science teacher who used biosecurity content to teach in the social sciences learning area. Classroom observations and individual teacher interviews were used to gather data. The results show that biosecurity content engaged Year 13 social sciences students in the classroom and that the teacher used transformational learning theory to engage his students into undertaking social action related to biosecurity. Given the importance of biosecurity to New Zealand, this paper shows that social sciences as a learning area could support teaching and learning about biosecurity.
- Published
- 2022
25. Kremlin papers appear to show Putin's plot to put Trump in White House; Exclusive: Documents suggest Russia launched secret multi-agency effort to interfere in US democracy
- Subjects
National security ,Espionage, Russian ,Presidents -- Elections ,Intelligence service ,Democracy -- Russia ,News, opinion and commentary ,United Nations. Security Council - Abstract
Byline: Luke Harding, Julian Borger and Dan Sabbagh Vladimir Putin personally authorised a secret spy agency operation to support a 'mentally unstable' Donald Trump in the 2016 US presidential election [...]
- Published
- 2021
26. Evolution of French Military Policy
- Author
-
Olga A. Smirnova and Milena V. Shpigovskaya
- Subjects
france ,white paper ,national defense ,national security ,military-political strategy ,european union ,north atlantic alliance ,armed forces ,defense budget ,Political science ,Sociology (General) ,HM401-1281 - Abstract
The article studies the evolution of the military-political course of the French Fifth Republic. The authors provide a comprehensive analysis of the four editions of the French White Paper, which are the conceptual foundations of the country’s defense and national security strategy. Particular attention is paid to the impact of the domestic political situation, international political and economic processes, as well as membership in the European Union and the North Atlantic Alliance on the formation of France’s defense policy. The methodological basis for the study of the French military policy evolution is a systematic approach: a comprehensive study of the Fifth Republic’s defense and national security strategy as parts of the global European security architecture, which consists of closely related components. In addition the authors use the concrete-historical method, as well as induction, deduction, content analysis and comparative analysis of the Fifth Republic’s regulatory and legal documentation in the field of national defense and security, which allowed identifying elements of the specifics and continuity of the military-political course of France. With the help of forecasting, as well as a statistical method based on official data from government departments and research centers, the authors assessed the state of the French Republic Armed Forces. The excessive involvement of the French armed forces in various external and internal military operations, accompanied by a reduction in the number of personnel and deterioration of their equipment, weakens of the combat potential of Paris.
- Published
- 2023
- Full Text
- View/download PDF
27. Strategies for Applying Systemic Functional Linguistics in Critical Discourse Analysis on the News 'Scenario Ferdy Sambo' in Online Media Kompas and Tempo
- Author
-
Fauzan, Umar
- Abstract
The research paper explores the application of Functional Systemic Linguistics (FSL) in Critical Discourse Analysis (CDA) on the news "Scenario Ferdy Sambo" in online media Kompas and Tempo. FSL is used to analyze the textual features of the news, including the choice of words, grammar, and coherence, to identify the underlying ideologies and power relations embedded in the discourse. CDA is employed to analyze the social context and discourse practices surrounding news production and consumption, including the actors involved, their interests, and the implications of the news for society. This research analyzes the news of the murder case of Brigadier J, who dragged the name of a general, Ferdy Sambo. This case is at the forefront of a problem that is rife throughout society. The internet media, particularly Tempo and Kompas, highlighted stories connected to the unearthing of CCTV that Ferdy Sambo had buried. News writing portrays thoughts and manifestations of emotion in the individuals who read it. This analysis tries to describe the structure of the text and the social context of the discourse news in Kompas and Tempo. The research technique incorporates Teun A. Van Dijk's critical discourse analysis. Data were acquired via viewing the tempo and Kompas websites. The results of the analysis demonstrate that the structure of the text is built on elements of macrostructure, superstructure, and microstructure in the form of semantic, syntactic, stylistic, and rhetorical features that underpin the overall discourse. Analysis related to the social context provides an overview of the representation of the reader/community regarding the allegations of Ferdy Sambo's involvement in the killing of Brigadier J through the CCTV found. This leads to the people's thinking/ideology that the news is according to what they need because it is plain and open. The materials supplied in the discourse provided further explanations and disrupted the basic scenario of Ferdy Sambo, who was not involved in the death of Brigadier J.
- Published
- 2022
28. Web Attacks and Defenses: Review Paper.
- Author
-
Ahmed, A. A. and Al Dabbagh, N. B.
- Subjects
COMPUTER systems ,INTERNET security ,NATIONAL security ,FEDERAL government ,CYBERTERRORISM - Abstract
Copyright of Journal of Education & Science is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
29. Japanese Surveillance in Colonial Korea: Analysis of Japanese Language Textbooks for Korean Students during the Colonial Era
- Author
-
Hai Suk Kim and Dong Bae Lee
- Abstract
This paper explores how Japan employed language education to justify Japanese imperial surveillance practices by examining the depiction of policemen and military police officers in Japanese language textbooks used by Korean primary students during the colonial period under Japanese rule. The analysis of the Japanese language textbooks used during this period uncovered the colonial educational goals and ideologies presented to Korean students, the ideal colonial citizens desired by the ruling system, and colonial aims furthered. This study investigates the ideologies presented in the textbooks using Critical Discourse Analysis (CDA) and Visual Image Analysis (VIA) by analyzing eight textbooks that were used in Japan and Korea. Both images and texts relating to Japanese government officials in the textbooks for Koreans from the colonial era are analyzed. The study reveals that the textbooks positioned Korean students to accept and integrate Japanese ideologies and attempted to indoctrinate Koreans into believing that the Japanese government officials were kind and cooperative, while also maximizing their authority over the colonized in their portrayal. The portrayal of government officials in the textbooks further reinforced this by showing the colonized having to display good behavior to authority figures, while not conveying any negative images of the government officials.
- Published
- 2023
- Full Text
- View/download PDF
30. The Long-run Impact of Childhood Wartime Violence on Preferences for Nuclear Proliferation.
- Author
-
Kim, James D.
- Subjects
NUCLEAR nonproliferation ,VIOLENCE ,NUCLEAR weapons ,REGIONAL differences ,BABY boom generation ,INDIVIDUALS' preferences - Abstract
How do childhood experiences of wartime violence affect individuals' preferences for nuclear proliferation? This paper argues that individuals who experienced severe war violence during childhood are more likely to value the security-enhancing aspects of nuclear weapons. These individuals are more concerned about being exposed to additional wartime violence, so they view nuclear weapons as a deterrent against large-scale invasions. By utilizing the geographic variation of violence intensity during the Korean War, this paper compares the pre-war and post-war cohorts who resided in severely damaged regions and relatively safe areas. Within the pre-war cohort, I find that individuals who resided in war-torn areas are more supportive of nuclear proliferation than those who were exposed to less violence. This regional difference, however, is not substantial in the post-war generation. The results suggest that direct exposure to wartime violence during childhood increases public demand for nuclear weapons when confronted with security threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. RELEVANT ACTORS AND EXISTING INTERDEPENDENCIES IN SECURITY ASSURANCE AT REGIONAL LEVEL BY ROMANIA.
- Author
-
NICA, Ioana
- Subjects
NATIONAL security ,CIVIL rights ,REGIONAL differences - Abstract
The weak sense of security that is specific to the region that our country is part of, and also at the international level, renders the membership of an alliance and cooperation a necessity. The collaboration between NATO and the EU, the main actors and guarantors of security in recent years, in Europe, with other states and international organizations is essential to address threats and preserve our security. "Those ready to give up a fundamental right in order to achieve a temporary sense of security deserve neither the right, nor the security" (Popescu 2020), said Benjamin Franklin. Regardless of our opinion about what he said, we can all agree that freedom and security are two very hot topics given the current context. This paper analyses the main themes of the relevant actors and of the existing interdependencies in ensuring security in the region and the influences that lead to destabilization in the region. The main purpose of this paper is to analyse both the internal and external factors that influence national and regional security strategy. Being given these facts, this paper underlines the risk factors that can influence and endanger peace and security, as well as the international bodies and the relations that place Romania on the regional security providers list. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Industry Day: Make Personal Protective Equipment (ppe) In America Act
- Subjects
United States. Department of Health and Human Services ,United States. Department of Homeland Security ,United States. Department of Veterans Affairs ,Protective clothing ,National security ,Business, international - Abstract
Special notice (original): industry day: make personal protective equipment (ppe) in america act you are cordially invited to attend an industry convening event on wednesday may 1, 2024, at 2:00-2:45 [...]
- Published
- 2024
33. Artificial intelligence: economy, intellectual property, threats
- Author
-
Hennadii Androshchuk
- Subjects
National security ,White paper ,Economy ,business.industry ,Political science ,Digital transformation ,Legislature ,Context (language use) ,Economic impact analysis ,Commission ,Artificial intelligence ,Intellectual property ,business - Abstract
Keywords: artificial intelligence, economic impact, intellectual property, regulation,cybersecurity, risks, threats, national security Artificial intelligence (AI) technologies, the spread of which is based on thewidespread use of digital information and the rapid growth of computing power, areleaving the realm of purely theoretical research and becoming one of the segmentsof the world market that can have truly revolutionary consequences. The paper provideseconomic and legal analysis of the state and trends of AI, identifies its impacton the economy, the importance of the role of intellectual property (IP), assesses therisks, threats and dangers of criminal use of AI, developed mechanisms to counterthem. The development of AI technologies as an integral part of «Industry 4.0» isconsidered, the main provisions of the «White Paper on Artificial Intelligence» ofthe EU are studied.Over the next decade, the EU plans to spend $20 billion a year on AI development.At the same time, the protection of IP rights in the context of AI development and relatedtechnologies has been unconsidered by the Commission, despite the key importanceof these rights. In legal regulation, AI is seen as a new challenge for the economyand the legal system, a new phenomenon that has a multiplier effect, a legal phenomenonin the structure of legal relations, a new object for legal regulation. The introduction of AI in the field of IP creates new legal and economic problems.The creation of AI works is an integral area of activity in the modern digital economy.These circumstances bring to the fore the problem of recognition of authorship in thecreation of AI works, the possibility of authors to dispose of their rights and their useof mechanisms for legal protection of IP. The analysis of the cases considered bycourts connected with a problem of legal personality of AI is carried out, legislative activityon this question is studied. Possibilities and dangers of criminal use of AI areshown. They are ranked in order of their level of danger — depending on the harmthey may cause, the potential benefit or the benefit of crime. Prospects for the developmentof AI in Ukraine are shown, the Concept of development of artificial intelligencein Ukraine is analysed. It is concluded that AI should become one of the key driversof digital transformation and overall growth of Ukraine's economy.
- Published
- 2021
34. Opinion mining for national security: techniques, domain applications, challenges and research opportunities
- Author
-
Noor Afiza Mat Razali, Nur Atiqah Malizan, Nor Asiakin Hasbullah, Muslihah Wook, Norulzahrah Mohd Zainuddin, Khairul Khalil Ishak, Suzaimah Ramli, and Sazali Sukardi
- Subjects
Computer engineering. Computer hardware ,Information Systems and Management ,Computer Networks and Communications ,Survey Paper ,National security ,Kansei approach ,Information technology ,QA75.5-76.95 ,T58.5-58.64 ,Opinion mining ,TK7885-7895 ,Sentiment analysis ,Hardware and Architecture ,Electronic computers. Computer science ,Machine learning ,Lexicon-based approach ,Information Systems - Abstract
Background Opinion mining, or sentiment analysis, is a field in Natural Language Processing (NLP). It extracts people’s thoughts, including assessments, attitudes, and emotions toward individuals, topics, and events. The task is technically challenging but incredibly useful. With the explosive growth of the digital platform in cyberspace, such as blogs and social networks, individuals and organisations are increasingly utilising public opinion for their decision-making. In recent years, significant research concerning mining people’s sentiments based on text in cyberspace using opinion mining has been explored. Researchers have applied numerous opinions mining techniques, including machine learning and lexicon-based approach to analyse and classify people’s sentiments based on a text and discuss the existing gap. Thus, it creates a research opportunity for other researchers to investigate and propose improved methods and new domain applications to fill the gap. Methods In this paper, a structured literature review has been done by considering 122 articles to examine all relevant research accomplished in the field of opinion mining application and the suggested Kansei approach to solve the challenges that occur in mining sentiments based on text in cyberspace. Five different platforms database were systematically searched between 2015 and 2021: ACM (Association for Computing Machinery), IEEE (Advancing Technology for Humanity), SCIENCE DIRECT, SpringerLink, and SCOPUS. Results This study analyses various techniques of opinion mining as well as the Kansei approach that will help to enhance techniques in mining people’s sentiment and emotion in cyberspace. Most of the study addressed methods including machine learning, lexicon-based approach, hybrid approach, and Kansei approach in mining the sentiment and emotion based on text. The possible societal impacts of the current opinion mining technique, including machine learning and the Kansei approach, along with major trends and challenges, are highlighted. Conclusion Various applications of opinion mining techniques in mining people’s sentiment and emotion according to the objective of the research, used method, dataset, summarized in this study. This study serves as a theoretical analysis of the opinion mining method complemented by the Kansei approach in classifying people’s sentiments based on text in cyberspace. Kansei approach can measure people’s impressions using artefacts based on senses including sight, feeling and cognition reported precise results for the assessment of human emotion. Therefore, this research suggests that the Kansei approach should be a complementary factor including in the development of a dictionary focusing on emotion in the national security domain. Also, this theoretical analysis will act as a reference to researchers regarding the Kansei approach as one of the techniques to improve hybrid approaches in opinion mining.
- Published
- 2021
35. Countering Weapons Of Mass Destruction (cwmd) Rfi For Prospective Broad Agency Announcement (baa)
- Subjects
United States. Department of Homeland Security ,National security ,Weapons of mass destruction ,Business, international - Abstract
Special notice (original) countering weapons of mass destruction (cwmd) rfi for prospective broad agency announcement (baa) Department of homeland security (dhs), office of procurement operations issues this request for information [...]
- Published
- 2023
36. Thresholds, Powers, and Accountability in the Emergencies Act.
- Author
-
KONG, HOIL
- Subjects
WAR & emergency legislation ,EXECUTIVE orders ,NATIONAL security ,FEDERAL common law ,EXECUTIVE power - Abstract
It can be difficult for a legislature to clearly define an emergency or precisely describe different kinds of emergencies. In the context of emergency legislation some degree of vagueness and ambiguity is therefore to be expected. As a consequence, there will be some unavoidable uncertainty about the scope of the executive's authority when it exercises its emergency powers. Legislatures can, however, avoid unnecessary ambiguity and vagueness in statutes, and thereby reduce uncertainty about the scope of emergency powers. Legislatures can also set out consultation mechanisms and impose reason-giving obligations that render the executive politically accountable to those affected by exercises of emergency powers. This paper proposes amendments that aim to eliminate avoidable uncertainty that arises from how the Emergencies Act currently defines a national emergency and a public order emergency. Further, the paper proposes amendments to the Act that aim to increase the executive's accountability to those affected by declarations of public order emergencies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
37. MILITARY, POLICING AND SECURITY DURING 2023 GENERAL ELECTIONS IN NIGERIA.
- Author
-
ADEKEYE, Joseph Adeshola and CHIMA, Anne Chioma
- Subjects
ELECTIONS ,ELECTION security measures ,NATIONAL security ,POLITICAL parties ,PROFESSIONAL ethics ,PARTISANSHIP - Abstract
One of the determinants of free, fair and credible election is the security of lives and property before, during and after the electioneering process. Despites the fact that large number of Military and Paramilitary personnel are mobilized for the conduct of Elections, cases of violence, snatching of ballot boxes, loss of lives and property are on the increase in most elections in Nigeria during the fourth republic. In light of the above, this paper examines the challenges and prospects of 2023 general elections with regards to the security of lives and property through the instrumentalities of the Nigerian Police Force and other security personnel. The main objective of the paper is to assess the implications of using the police and other security personnel on national security in 2023 general elections. Methodologically, the paper adopts a qualitative approach for the purpose of obtaining the required materials through the contents analysis of documents from National Independent Electoral Commission, Election (INEC), Independent Observers reports, observations from the participating political parties, the reports of Transparency International and extant laws. The outcome of the paper revealed that the major challenges envisaged from 2023 general elections is the fact that the security of lives and property of citizens may not be guaranteed if the security Agencies carry out assigned responsibilities in an unprofessional and partisan manner. The study therefore recommended that the security agencies should carry out assigned duties and responsibilities in a professional and non-partisan way in order to guarantee the security of life and properties of citizens before, during and after the 2023 general elections. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. ECONOMIC VULNERABILITY OF SMALL POWERS.
- Author
-
Zoidze, Gia, Abuselidze, George, and Veshapidze, Shota
- Abstract
The purpose of this article is to identify the national security challenges of a small state, to highlight their external and internal aspects; based on the research, develop a rational economic and political strategy for small powers. The paper is based on the analysis and synthesis of various fundamental literature and specific statistical data. The paper draws conclusions using causeand-effect relationships of facts. Important conclusions and recommendations are presented on key issues and challenges around small countries. This article concerns countries with small powers and their essential features - especially security, economic development, political stability, and foreign policy. It is also well understood today that threats of a military and nonmilitary nature are closely linked and that the aggravation of one leads to the aggravation of another. The systemic approach has taken root in the study of security issues, which involves discussing not just one but all of the potential threats in relation to one another and in one another's context. The results of this study indicate that no matter how flexible a small country's foreign policy is and how quickly it responds to changing conditions and events, it must still define its own strategic goal and make strategic choices. In determining its own national security priorities and foreign policy strategy, a small country must be more precise and infallible than a strong one. A small state that makes the wrong choice in its survival strategy is usually doomed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. INTEGRATED DETERRENCE: RELEVANCE & IMPLICATIONS FOR SOUTH ASIA.
- Author
-
Sultan, Adil, Haider, Faraz, and Jamy, Shayan Hassan
- Subjects
NATIONAL security ,GREAT powers (International relations) ,ARMS race ,TECHNOLOGICAL innovations - Abstract
The US National Security Strategy of 2022 introduced a relatively new concept of Integrated Deterrence (ID) that will likely impact security discourse amongst global rivals such as the US, China, and Russia while affecting the strategic thinking of relatively smaller powers like India, Pakistan, and others. With an expanded scope and objectives, ID aims to build and integrate the entire spectrum of capabilities of the US, its allies, and partners against the perceived threat from China and possibly Russia. Resultantly, the paper focuses on implications of ID for security and strategic stability in South Asia. India, being a major strategic partner with the will to play a significant role in the US-led China containment strategy, is likely to be a major beneficiary of the new US posture of ID. With enhanced and integrated military capabilities, India is likely to adopt a more hostile posture towards its neighbours, especially Pakistan, thus forcing the latter to develop options in the form of 'Integrated Response', to help maintain strategic stability in the region without indulging in an arms race, and by maintaining neutrality in the evolving US-China great power competition. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. A novel YOLOv4‐modified approach for efficient object detection in satellite imagery.
- Author
-
Tiwari, Rishabh, Dubey, Ashwani Kumar, and Rocha, Alvaro
- Subjects
OBJECT recognition (Computer vision) ,DEEP learning ,URBAN growth ,ARTIFICIAL satellites ,NATIONAL security ,REMOTE-sensing images - Abstract
Interpreting high‐resolution satellite imagery could be an expensive and time‐consuming task for human eyes. Computer Vision and Deep Learning techniques can help to solve this major problem by applying detection algorithms, which can ease the task of analysing such images for the benefit of humans. It can help in changing the way we comprehend and anticipate the economic activity around the world. Such techniques help us to observe the urban development in high security areas such as national and international borders. Constant progressions in improving and making satellites deployment, a cost‐effective process to strengthen the networks of satellite orbiting the earth is one of the reasons such tasks can be easily solved with the help of high‐resolution images. Current computer vision research works have achieved significant milestones in accuracy and speed but, there are still room for improvements. In this paper, we addressed some of these methods to bring them to a combined pipeline and proposed a set of improvements to further improve the speed and the accuracy of the detections. We proposed a unified framework, which combines several object detection algorithms and the state‐of‐art architecture of YoloV4 along with the TensorFlow object detection API. This framework can detect small and well as large objects with improved speed and accuracy by using two detectors for different scales. Evaluation ran on these high‐resolution images yield mAP of 85.6% F1‐score of 0.84. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Violation of territorial integrity as a tool for waging long-term hybrid warfare (against the backdrop of power games in the South Caucasus region).
- Author
-
Iskandarov, Khayal Ibrahim, Gawliczek, Piotr, and Soboń, Andrzej
- Subjects
POLITICAL realism ,NATIONAL security ,IRREGULAR warfare ,INTERNATIONAL relations - Abstract
This paper seeks to examine the violation of territorial integrity as a stage of hybrid warfare. Grounded in the theoretical framework of neoclassical realism, this study analyses nations' foreign policy strategies considering both global and domestic factors. Employing primarily qualitative research, this study concentrates on a case study of the South Caucasus region. Against the backdrop of the war which broke out in the early 2022 between Russia and Ukraine, the preservation of territorial integrity emerges as an imperative aspect of national security policy. Despite the longstanding recognition of territorial integrity as a fundamental tenet of international law over the centuries, this war has galvanised all nations with regard to the violation of territorial integrity. The paper delineates the principles of territorial integrity vis-à-vis the national security of the South Caucasus countries, substantiating the assertion that violation of the territorial integrity of the particular countries in this region serves the interests of external actors, either directly or indirectly, and is employed as a strategic tool in the pursuit of protracted hybrid warfare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. SOUTH CAUCASUS IN THE PHASE OF RUSSIAN-UKRAINIAN WAR: NEW SECURITY CHALLENGES AND POSSIBLE SCENARIOS FOR DEVELOPMENT.
- Author
-
KARAPETYAN, ROMAN
- Subjects
RUSSIAN invasion of Ukraine, 2022- ,NATIONAL security ,EUROPEAN integration ,BELT & Road Initiative ,INFRASTRUCTURE policy - Abstract
The paper mainly examines the economic, political and military situation in the South Caucasus after the start of Russian-Ukrainian war. In the paper we are focused on the question of what kind of consequences does the Russian-Ukrainian war has on the countries of the South Caucasus. Relying on the analytical-forecasting approach, we also are trying to forecast what developments can be expected in this region. On this regard we especially look onto the facts from Armenia's perspective. Of course, the discussion of the situation in Georgia and Azerbaijan was also under our great attention, because we also had set a task to compare the processes that took place in the three countries of the region. The modernity of the topic can be measured, first of all, by its global political significance: Russian-Ukrainian conflict continues to be on the top of world political processes. On the other hand, it is actual when studying political and economic processes in the post-Soviet territory. By and large, as a result, the South Caucasus is a part of the European and Middle Eastern security sphere, or at least has an important role in them. Therefore, the ongoing developments in this region are not local and may also affect the European, Middle Eastern and the processes also in other regions. Russian-Ukrainian conflict has affected on foreign policy behavior of the Southern Caucasus countries. The region is now under the turbulence zone, so we are not aware from being faced by new challenges and security issues. Since we have highly evaluated the impact of the conflict on the countries of the region, we have also tried to make certain predictions regarding possible future development scenarios, which could be as recommendations for foreign policy decision making structures of Armenia. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Design and Analysis of an Adaptive Obstacle-Overcoming Tracked Robot with Passive Swing Arms.
- Author
-
Li, Ruiming, Zhang, Xianhong, Hu, Shaoheng, Wu, Jianxu, Feng, Yu, and Yao, Yan-an
- Subjects
VIRTUAL prototypes ,ROBOT design & construction ,ROBOTS ,RESCUE work ,NATIONAL security ,DYNAMIC models - Abstract
This paper presents a novel adaptive tracked robot equipped with passive swing arms for overcoming obstacles. First, the paper introduces the overall composition of the robot and focuses on the adaptive mechanism of the passive swing arms. Second, analyzing the single-step obstacle-overcoming process of the robot reveals the relationship between the obstacle height and the geometric parameters of the passive swing arms, establishing a kinematic model. Then, a dynamic model of the robot's obstacle-overcoming process is established by simplifying the robot into a crank–slider linkage, and the time range for the robot to overcome obstacles is analyzed. Finally, through virtual simulation and a physical prototype, the feasibility and maneuverability of the robot's design are verified. These findings demonstrate the potential of the robot in various applications, such as search and rescue missions and homeland security. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Racializing Terror: Reassessing the Motive of the Motive Clause.
- Author
-
SINGH, PRABJOT
- Subjects
LEGISLATIVE histories ,CRIMINAL justice system ,JUSTICE administration ,CRIMINAL law - Abstract
This paper reviews the legislative history and application of the Criminal Code's definition of terrorist activity to trace how the "motive clause" reinforces systemic racism within Canada's criminal justice system. By outlining this process, this paper argues that the motive clause contributes to a dynamic that racializes terror offences as a specific type of criminal offence committed by racialized individuals--marking terrorism as a unique social characteristic of racialized communities. This occurs mainly due to the legislative requirement to prosecute the ideas of accused persons, which, in practice, has increased the likelihood of courts admitting otherwise prejudicial evidence against the accused and the problematic ways in which expert evidence has (or has not) been used in terrorism trials. Although discrimination may not be an inevitable or intended outcome of the drafted legislation, it creates a framework that encourages discriminatory prosecutorial strategies, facilitates bias in the admission and treatment of some evidence, and potentially contributes to the exclusive use of the provisions against racialized communities specifically. [ABSTRACT FROM AUTHOR]
- Published
- 2023
45. Food Acquirability: An Unexplored Component of Food Security?
- Author
-
Okpala, Emeka Franklin, Korir, Lilian, and Manning, Louise
- Subjects
FOOD security ,FOOD preferences ,SOCIOECONOMIC factors ,NATIONAL security ,DATA analysis - Abstract
The key elements, or pillars, of food security are stated as food availability, food access, food utilization, and stability. These food security pillars are often linked to food security interventions at the national, community or household level. However, if the urban 'household' is the unit of interest for any food security intervention, this research asks if a more holistic element, or pillar, is needed. The aim of this research has been to explore the socio-economic aspects of food security/insecurity that we have termed as a result of the research "food acquirability". Through the use of structured questionnaires (n = 120), and analysis of the data derived from local market and supermarket settings in the city of Awka, Nigeria, the concept of food acquirability has emerged and been conceptualized and critiqued. The contribution of this paper is to frame the concept of acquirability with regard to food security in Nigeria in order to develop a better understanding of the factors that impact household urban food security/insecurity and how they can be effectively mitigated. Factors of acquirability that emerged were culture, time poverty, resource availability and cooking skills, and household food preference and meal choice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. The New National Security Strategy of the Republic of Poland
- Author
-
Jacek Sobczak
- Subjects
Hybridity ,White paper ,National security ,Council of Ministers ,Emerging technologies ,business.industry ,Political science ,Public administration ,Cyberspace ,business ,The Republic - Abstract
The approval of the new security strategy of the Republic of Poland in May 2020 required paying attention to the terminological aspects of the concepts used in this document, as well as to legal issues, which were mainly connected with the problem of whether this act should be formally countersigned or not. An equally important issue was to draw attention to the fact that, in practice, two strategies were being developed in Poland’s legal system—one approved by the President of the Republic of Poland in his decision of May 12, 2020, and the other, which was in the form of a resolution of the Council of Ministers, applicable from 9 April 2013. The current strategy was preceded by earlier strategies and the White Paper on National Security of the Republic of Poland. The strategy of May 12, 2020 is a comprehensive document that sheds light on all elements of national security. Its content addresses such phenomena as hybridity, operation in cyberspace, the need for new technologies, and artificial intelligence.
- Published
- 2021
47. SOCIAL MEDIA AS A THREAT TO NATIONAL SECURITY: A CASE STUDY OF TWITTER IN PAKISTAN.
- Author
-
Al Abd, Saad
- Subjects
SOCIAL media ,NATIONAL security ,TERRORIST organizations - Abstract
Social media has evolved significantly over the years while providing strategic platforms for voices to reach billions of people within no time. Accordingly, it has advantages and disadvantages (threats). The nature of threats emanating from social media, especially Twitter, in the context of Pakistan, are mainly in the form of radicalization, glorification of terrorist groups, propagation of violent sub-nationalism and hybrid warfare. Though Pakistan has been relatively active after 2020 in responding to social media challenges, implementing social media regulations remains an issue, especially when most social media platforms are foreign in origin. This paper evaluates the interlinkage of social media and national security in the context of Pakistan while exploring how agents of insecurity and instability exploit social media and what response mechanism the state has placed to mitigate these threats. The paper is a qualitative inquiry using primary and secondary sources to answer these questions. The research findings suggest marginal securitization of social media, albeit without significant implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Call for law clarity to avoid ‘chilling effect’
- Author
-
Chan, Kahon and Wong, Natalie
- Subjects
Bar associations ,National security ,News, opinion and commentary - Abstract
The Hong Kong Bar Association has called for clearer provisions in the city’s home-grown national security legislation, warning that greater uncertainty about its implementation may increase the likelihood of “a [...]
- Published
- 2024
49. Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5.
- Author
-
Shaofan Su, Deyu Yuan, Yuanxin Wang, and Meng Ding
- Subjects
FEATURE extraction ,CONVOLUTIONAL neural networks ,GENETIC algorithms ,SUPERVISED learning ,NATIONAL security - Abstract
With the rapid development of Internet technology, the type of information in the Internet is extremely complex, and a large number of riot contents containing bloody, violent and riotous components have appeared. These contents pose a great threat to the network ecology and national security. As a result, the importance of monitoring riotous Internet activity cannot be overstated. Convolutional Neural Network (CNN-based) target detection algorithm has great potential in identifying rioters, so this paper focused on the use of improved backbone and optimization function of You Only Look Once v5 (YOLOv5), and further optimization of hyperparameters using genetic algorithm to achieve fine-grained recognition of riot image content. First, the fine-grained features of riot-related images were identified, and then the dataset was constructed by manual annotation. Second, the training and testing work was carried out on the constructed dedicated dataset by supervised deep learning training. The research results have shown that the improved YOLOv5 network significantly improved the fine-grained feature extraction capability of riot-related images compared with the original YOLOv5 network structure, and the mean average precision (mAP) value was improved to 0.6128. Thus, it provided strong support for combating riot-related organizations and maintaining the online ecological environment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Who Does "Endowment Insurance" Support: The Elderly or Their Grown-up Children?
- Author
-
Liu, Ligang, Xiao, Zhiwu, and Deng, Yang
- Subjects
LIFE insurance endowment policies ,PENSIONS ,NATIONAL security ,FINANCIAL management - Abstract
This research paper seeks to understand whether the current basic endowment insurance policy has properly played the role of supporting the elderly needs through intergenerational support within the family. Theoretically, there are problems of the imbalanced structure of pension security, retirees' comparatively higher pension and the low-level security of young people's in-service income, and drawbacks of the existing endowment insurance system, both have a certain causal relationship with "gnawing the old." Data on China's family tracking survey in 2016 (CFPS2016), Probit model, IV and PSM robustness testing methods were also used to study the relationship between parents' pensions and their grownup children's "gnawing-the-old" behavior. The results show that: (1) Compared with young people from families without pension income, those with pensioned parent(s) will less possibly choose to work; the parents' financial assistance behavior would restrain the children's intention to work and increase the possibility of "gnawing the old"; (2) Neither the amount of pension income nor financial assistance given to the children is significantly related to young people's "gnawing the old"; (3) Young people's "gnawing the old" behaviors are different according to their parents' professions and living areas; (4) The gap between parents' pension income and children's in-service income also adds to the causes of "gnawing the old." The policy implications of these findings are discussed particularly the formulation of a scientific mechanism for pension income. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.