Journal articles on the topic 'Security challenge'

To see the other types of publications on this topic, follow the link: Security challenge.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security challenge.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Streater, K. "Cyber Security Challenge." ITNOW 52, no. 6 (November 1, 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waugh, William L. "Securing Mass Transit: A Challenge for Homeland Security." Review of Policy Research 21, no. 3 (May 2004): 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (April 1, 2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Szönyi, István. "Hungary: A security challenge?" International Spectator 29, no. 1 (January 1994): 89–108. http://dx.doi.org/10.1080/03932729408458041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kurpjuhn, Thorsten. "The SME security challenge." Computer Fraud & Security 2015, no. 3 (March 2015): 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beysenov, B. K., and A. Igisenova. "Global challenge and spiritual security." Eurasian Journal of Religious studies 2, no. 2 (2015): 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McCluskey, B. "Connected cars - the security challenge." Engineering & Technology 12, no. 2 (March 1, 2017): 54–57. http://dx.doi.org/10.1049/et.2017.0205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Carroll, John E. "The Acid Challenge to Security." Bulletin of the Atomic Scientists 45, no. 8 (October 1989): 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lafuente, Guillermo. "The big data security challenge." Network Security 2015, no. 1 (January 2015): 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

EMBER, LOIS. "Diseases Pose National Security Challenge." Chemical & Engineering News 78, no. 11 (March 13, 2000): 10. http://dx.doi.org/10.1021/cen-v078n011.p010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hoving, Per. "System security: The technical challenge." Computers & Security 5, no. 1 (March 1986): 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Farrant, Alex. "5G and the Security Challenge." New Electronics 51, no. 20 (November 12, 2019): 27–28. http://dx.doi.org/10.12968/s0047-9624(22)61484-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Nelson, Margaret C., Scott E. Ingram, Andrew J. Dugmore, Richard Streeter, Matthew A. Peeples, Thomas H. McGovern, Michelle Hegmon, et al. "Climate challenges, vulnerabilities, and food security." Proceedings of the National Academy of Sciences 113, no. 2 (December 28, 2015): 298–303. http://dx.doi.org/10.1073/pnas.1506494113.

Full text
Abstract:
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
APA, Harvard, Vancouver, ISO, and other styles
14

Dhakal, Bikash. "Assessing geopolitics as Nepal's national security challenge." Unity Journal 1 (February 1, 2020): 14–20. http://dx.doi.org/10.3126/unityj.v1i0.35690.

Full text
Abstract:
The increased geo-strategic interests and concerns of great powers have posed serious challenges to national security of Nepal. This article objectively analyzes the impacts of geopolitics on Nepal's national security. It intends to examine the National security within the framework of geopolitical rivalry. Geopolitics is rather a crucial external factor than the other internal factors of insecurity. Thus, this article attempts to justify how regional and global geopolitical developments challenge Nepal's national security. This article explains geopolitical factors that can pose threat and challenge to national security.
APA, Harvard, Vancouver, ISO, and other styles
15

Patankar, Manoj S., and Louis Holscher. "Accessibility vs Security: The Challenge to Airport Security Systems." Security Journal 13, no. 2 (April 2000): 7–19. http://dx.doi.org/10.1057/palgrave.sj.8340046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cîrdei, Ionuț Alin, and Lucian Ispas. "Challenges to European and Euro-Atlantic Security." International conference KNOWLEDGE-BASED ORGANIZATION 28, no. 1 (June 1, 2022): 7–14. http://dx.doi.org/10.2478/kbo-2022-0002.

Full text
Abstract:
Abstract The current security environment is characterized by uncertainty and multiple transformations in all areas. Mankind as a whole enjoys an extremely favorable context and an indisputable climate of security. However, security challenges are becoming more and more difficult to anticipate. The last few years have brought a new pandemic challenge to all states, which has put all systems to the test. In addition to the pandemic challenge, European and Euro-Atlantic countries face a military challenge that has the potential to directly affect regional and global security and cause shock waves in all areas, especially in the economic, political, diplomatic and military field. To these major challenges are added the challenges that have now faded into the background, such as climate change, the impact of natural disasters, organized crime, terrorism, and so on. In order to meet these new challenges, the European and Euro-Atlantic states must demonstrate cohesion and determination and take effective and decisive action to protect their interests and ensure the security and stability of their allies.
APA, Harvard, Vancouver, ISO, and other styles
17

Dynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (October 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.

Full text
Abstract:
In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opportunities for a more linked-up approach to protecting the public, there are also significant barriers. Despite their massive growth in recent decades, private security industries the world over struggle with issues – both real and perceived – around pay and conditions, training, standards and professionalism. With the UK and Australia already having taken steps towards public-private security partnerships, to what extent does New Zealand’s private security guarding sector constitute a potential national security force-multiplier?
APA, Harvard, Vancouver, ISO, and other styles
18

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Full text
Abstract:
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
APA, Harvard, Vancouver, ISO, and other styles
19

Riaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.

Full text
Abstract:
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
APA, Harvard, Vancouver, ISO, and other styles
20

Taranenko, Anna. "THE EU MIGRATION CRISIS AS A CHALLENGE TO EUROPEAN REGIONAL SECURITY." Politology bulletin, no. 86 (2021): 210–24. http://dx.doi.org/10.17721/2415-881x.2021.86.210-224.

Full text
Abstract:
The EU migration crisis is analyzed as a challenge to European regional security. The used method is historical and comparative. As a result, it can be stated that migration is a global trend which has become especially dynamic in the second half of the 20th. Dynamic migration processes, in their turn, stipulate the importance of efficient ethnic policy of recipient states. Since 2015 the European Union authorities took measures in order respond to the migration crisis effectively, strengthen regional security and enhance borders control. The EU makes further efforts in order strengthen intersectoral cooperation between various political and security agencies responsible for tackling the migration crisis. To a certain extent, the migration crisis of 2015 posed a threat to the European Union unity and security and also raises questions about further integration of the European Union. The migration crisis has demonstrated that the EU needs to efficiently adapt its security strategy to new challenges. It can be concluded that the current migration crisis processes in the EU challenge further European integration and regional European security. Core democratic values have been challenged by the migration crisis, in particular, freedom of movement and civil protection and in order to enhance regional security in Europe one can further utilize the civil society potential and track-II diplomacy instruments.
APA, Harvard, Vancouver, ISO, and other styles
21

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Full text
Abstract:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
APA, Harvard, Vancouver, ISO, and other styles
22

LemaîTre, Pierre. "The Gorbachev challenge and European security." International Affairs 65, no. 2 (1989): 357–58. http://dx.doi.org/10.2307/2622134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Pervez, Laiba, Aiza Khan, and Noor ul Ain. "Cyber Security Challenge in an Automobile." International Journal of Scientific and Research Publications (IJSRP) 10, no. 12 (December 6, 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lakušić, Milovan, and Sofija Lolić. "Terrorism as a contemporary security challenge." Megatrend revija 18, no. 4 (2021): 389–400. http://dx.doi.org/10.5937/megrev2104389l.

Full text
Abstract:
Terrorism is one of the greatest challenges to modern security. In this paper, we try to explain how terrorism is regulated in the legislation of the Republic of Serbia and how and in what way it affects the security of the Republic of Serbia and surrounding countries. Starting with the AP of Kosovo and Metohija, where terrorism appears in the 1990s in the idea of creating a "Greater Albania". Terrorism as a phenomenon is based on the use of violence and an ideology that is religiously, racially or ethnically firmly determined. Terrorism as a crime in our legislation is one of the most serious crimes classified in the category of crimes against humanity and other goods protected internationally. What is considered a problem in the fight against terrorism is that even today there is no generally accepted understanding of what terrorism really is? This phenomenon, which is already gaining momentum today, is constantly advancing in every sense, and it is necessary to start finding a path that leads to controlling this phenomenon. By violating human rights and other material goods, terrorism threatens the global order.
APA, Harvard, Vancouver, ISO, and other styles
25

Ezemenaka, Kingsley Emeka. "KIDNAPPING: A SECURITY CHALLENGE IN NIGERIA." Journal of Security and Sustainability Issues 8, no. 2 (December 29, 2018): 111–24. http://dx.doi.org/10.9770/jssi.2018.8.2(10).

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Garde, Hans J. "European security and the Baltic challenge." RUSI Journal 140, no. 2 (April 1995): 19–21. http://dx.doi.org/10.1080/03071849508445902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Maniatakos, Michail. "Guest Editor Introduction: Embedded Security Challenge." IEEE Embedded Systems Letters 10, no. 3 (September 2018): 81–82. http://dx.doi.org/10.1109/les.2018.2829765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sommaruga, Cornelio. "The global challenge of human security." Foresight 6, no. 4 (August 2004): 208–11. http://dx.doi.org/10.1108/14636680410554674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Eide, Espen Barth. "The Internal Security Challenge in Kosovo." International Spectator 35, no. 1 (January 2000): 49–63. http://dx.doi.org/10.1080/03932720008458113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Labuschagne, L., and J. H. P. Eloff. "Electronic commerce: the information‐security challenge." Information Management & Computer Security 8, no. 3 (August 1, 2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.

Full text
Abstract:
The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The Internet, however, holds many opportunities that could mean survival or competitive advantage for many organisations. To exploit these opportunities, it is important to first analyse the risks they hold. Electronic commerce is based on business as well as technological risks, making it a very difficult environment to secure. Apart from these two types of risk categories there are several other issues and problems that need to be addressed.
APA, Harvard, Vancouver, ISO, and other styles
31

Hunter, Philip. "Security vendors tackle multi-gigabit challenge." Computer Fraud & Security 2007, no. 11 (November 2007): 14–15. http://dx.doi.org/10.1016/s1361-3723(07)70154-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Goucher, Wendy. "The challenge of security awareness training." Computer Fraud & Security 2009, no. 10 (October 2009): 15–16. http://dx.doi.org/10.1016/s1361-3723(09)70129-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ashenden, Debi. "Information Security management: A human challenge?" Information Security Technical Report 13, no. 4 (November 2008): 195–201. http://dx.doi.org/10.1016/j.istr.2008.10.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Gold, Steve. "Meeting the biometrics payment security challenge." Biometric Technology Today 2013, no. 10 (November 2013): 5–8. http://dx.doi.org/10.1016/s0969-4765(13)70175-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dobbie, Stuart. "Challenge of biometric security for banks." Biometric Technology Today 2020, no. 3 (March 2020): 5–7. http://dx.doi.org/10.1016/s0969-4765(20)30037-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Smith, Martin. "Facing the challenge of IT security." Computers & Security 14, no. 5 (January 1995): 423. http://dx.doi.org/10.1016/0167-4048(95)97134-v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

ALBIN, CECILIA. "The Global Security Challenge to Negotiation." American Behavioral Scientist 38, no. 6 (May 1995): 921–48. http://dx.doi.org/10.1177/0002764295038006009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

AL-SUWAIDI, JAMAL S. "Gulf Security and the Iranian Challenge." Security Dialogue 27, no. 3 (September 1996): 277–94. http://dx.doi.org/10.1177/0967010696027003004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Miller, S. K. "Facing the challenge of wireless security." Computer 34, no. 7 (July 2001): 16–18. http://dx.doi.org/10.1109/2.933495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Householder, A., K. Houle, and C. Dougherty. "Computer attack trends challenge Internet security." Computer 35, no. 4 (April 2002): sulp5—sulp7. http://dx.doi.org/10.1109/mc.2002.1012422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

WONG, John. "Food Security as a New Challenge in Asia." East Asian Policy 04, no. 02 (April 2012): 103–6. http://dx.doi.org/10.1142/s1793930512000207.

Full text
Abstract:
All nations, big or small, are concerned with the issue of food security. Even for Singapore, which is almost 100% dependent on external food supply, it still has to face the challenges of maintaining a stable food supply. Food crisis can potentially emerge as a new challenge for regional security not just in Asia but also for the whole international community as well.
APA, Harvard, Vancouver, ISO, and other styles
42

Adebayo, Nehemiah, Amos O. Bajeh, Micheal Arowolo, Erondu Udochuckwu, Kayode Jesujana, Mary Ajayi, Surajudeen Abdulrasaq, and John Onyemenam. "Blockchain Technology: A Panacea for IoT Security Challenge." EAI Endorsed Transactions on Internet of Things 8, no. 3 (October 4, 2022): e3. http://dx.doi.org/10.4108/eetiot.v8i3.1402.

Full text
Abstract:
The Internet of Things (IoT) platforms, despite the wide range of application is not without loop holes of which cyberattackers can take advantage. In order to improve the platform's security while also increasing other features, it has been proposed that blockchain technology be implemented in any IoT system. However, while blockchain technology has many advantages, it is important to consider other options because they all have their own drawbacks that may not be ideal for every use case situation. IoT network devices have limited computer power, storage space, and bandwidth. As a result, these systems are easily prone to assault than other network connected devices, such PCs, cell phones and tablets. With focus on IoT security challenges and the countermeasures offered by the blockchain technology, consensus algorithm, data encryption and smart contracts were discovered to be the common and effective algorithm employed by the blockchain technology in securing Iot systems over time.
APA, Harvard, Vancouver, ISO, and other styles
43

Paul, Pangkaj Chandra, John Loane, Fergal McCaffery, and Gilbert Regan. "Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications." Applied System Innovation 4, no. 4 (October 12, 2021): 76. http://dx.doi.org/10.3390/asi4040076.

Full text
Abstract:
Assuring security and privacy of data is a key challenge for organizations when developing WBAN applications. The reasons for this challenge include (i) developers have limited knowledge of market-specific regulatory requirements and security standards, and (ii) there are a vast number of security controls with insufficient implementation detail. To address these challenges, we have developed a WBAN data security and privacy risk management framework. The goal of this paper is trifold. First, we present the methodology used to develop the framework. The framework was developed by considering recommendations from legislation and standards. Second, we present the findings from an initial validation of the framework’s usability and effectiveness of the security and privacy controls. Finally, we present an updated version of the framework and explain how it addresses the aforementioned challenges.
APA, Harvard, Vancouver, ISO, and other styles
44

GILL, PETER. "The Intelligence and Security Committee and the challenge of security networks." Review of International Studies 35, no. 4 (October 2009): 929–41. http://dx.doi.org/10.1017/s0260210509990362.

Full text
Abstract:
AbstractA major feature of current security is the development of intelligence networks between agencies within and between nations and across public and private sectors. The performance of the UK Intelligence and Security Committee (ISC) is examined within this context, especially regarding allegations of collusion by UK agencies in rendition and torture. Proposed changes to the ISC are discussed and it is argued that the ISC must seek to leverage its limited powers by helping to construct an oversight network.
APA, Harvard, Vancouver, ISO, and other styles
45

Jha, Shikha. "Impact of National Security Challenge in Development Prospect of South Asia." Unity Journal 3, no. 01 (March 6, 2022): 305–16. http://dx.doi.org/10.3126/unityj.v3i01.43334.

Full text
Abstract:
National security has always been viewed as a precondition for sustainable economic, political, and social development. Any sort of challenges or threats upon national security directly infringes the developmental course. South Asia, has been rampantly facing security-related challenges and obstructions as terrorism, counter-terrorism, militarization, and religious extremism, civil war, and border disputes. Such challenges have not only jeopardized the peace within the region but a seething unrest has been pounded in the development process. This paper primarily focuses on national security challenges faced by countries in South Asia. South Asian nations resort to increment of defense budget, militarization, border security, and struggle for nuclear power to address their security challenge. I have examined the impact of such response upon the course of development in this paper. This is a qualitative research and refers to secondary source of data which includes; books, journals, reports of reputed institutes and think tanks. The analysis finds that increasing militarization and defense budget has been abysmal to address national security threat in South Asia. South Asian nations can resort to bilateral talks and diplomatic measure to address their security threats. This will save larger economic resources which could be utilized for development prospect.
APA, Harvard, Vancouver, ISO, and other styles
46

Abd Ali, Shams Mhmood, Mohd Najwadi Yusoff, and Hasan Falah Hasan. "Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions." Future Internet 15, no. 1 (January 12, 2023): 35. http://dx.doi.org/10.3390/fi15010035.

Full text
Abstract:
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due to improper data stored, such as child pornography, copyright violation, and lately the enaction of the “Right to be Forgotten (RtbF)” principle disseminated by the General Data Protection Regulation (GDPR), where it requires blockchain data to be redacted to suit current applications’ urgent demands, and even compliance with the regulation is a challenge and an unfeasible practice for various blockchain technology providers owing to the immutability characteristic. To overcome this challenge, mutable blockchain is highly demanded to solve previously mentioned issues, where controlled and supervised amendments to certain content within constrained privileges granted are suggested by several researchers through numerous blockchain redaction mechanisms using chameleon and non-chameleon hashing function approaches, and methods were proposed to achieve reasonable policies while ensuring high blockchain security levels. Accordingly, the current study seeks to thoroughly define redaction implementation challenges and security properties criteria. The analysis performed has mapped these criteria with chameleon-based research methodologies, technical approaches, and the latest cryptographic techniques implemented to resolve the challenge posed by the policy in which comparisons paved current open issues, leading to shaping future research directions in the scoped field.
APA, Harvard, Vancouver, ISO, and other styles
47

Beck, Kate. "Smart Security?" Transportation Research Record: Journal of the Transportation Research Board 2604, no. 1 (January 2017): 37–43. http://dx.doi.org/10.3141/2604-05.

Full text
Abstract:
Smart city initiatives, which involve the connection and automation of city systems and services through the use of information and communication technology, offer significant opportunities to improve efficiency and address many environmental, economic, and social issues faced by U.S. cities. However, as systems become increasingly connected and automated, these systems and the people whom they serve become more vulnerable to an array of security threats, including cybersecurity attacks and attacks on the physical infrastructure and human lives. This paper focuses on how U.S. cities plan to mitigate and respond to the security risks that may arise from the integration of technology into transportation systems and connecting transportation system databases. After examining the U.S. Department of Transportation's recent competition Beyond Traffic: Smart City Challenge, this paper evaluates 32 of the 77 first-round applications to the Smart City Challenge submitted by midsize American cities. The paper provides a set of criteria to evaluate the resiliency of the applicants’ transportation systems, that is, the ability of the cities to withstand and respond to security threats and changing conditions. These criteria include the responses of cities to a range of security risks, the response to unknown risks, plans to accommodate risks, and whether cities plan to work with private or public partners to develop security mitigation and response strategies. The paper concludes that only 19 of the 32 first-round applications to the Smart City Challenge evaluated in this paper address security concerns related to the development of smart transportation systems, and the majority of cities with security plans focus only on mass cybersecurity risks.
APA, Harvard, Vancouver, ISO, and other styles
48

PEŠEC, MOJCA. "CHINA, SECURITY CHALLENGE FOR THE EUROPEAN UNION." KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (October 23, 2020): 15–30. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.1.

Full text
Abstract:
Povzetek Strateško tekmovanje Evropske unije s Kitajsko je postalo povsem resnično. Kitajski vpliv v Evropi je ekonomski in geopolitičen. Kitajska je postala gospodarski tekmec, ki si prizadeva prevzeti vodilno mesto na področju razvoja tehnologij, želi pa tudi uveljavljati svoj model družbene ureditve in vladanja. Močnejša kitajska ekonomska prisotnost, kulturne in medijske aktivnosti ter dejavnosti vojaške diplomacije so orodja, s katerimi Kitajska uveljavlja svoj vpliv v odnosih z državami v Evropski uniji in v tistih na njenem obrobju. Najpomembnejši izzivi v odnosih med Kitajsko in Evropo so neuravnoteženost naložb v korist Kitajske, prevzemanje evropskih podjetij, predvsem tistih, ki upravljajo strateško pomembno infrastrukturo, ter povečana dejavnost kitajskih oboroženih sil v mednarodnem okolju. Ključne besede Evropska unija, Kitajska, strateško tekmovanje, varnostni izzivi. Abstract The European Union's strategic competition with China has become a reality. China's influence in Europe is both economic and geopolitical. China has become an economic competitor striving to take the lead in technology development, but it also wants to assert its model of social order and governance. China's stronger economic presence, cultural and media activities, and military diplomacy activities are tools with which China is asserting its influence in relations with countries in and around the European Union. The most important challenges in China-Europe relations are the imbalance of investment in favour of China, the takeover of European companies, especially those that manage strategically important infrastructure, and the increased activity of the Chinese armed forces in the international environment. Key words European Union, China, strategic competition, security challenges.
APA, Harvard, Vancouver, ISO, and other styles
49

Trager, Robert F. "The Security Governance Challenge of Emerging Technologies." Orbis 66, no. 4 (2022): 536–50. http://dx.doi.org/10.1016/j.orbis.2022.08.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Missiroli, Antonio. "European Security Policy: The Challenge of Coherence." European Foreign Affairs Review 6, Issue 2 (June 1, 2001): 177–96. http://dx.doi.org/10.54648/356609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography