3,778 research outputs found

    Indonesian Online Shopping Practices in the COVID-19 Pandemic Era: A Study of Culture and Cyber Security Law

    Get PDF
    Introduction to the Problems: The condition during COVID-19 that made people doing more activities at home drove the increase in spending intensity. This condition referred to a new normal. Online shopping has long been a habit for some people because of the convenience provided. In conditions of increasing online shopping activities certainly have implications for the community—online shopping practices of Indonesian people in the Covid-19 pandemic era, with an approach and cybersecurity.Purpose/ Objective Study: This research aims to examine the relationship between online shopping practices of the Indonesian people in the Covid-19 pandemic era.Design/Methodology/Approach: With an approach to the study of culture and cybersecurity, with integration between culture studies, economy, and digital law studies.Findings: This research finds that massive online shopping practices in Indonesia have implications for social vulnerability. In a cultural context, people could get caught up in alienation. Online shopping activities as productive work (work to make commodities) alienate humans, four sides humans from themselves, productive work objects (instruments and productive work objects), and products consumed. While in the context of security, there was a risk of using misused personal data. It was necessary to ratify the Law of Personal Data Security as a legal regulation mechanism for sanctions for the data privacy misused in.Paper Types: Research articl

    Revisitng the Violence and Social Order Conceptual Framework: a Case Study of China

    Get PDF
    The conceptual framework on violence and social order- by North, Wallis, and Weingast (2009)- categorizes societies into three groups based on how they foster competition, limit violence, and allow citizens access to political and economic organizations. This thesis critically examines this conceptual framework and highlights its drawbacks in explaining economic growth and development in the contemporary global context. This thesis identifies two specific areas of improvement in the conceptual framework of social order: first, by reconceptualizing violence, and second, by integrating the extent of personalism in political parties as critical determinants for categorizing social order. By demonstrating the intricate relationship between the comprehensive concept of violence and various mechanisms of personalization in the political party of China, this thesis contends that the thesis argues that state\u27s extensive capability to control violence and the personalized nature of political processes together undermine the goals of development, which is an individual right to live a life with dignity and freedom

    Chapter 1 Transformation of the economy

    Get PDF
    "This book presents the ways in which three key issues of the modern world – transformation, digitalisation and sustainability – may be combined for the greater good and highlights which activities may be designed to integrate these three directly linked paths. It is an experience-derived and evidence-based analysis of how sustainable development impacts the transformation of the economy and how the business environment influences economic transformation in the light of the sustainable development principles. The book addresses the current challenges and shows how the economy can be transformed further in an organic way that meets the needs of society and the environment, through the use of digital technologies. The multidisciplinary approach to sustainability transformation is one of the core strengths of the book, as it emphasises the need for a holistic approach to the functioning of sustainable development ideas at the micro- and macro-levels. The authors present a fresh perspective, particularly around the regulations stimulating the sustainable development of enterprises, tax systems, and the allocation of capital. Moreover, the book brings together and makes available the results of the latest research on the subject, using a vast amount of primary evidence and both quantitative and qualitative methodology. The authors’ insights go beyond the obvious effects of economic transformation and call attention to ways in which smart technology and digitalisation may help to achieve the Sustainable Development Goals. The book is directed first and foremost towards academics, researchers and students, but also professionals, who would like to expand their knowledge of sustainable development from a scientific perspective.

    A Quantitative Research Study on Probability Risk Assessments in Critical Infrastructure and Homeland Security

    Get PDF
    This dissertation encompassed quantitative research on probabilistic risk assessment (PRA) elements in homeland security and the impact on critical infrastructure and key resources. There are 16 crucial infrastructure sectors in homeland security that represent assets, system networks, virtual and physical environments, roads and bridges, transportation, and air travel. The design included the Bayes theorem, a process used in PRAs when determining potential or probable events, causes, outcomes, and risks. The goal is to mitigate the effects of domestic terrorism and natural and man-made disasters, respond to events related to critical infrastructure that can impact the United States, and help protect and secure natural gas pipelines and electrical grid systems. This study provides data from current risk assessment trends in PRAs that can be applied and designed in elements of homeland security and the criminal justice system to help protect critical infrastructures. The dissertation will highlight the aspects of the U.S. Department of Homeland Security National Infrastructure Protection Plan (NIPP). In addition, this framework was employed to examine the criminal justice triangle, explore crime problems and emergency preparedness solutions to protect critical infrastructures, and analyze data relevant to risk assessment procedures for each critical infrastructure identified. Finally, the study addressed the drivers and gaps in research related to protecting and securing natural gas pipelines and electrical grid systems

    Russian Information Operations in the Soviet Strategic Framework

    Get PDF
    This thesis seeks to illuminate how information operations supports Russia’s strategy for creating power for the state. Using classic military theory and Soviet strategy as the lens, the paper examines information operations in the context of the nature of war. The examination includes historical and contemporary Russian publications on warfare, as well as information operations case studies from Eastern Europe, Georgia and Crimea. Russia’s operations are found to be consistent with a strategy of attrition. The opponent\u27s society is the primary target of information operations. The emphasis on information operations within contemporary Russian concepts of modern war indicate that the Russian military theory establishment judge this means of war as useful and persistent. Western nations must seek to separately and holistically understand Russia\u27s strategy and how information operations support it, as well as the role of society in the rubric of war. These elements are essential to counter Russian aggression

    Sustainable society:wellbeing and technology - 3 case studies in decision making

    Get PDF
    Throughout history, technology has provided many and significant improvements to the way we live, but the current pace of development now often exceeds the ability for the full potential of any technological innovation to be explored and implemented before further innovations are introduced. This pace of change results both in missed opportunities for a technology in its ability to contribute to effective solutions in addressing issues such as reducing adverse environmental impact or improving the health of society. In considering the nature of technological innovation and development, the associated engineering design processes can themselves be characterized as being associated with a highly complex, iterative problem-solving exercises, involving the integration and synthesis of a wide range of technologies. This in turn requires the design team to manage trade-offs across a range of primary constraints, as for instance embodied energy in manufacturing, energy consumption in use, capital costs and operating and resource recovery costs. Further investigation into the complexity of societal issues and means for achieving a more effective and fuller utilization of both existing resources and technologies is necessary to place sustainability as a priority of the decision making process. To support discussion and provide context, three case studies are presented. The first case study examines a strategic framework adopting metrics aligned with environmental issues used as proxies for evaluating wellbeing and common good. The second case study examines the specific contribution of eHealth to wellbeing and the balance of technological, societal and political issues in determining outcomes. The third case study considers how technology might be embedded as part of the process of obtaining meta-data from within a small rural community to demonstrate the impact of mitigation strategies associated with the reduction of its carbon footprint, and hence on climate change. In doing so, the paper seeks to bring together issues surrounding environmental problems in relation to a technology driven engineering design process while positioning them in the context of social benefits arising from sustainable decision making.</p

    Back to the Future? : Planning for uncertainty. A call for bridging the security and development communities

    Get PDF
    Master's thesis in Global Development and Planning (UT505)We currently see a foreign policy environment that is becoming more complex and volatile. Cyber is now established as a frequently used tool in foreign policy. Its disruptive qualities are concerning in terms of its implications on contemporary established economic and political structures. Cyber capabilities are cheap, accessible, omnipresent, and the domain from which it operates, namely that of cyberspace, is an inherent unregulated space. The concept of the security dilemma has resurged into cyberspace, and actors on a national and international level, are currently engaged in a digital arms race. Cyber capacity building was created as a tool by the cybercommunity to mitigate some of these challenges. Due to the impact that ICTs have on a societal scale, its implementation into a development context is inescapable. Nevertheless, the development community has been hesitant to implement security issues in its literature and is thus failing to engage on security-related matters sufficiently. One of the problems is the existence of silo mentalities. Hindering academic cross-pollination is limiting both communities in terms of creating mutually beneficial policies, which is a relatively stable foreign policy environment—described as an environment where sustainable political solutions can take root

    The Dialectics of Cyberspace: Communication Ethics as First Response to Cyber Attacks

    Get PDF
    This project recognizes the need to re-conceptualize cyberspace according to its characteristic dialectical tensions in order to offer lasting, adequate responses to cyber attacks. Scholars across multiple disciplines recognize the ineffectiveness of perimeter defense strategies, or the raising of defensive walls to protect sensitive information as the primary response to cyber attacks (Denning, 2001; Jang-Jaccard & Nepal, 2014; MacKinnon, Bacon, Gan, Loukas, Chadwick, Frangiskatos, 2013). Thus, this project suggests that in addition to a literacy in coding, corporations and policy makers must attend to what Ronald C. Arnett, Janie Harden Fritz, and Leeanne M. Bell McManus (2009/2018) term “communication ethics literacy” to illuminate the goods at stake in cyber attacks. Communication ethics literacy and its emphasis on learning from difference will encourage an examination of the background issues influencing foreground attacks (Arnett, McManus, & McKendree, 2013). The goods that shape cyberspace manifest in the dialectics of cyberspace. After reviewing historic and philosophic approaches to dialectic, this project employs a dialectical framework derived from the work of both Kenneth Burke (1941; 1945/1969) and David Gunkel (2007); Burke recognizes that dialectical terms do not reach a synthesis but rather remain in tension (Tell, 2004), and Gunkel announces the poststructuralist recognition that after their collision, neither term is the same and must be thought of as wholly and radically other. This project examines the dialectics of public/private, anonymity/identity, and national/global and their corresponding attacks of cyberbullying, cyber theft, and cyber terrorism and cyber war. The project concludes with an examination of the goods of public/private, anonymity/identity, and national/global to announce the importance of the maintenance of each pole of the dialectic while engaging cyberspace. This attentiveness yields implications for the continued application of communication ethicists, philosophers of communication, phenomenologists, and philosophers of technology to position communication ethics as a first response to cyber attacks
    • …
    corecore