首页 > 最新文献

Applied Cybersecurity & Internet Governance最新文献

英文 中文
Commentary: The Czech Approach to Supply Chain Security in ICT 评论:捷克在ICT供应链安全方面的做法
Pub Date : 2022-12-02 DOI: 10.5604/01.3001.0016.0867
Veronika Netolická
Supply chain security is one of the challenges many countries are currently addressing. As this topic is a national security prerogative, the systems for screening also vary. The Czech Republic is preparing a legislative framework to protect strategically important infrastructure from high-risk suppliers. This commentary focuses on the Czech Republic’s progress in this area, particularly in the European context.
供应链安全是许多国家目前正在解决的挑战之一。由于这个话题是国家安全特权,审查制度也各不相同。捷克共和国正在制定一项立法框架,以保护具有战略重要性的基础设施不受高风险供应商的影响。本评论的重点是捷克共和国在这一领域,特别是在欧洲范围内取得的进展。
{"title":"Commentary: The Czech Approach to Supply Chain Security in ICT","authors":"Veronika Netolická","doi":"10.5604/01.3001.0016.0867","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0867","url":null,"abstract":"Supply chain security is one of the challenges many countries are currently addressing. As this topic is a national security prerogative, the systems for screening also vary. The Czech Republic is preparing a legislative framework to protect strategically important infrastructure from high-risk suppliers. This commentary focuses on the Czech Republic’s progress in this area, particularly in the European context.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"16 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The (Il)legitimacy ofCybersecurity. An Applicationof Just Securitization Theoryto Cybersecurity based onthe Principle of Subsidiarity 网络安全的合法性。基于辅助原则的公正证券化理论在网络安全中的应用
Pub Date : 2022-11-17 DOI: 10.5604/01.3001.0016.1093
Johannes Thumfart
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization theory, it also addresses the normative question of when securitization is legitimate. In this contribution, I critically apply Floyd’s JST to cybersecurity and develop my own version of JST based on subsidiarity. Floyd’s JST follows a minimalistic and subsidiary approach by emphasizing that securitization is only legitimate if it has a reasonable chance of success in averting threats to the satisfaction of basic human needs. From this restrictive perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses exclusively on permissibility and needs instead of rights, I argue that there are cases in which states’ compliance with human rights obligations requires the guarantee of cybersecurity, most importantly regarding the human right to privacy. My version of JST is also based on the principle of subsidiarity, in the sense that securitization should always include stakeholders directly affected by a threat. To strengthen this kind of subsidiarity, focused on the private sector, I argue for the legitimacy of private active self-defence in cyberspace and emphasize the importance of a ‘whole-of-society approach’ involving digital literacy and everyday security practices. Moreover, I argue that far-reaching securitization on the nation-state-level should be avoided, particularly the hyper-securitization of the digital public sphere, following unclear notions of ‘digital sovereignty’.
将证券化理论应用于网络安全是有用的,因为它将威胁构建的情感修辞置于批判性审查之下。弗洛伊德的正义证券化理论是证券化理论和正义战争理论的结合体。与传统的证券化理论不同,它还解决了证券化何时合法的规范性问题。在这篇文章中,我批判性地将弗洛伊德的JST应用于网络安全,并基于辅助性开发了我自己的JST版本。弗洛伊德的JST遵循一种简约和辅助的方法,强调证券化只有在它有合理的机会成功地避免对人类基本需求的满足构成威胁时才是合法的。从这个限制性的角度来看,网络证券化只有在保护关键基础设施的情况下才是合法的。虽然Floyd的JST只关注许可和需求,而不是权利,但我认为在某些情况下,国家遵守人权义务需要保证网络安全,最重要的是关于人权的隐私权。我的JST版本也是基于辅助原则,也就是说,证券化应该始终包括直接受到威胁影响的利益相关者。为了加强这种以私营部门为重点的辅助性,我论证了私人在网络空间积极自卫的合法性,并强调了涉及数字素养和日常安全实践的“全社会方法”的重要性。此外,我认为应该避免民族国家层面的深远的证券化,特别是数字公共领域的超证券化,遵循不明确的“数字主权”概念。
{"title":"The (Il)legitimacy of\u0000Cybersecurity. An Application\u0000of Just Securitization Theory\u0000to Cybersecurity based on\u0000the Principle of Subsidiarity","authors":"Johannes Thumfart","doi":"10.5604/01.3001.0016.1093","DOIUrl":"https://doi.org/10.5604/01.3001.0016.1093","url":null,"abstract":"The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization theory, it also addresses the normative question of when securitization is legitimate. In this contribution, I critically apply Floyd’s JST to cybersecurity and develop my own version of JST based on subsidiarity. Floyd’s JST follows a minimalistic and subsidiary approach by emphasizing that securitization is only legitimate if it has a reasonable chance of success in averting threats to the satisfaction of basic human needs. From this restrictive perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses exclusively on permissibility and needs instead of rights, I argue that there are cases in which states’ compliance with human rights obligations requires the guarantee of cybersecurity, most importantly regarding the human right to privacy. My version of JST is also based on the principle of subsidiarity, in the sense that securitization should always include stakeholders directly affected by a threat. To strengthen this kind of subsidiarity, focused on the private sector, I argue for the legitimacy of private active self-defence in cyberspace and emphasize the importance of a ‘whole-of-society approach’ involving digital literacy and everyday security practices. Moreover, I argue that far-reaching securitization on the nation-state-level should be avoided, particularly the hyper-securitization of the digital public sphere, following unclear notions of ‘digital sovereignty’.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy on the Internet:An Empirical Study of Poles’Attitudes 互联网隐私:波兰人态度的实证研究
Pub Date : 2022-11-17 DOI: 10.5604/01.3001.0016.1459
Daniel Mider
The value system of Poles in terms of the phenomenon of privacy on the Internet was analysed. The following aspects were taken into account: privacy on the Internet as a moral value, privacy on the Internet as a subject of legal regulations (current or future) and actual actions taken by users to protect privacy. The differentiation of Polish society in terms of the three above-mentioned areas was also examined. Results were obtained on the basis of a quantitative empirical study conducted on a representative sample (N=1001) of adult Poles. The method of computer assisted telephone interviews (CATI) was used. Descriptive statistics and selected inductive statistics were used in the analyses. Intra-group differentiation was investigated using a method called two-step cluster analysis. Poles have low technical competences in the field of Internet privacy protection. This value is appreciated; however, it rarely translates into active protection of one’s own identity and information. A strong polarization of Poles’ attitudes towards the requirement to disclose their identity on the Internet was identified, as well as ensuring access to any user information by law enforcement agencies. Poles are willing to accept legal regulations preventing their profiling. We note a moderately strong negative attitude towards state institutions as a factor limiting privacy on the Internet and a significantly lower (but still negative) attitude towards Internet service providers. Poles differ in terms of attitudes towards privacy on the Internet (IT competences, age, education, gender, socioeconomic status and size of the place of residence).
从网络隐私现象的角度分析波兰人的价值体系。考虑了以下几个方面:互联网上的隐私作为一种道德价值,互联网上的隐私作为法律法规(现在或将来)的主题,以及用户为保护隐私而采取的实际行动。本文还研究了波兰社会在上述三个方面的差异。结果是基于对成年波兰人代表性样本(N=1001)进行的定量实证研究得出的。采用计算机辅助电话访谈(CATI)方法。在分析中使用了描述性统计和选择性归纳统计。用一种叫做两步聚类分析的方法来调查群内分化。波兰人在互联网隐私保护领域的技术能力较低。这个价值值得赞赏;然而,它很少转化为积极保护自己的身份和信息。调查发现,波兰人对在互联网上公开自己身份的要求,以及确保执法机构获得任何用户信息的态度,都存在强烈的两极分化。波兰人愿意接受禁止对他们进行定性的法律规定。我们注意到,作为限制互联网隐私的因素,人们对国家机构持中等强烈的负面态度,而对互联网服务提供商的态度则明显较低(但仍然是负面的)。波兰人对互联网隐私的态度各不相同(信息技术能力、年龄、教育程度、性别、社会经济地位和居住地大小)。
{"title":"Privacy on the Internet:\u0000An Empirical Study of Poles’\u0000Attitudes","authors":"Daniel Mider","doi":"10.5604/01.3001.0016.1459","DOIUrl":"https://doi.org/10.5604/01.3001.0016.1459","url":null,"abstract":"The value system of Poles in terms of the phenomenon of privacy on the Internet was analysed. The following aspects were taken into account: privacy on the Internet as a moral value, privacy on the Internet as a subject of legal regulations (current or future) and actual actions taken by users to protect privacy. The differentiation of Polish society in terms of the three above-mentioned areas was also examined. Results were obtained on the basis of a quantitative empirical study conducted on a representative sample (N=1001) of adult Poles. The method of computer assisted telephone interviews (CATI) was used. Descriptive statistics and selected inductive statistics were used in the analyses. Intra-group differentiation was investigated using a method called two-step cluster analysis. Poles have low technical competences in the field of Internet privacy protection. This value is appreciated; however, it rarely translates into active protection of one’s own identity and information. A strong polarization of Poles’ attitudes towards the requirement to disclose their identity on the Internet was identified, as well as ensuring access to any user information by law enforcement agencies. Poles are willing to accept legal regulations preventing their profiling. We note a moderately strong negative attitude towards state institutions as a factor limiting privacy on the Internet and a significantly lower (but still negative) attitude towards Internet service providers. Poles differ in terms of attitudes towards privacy on the Internet (IT competences, age, education, gender, socioeconomic status and size of the place of residence).\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing Object Capabilities to Improve Web Application Security 利用对象功能提高Web应用程序安全性
Pub Date : 2022-11-16 DOI: 10.5604/01.3001.0016.0823
Michael Koppmann, Christian Kudera, Michael Pucher, Georg Merzdovnik
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform. With this change, authorization models change and no longer depend on operating system accounts and underlying access controls and file permissions. Instead, these accounts are now implemented in the applications themselves, including all of the protective measures and security controls that are required for this. Because of the inherent complexity, flaws in the authorization logic are among the most common security vulnerabilities in web applications. Most applications are built on the concept of the Access-Control List (ACL), a security model that decides who can access a given object. Object Capabilities, transferable rights to perform operations on specific objects, have been proposed as an alternative to ACLs, since they are not susceptible to certain attacks prevalent for ACLs. While their use has been investigated for various domains, such as smart contracts, they have not been widely applied for web applications. In this paper, we therefore present a general overview of the capability-based authorization model and adapt those approaches for use in web applications. Based on a prototype implementation, we show the ways in which Object Capabilities may enhance security, while also offering insights into existing pitfalls and problems in porting such models to the web domain.
如今,越来越多的应用程序是用web技术构建的,比如HTML、CSS和JavaScript,然后在浏览器中执行。web是一个独立于操作系统的应用平台。通过此更改,授权模型将发生更改,不再依赖于操作系统帐户和底层访问控制以及文件权限。相反,这些帐户现在是在应用程序本身中实现的,包括为此所需的所有保护措施和安全控制。由于其固有的复杂性,授权逻辑中的缺陷是web应用程序中最常见的安全漏洞之一。大多数应用程序都是基于访问控制列表(ACL)的概念构建的,这是一种安全模型,决定谁可以访问给定对象。对象能力,即对特定对象执行操作的可转让权利,已被提议作为acl的替代方案,因为它们不容易受到acl常见的某些攻击的影响。虽然它们在智能合约等各个领域的使用已经被研究过,但它们还没有广泛应用于web应用程序。因此,在本文中,我们对基于能力的授权模型进行了总体概述,并对这些方法进行了调整,以便在web应用程序中使用。基于一个原型实现,我们展示了对象能力可以增强安全性的方法,同时也提供了对将这种模型移植到web领域中存在的陷阱和问题的见解。
{"title":"Utilizing Object Capabilities to Improve Web Application Security","authors":"Michael Koppmann, Christian Kudera, Michael Pucher, Georg Merzdovnik","doi":"10.5604/01.3001.0016.0823","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0823","url":null,"abstract":"Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform. With this change, authorization models change and no longer depend on operating system accounts and underlying access controls and file permissions. Instead, these accounts are now implemented in the applications themselves, including all of the protective measures and security controls that are required for this. Because of the inherent complexity, flaws in the authorization logic are among the most common security vulnerabilities in web applications. Most applications are built on the concept of the Access-Control List (ACL), a security model that decides who can access a given object. Object Capabilities, transferable rights to perform operations on specific objects, have been proposed as an alternative to ACLs, since they are not susceptible to certain attacks prevalent for ACLs. While their use has been investigated for various domains, such as smart contracts, they have not been widely applied for web applications. In this paper, we therefore present a general overview of the capability-based authorization model and adapt those approaches for use in web applications. Based on a prototype implementation, we show the ways in which Object Capabilities may enhance security, while also offering insights into existing pitfalls and problems in porting such models to the web domain.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russian Aggression against Ukraine as the Accelerator in the Systemic Struggle against Disinformation in Czechia 俄罗斯对乌克兰的侵略是捷克系统性打击虚假信息斗争的加速器
Pub Date : 2022-11-16 DOI: 10.5604/01.3001.0016.0916
Ladislav Cabada
In the last decade Czechia’s foreign and security policies were destabilised by the activities of external actors, with Russia in the leading role, and also by internal ac- tors who followed the Russian and pro-Kremlin propaganda and disinformation campaigns and/or actively participated in such subversive activities. After 2015, within the set of crises and their securitisation, a disinformation network was developed in Czechia using social media and so-called ‘alternative online media’ for the dissemination of disinformation, mis- information, fake news and chain mails to spread these campaigns. As leading persons in the executive belonged to the disinformers, the government was not able to develop work- ing strategies against the disinformation campaigns as the new hybrid threat until 2021. At the end of 2021, the new Czech government of Prime Minister Petr Fiala launched a new strategy regarding hybrid threats which contained disinformation. The one-year plan to establish a systemic platform for the struggle against such threats was challenged by Russian aggression against Ukraine. In this article, we analyse the development of the security eco-system in Czechia against these hybrid threats, specifically the acceleration and intensification of this activity after 24 February 2022.
在过去十年中,捷克的外交和安全政策受到以俄罗斯为首的外部行为者的活动以及追随俄罗斯和亲克里姆林宫的宣传和虚假宣传运动和/或积极参与此类颠覆活动的内部行为者的破坏。2015年之后,在一系列危机及其证券化中,捷克利用社交媒体和所谓的“替代在线媒体”建立了一个虚假信息网络,用于传播虚假信息、错误信息、假新闻和连锁邮件,以传播这些活动。由于行政部门的主要人物属于造谣者,政府直到2021年才能够制定工作战略来对付作为新的混合威胁的造谣运动。2021年底,捷克总理彼得·菲亚拉(peter Fiala)领导的新政府推出了一项针对包含虚假信息的混合威胁的新战略。俄罗斯对乌克兰的侵略挑战了为抗击此类威胁而建立系统性平台的一年期计划。在本文中,我们分析了捷克安全生态系统的发展,以应对这些混合威胁,特别是在2022年2月24日之后,这种活动的加速和加剧。
{"title":"Russian Aggression against Ukraine as the Accelerator in the Systemic Struggle against Disinformation in Czechia","authors":"Ladislav Cabada","doi":"10.5604/01.3001.0016.0916","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0916","url":null,"abstract":"In the last decade Czechia’s foreign and security policies were destabilised by the activities of external actors, with Russia in the leading role, and also by internal ac- tors who followed the Russian and pro-Kremlin propaganda and disinformation campaigns and/or actively participated in such subversive activities. After 2015, within the set of crises and their securitisation, a disinformation network was developed in Czechia using social media and so-called ‘alternative online media’ for the dissemination of disinformation, mis- information, fake news and chain mails to spread these campaigns. As leading persons in the executive belonged to the disinformers, the government was not able to develop work- ing strategies against the disinformation campaigns as the new hybrid threat until 2021. At the end of 2021, the new Czech government of Prime Minister Petr Fiala launched a new strategy regarding hybrid threats which contained disinformation. The one-year plan to establish a systemic platform for the struggle against such threats was challenged by Russian aggression against Ukraine. In this article, we analyse the development of the security eco-system in Czechia against these hybrid threats, specifically the acceleration and intensification of this activity after 24 February 2022.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions 网络安全中的人工智能:进攻战术、缓解技术和未来方向
Pub Date : 2022-11-04 DOI: 10.5604/01.3001.0016.0800
Erwin Adi, Z. Baig, S. Zeadally
Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.
网络安全得益于用于攻击检测的人工智能技术。然而,人工智能技术的最新进展,以及它们的滥用,已经超过了通过学术和行业主导的努力实现的网络攻击分类方法的并行进展。我们描述了人工智能技术发展的转变,并展示了最近的人工智能方法如何有效地帮助对手实现他/她的网络攻击目标。我们还讨论了当前的计算机通信体系结构如何使针对异构计算平台和基础设施的基于人工智能的对抗性威胁的发展成为可能。
{"title":"Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions","authors":"Erwin Adi, Z. Baig, S. Zeadally","doi":"10.5604/01.3001.0016.0800","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0800","url":null,"abstract":"Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UK Border Digitalisation – a Commentary on the Current State of Affairs 英国边境数字化——对当前事态的评论
Pub Date : 2022-11-04 DOI: 10.5604/01.3001.0016.1052
Marika Kosiel-Pająk
The commentary focuses on the current process of converting the British immigration procedures into an entirely digital format, as part of a reform brought about by Brexit and in the framework of broader digital strategies in the United Kingdom of Great Britain and Northern Ireland. The British government’s ambitious aim is to digitalise the immigration procedures by 2025, further support eGates and eventually enforce a contactless mode of arrival. The policy plan, its execution to date and its reception are analysed briefly. Taking into account that the government is revealing only selected aspects of the complex system rather than all the mechanisms and safeguards, neither British digital sovereignty in this matter nor the scope of protection of personal and meta-data could be fully examined. The challenges already encountered are set out, with the conclusion being that a human-centred approach is still lacking in the practical employment of the policy. Subsequently, the isolationist or populist concept of protecting the state against any migrant, as a potential threat rather than a potential to be developed for the benefit of the state, is the prevailing mindset. Finally, the current political and economic instability may play a pivotal role in policy implementation and contribute to its ultimate failure.
作为英国脱欧带来的改革的一部分,以及在大不列颠及北爱尔兰联合王国更广泛的数字战略框架内,该评论侧重于将英国移民程序转换为完全数字化格式的当前进程。英国政府雄心勃勃的目标是到2025年实现移民程序数字化,进一步支持电子闸门,并最终实施非接触式入境模式。简要分析了该政策计划、迄今为止的执行情况和接受情况。考虑到政府只是披露了这个复杂系统的某些方面,而不是所有的机制和保障措施,无论是英国在这个问题上的数字主权,还是对个人数据和元数据的保护范围,都无法得到充分的审查。本文阐述了已经遇到的挑战,结论是在政策的实际运用中仍然缺乏以人为中心的办法。随后,孤立主义或民粹主义的保护国家不受任何移民影响的概念成为了主流思维,移民是一种潜在的威胁,而不是为了国家利益而开发的潜力。最后,当前的政治和经济不稳定可能在政策实施中发挥关键作用,并导致其最终失败。
{"title":"UK Border Digitalisation – a Commentary on the Current State of Affairs","authors":"Marika Kosiel-Pająk","doi":"10.5604/01.3001.0016.1052","DOIUrl":"https://doi.org/10.5604/01.3001.0016.1052","url":null,"abstract":"The commentary focuses on the current process of converting the British immigration procedures into an entirely digital format, as part of a reform brought about by Brexit and in the framework of broader digital strategies in the United Kingdom of Great Britain and Northern Ireland. The British government’s ambitious aim is to digitalise the immigration procedures by 2025, further support eGates and eventually enforce a contactless mode of arrival. The policy plan, its execution to date and its reception are analysed briefly. Taking into account that the government is revealing only selected aspects of the complex system rather than all the mechanisms and safeguards, neither British digital sovereignty in this matter nor the scope of protection of personal and meta-data could be fully examined. The challenges already encountered are set out, with the conclusion being that a human-centred approach is still lacking in the practical employment of the policy. Subsequently, the isolationist or populist concept of protecting the state against any migrant, as a potential threat rather than a potential to be developed for the benefit of the state, is the prevailing mindset. Finally, the current political and economic instability may play a pivotal role in policy implementation and contribute to its ultimate failure.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129084053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Substantive Criminal Aspects of the Offence of Simulated Child Pornography under Polish Law 波兰法律下模拟儿童色情犯罪的实体刑事方面
Pub Date : 2022-10-30 DOI: 10.5604/01.3001.0016.0690
Remigiusz Rosicki
The objective scope of the research problem concerns the content and sense of the elements characterising one of the types of child pornography, criminalised under Art. 202 §4b of the Criminal Code, i.e. simulated child pornography. This offence is understood as producing, disseminating, presenting, storage and possession of pornographic material presenting a generated or processed image of a minor participating in sexual activity. The main goal of the text is to perform a substantive criminal analysis of the act criminalised under Art. 202 §4b of the Polish Criminal Code. The scope of the analysis has been elaborated with the following research question concerning the degree of effectiveness: To what degree is the legal solution concerned with criminalisation and penalisation of the activities of »production, dissemination, presentation, storage or possession of pornographic material presenting a generated or processed image of a minor participating in sexual activities« effective and realises the ratio legis intended by the legislator? The analysis of the problem has been performed with the aid of chiefly institutional and legal approach in the form of textual, functional and doctrinal interpretations, which have been supplemented with the author’s own conclusions and opinions.
研究问题的客观范围涉及根据《刑法》第202条第4b款定为刑事犯罪的一种儿童色情制品,即模拟儿童色情制品,其特征要素的内容和意义。这一罪行被理解为制作、传播、出示、储存和拥有色情材料,这些材料显示了未成年人参与性活动的生成或处理过的图像。本文的主要目的是对根据《波兰刑法》第202条第4b款定为刑事犯罪的行为进行实质性刑事分析。分析的范围是通过以下关于有效性程度的研究问题来阐述的:关于“制作、传播、展示、储存或拥有呈现未成年人参与性活动的生成或处理图像的色情材料”的犯罪和惩罚活动的法律解决方案在多大程度上是有效的,并实现了立法者所期望的法律比例?对这一问题的分析主要是在体制和法律方法的帮助下进行的,以文本、功能和理论解释的形式,并辅以作者自己的结论和意见。
{"title":"The Substantive Criminal Aspects of the Offence of Simulated Child Pornography under Polish Law","authors":"Remigiusz Rosicki","doi":"10.5604/01.3001.0016.0690","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0690","url":null,"abstract":"The objective scope of the research problem concerns the content and sense of the elements characterising one of the types of child pornography, criminalised under Art. 202 §4b of the Criminal Code, i.e. simulated child pornography. This offence is understood as producing, disseminating, presenting, storage and possession of pornographic material presenting a generated or processed image of a minor participating in sexual activity. The main goal of the text is to perform a substantive criminal analysis of the act criminalised under Art. 202 §4b of the Polish Criminal Code. The scope of the analysis has been elaborated with the following research question concerning the degree of effectiveness: To what degree is the legal solution concerned with criminalisation and penalisation of the activities of »production, dissemination, presentation, storage or possession of pornographic material presenting a generated or processed image of a minor participating in sexual activities« effective and realises the ratio legis intended by the legislator? The analysis of the problem has been performed with the aid of chiefly institutional and legal approach in the form of textual, functional and doctrinal interpretations, which have been supplemented with the author’s own conclusions and opinions. \u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Applied Cybersecurity & Internet Governance
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1