Received: 2019-06-13  |  Accepted: 2019-12-10  |  Published: 2020-03-30

Title

Securing regional development


Abstract

Regional Development is linked to Sustainability, and also, Development is linked to Security, both nationally and globally. The expanded view of Security has opened the discussion of new technologies introduced non-traditional threats that become vulnerable to regional security and thereby to regional development. Five broad types of situations or premises that constitute a security in which threats overlap and interact, those new threats warrant new security paradigms that traditional international relations ignored so far. The purpose of this research is to analyze and study the impact of these new threats to security and how they affect regional development. Protection to the digital ecosystem and critical infrastructure from threats could be by implementing the security program of Governance, Risk, and Compliance (GRC), however, awareness, preparedness, and resilience of societies with the international community are as key preconditions of further secure and sustainable economic development and general well-being. Case studies of new technologies that threaten global societies economically and socially.


Keywords

regional development, critical infrastructure, cyber security, digital ecosystem, regional development, SDGs (Sustainable Development Goals), new technologies, STEM (Science, Technology, Engineering and Mathematics), sustainable development, trans-state threats


JEL classifications

D83 , O18 , Q56


URI

http://jssidoi.org/ird/article/29


DOI


HAL


Pages

430-442


Funding

This research was partly supported by the project, which has received funding from the European Union's Horizon 2020 research and innovation programme European Research Council (ERC) (Grant Agreement Number 830892)

This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License

Authors

Chehabeddine, Mohammad R.
Vilnius Gediminas Technical University, Vilnius, Lithuania https://vilniustech.lt
King Khalid International Airport, Riyadh, Saudi Arabia https://kkia.sa
Articles by this author in: CrossRef |  Google Scholar

Tvaronavičienė, Manuela
Vilnius Gediminas Technical University, Vilnius, Lithuania https://vilniustech.lt
Articles by this author in: CrossRef |  Google Scholar

Journal title

Insights into Regional Development

Volume

2


Number

1


Issue date

March 2020


Issue DOI


ISSN

ISSN 2345-0282 (online)


Publisher

VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania

Cited

Google Scholar

Article views & downloads

HTML views: 3651  |  PDF downloads: 1397

References


Burger, J. R., Allen, C. D., Brown, J. H., Burnside, W. R., Davidson, A. D., Fristoe, T. S., … Zuo, W. (2012). The macroecology of sustainability. PLoS Biology, 10(6). https://doi.org/10.1371/journal.pbio.1001345

Search via ReFindit


Buzan, B., & Hansen, L. (2009). The Evolution of International Security Studies. Cambridge: Cambridge University Press. http://doi.org/10.1017/CBO9780511817762

Search via ReFindit


Case Studies | 2015 UN-Water Annual International Zaragoza Conference. Water and Sustainable Development: From Vision to Action. 15-17 January 2015. (n.d.).

Search via ReFindit


Cha, V. D. (2000). Globalization and the Study of International Security. Journal of Peace Research, 37(3), 391–403.

Search via ReFindit


Chandler, D. (2007). The security-development nexus and the rise of “anti-foreign policy.” Journal of International Relations and Development, 10(4), 362–386. https://doi.org/10.1057/palgrave.jird.1800135

Search via ReFindit


Chapter 3. Concept of regional development and its measurements. Retrieved from https://shodhganga.inflibnet.ac.in/bitstream/10603/52566/11/11_chapter%203.pdf

Search via ReFindit


Cherchyk, L., Shershun, M., Khumarova, N., Mykytyn, T. Cherchyk, A. 2019. Assessment of forest enterprises' performance: integrating economic security and ecological impact. Entrepreneurship and Sustainability Issues, 6(4), 1784-1797. http://doi.org/10.9770/jesi.2019.6.4(17)

Search via ReFindit


EUR-Lex - jl0013 - EN - EUR-Lex. (n.d.). Retrieved August 25, 2019, from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=LEGISSUM%3Ajl0013

Search via ReFindit


Faridi, M.F., Sulphey, M. M. 2019. Food security as a prelude to sustainability: a case study in the agricultural sector, its impacts on the Al Kharj community in The Kingdom of Saudi Arabia. Entrepreneurship and Sustainability Issues, 6(3), 1336-1345. https://doi.org/10.9770/jssi.2019.6.3(34)

Search via ReFindit


Fruhlinger, Josh. 2017. What is WannaCry Ransomware, How Does It Infect, and Who Was Responsible? https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html

Search via ReFindit


Gibbs, Samuel. August 20, 2017. Elon Musk Leads 116 Experts Calling for Outright Ban of Killer Robots. The Guardian.

Search via ReFindit


Gueldry, M., Gokcek, G., Hebron, L. 2019. Understanding New Security Threats

Search via ReFindit


Gueldry, M., Wei, L. June 2016. China's Global Energy Diplomacy: Behavior Normalization through Economic Interdependence or Resource Neo-Mercantilism and Power Politics? Journal of Chinese Political Science, 21(2), 217–240.

Search via ReFindit


Huawei ban: Full timeline on how and why its phones are under fire - CNET. (n.d.). Retrieved August 26, 2019, from https://www.cnet.com/news/huawei-ban-full-timeline-on-how-why-its-phones-are-under-fire/

Search via ReFindit


Iorio, M., Monni, S., Brollo, B. 2018. The Brazilian Amazon: a resource curse or renewed colonialism? Entrepreneurship and Sustainability Issues, 5(3). 438-451. https://doi.org/10.9770/jesi.2018.5.3(2)

Search via ReFindit


Kelly, Kevin. 2017. The Inevitable: Understanding the 12 Technological Forces that Will Shape Our Future. New York: Penguin.

Search via ReFindit


Kelly, Kevin. 2018. The Technium: Technology, or the Evolution of Evolution. Kk.Org. http://kk.org/thetechnium/technology-or-t/

Search via ReFindit


Khagram, S., Clark, W., Raad, D. F. (2003). From the Environment and Human Security to Sustainable Security and Development. Journal of Human Development, 4(2), 289–313. https://doi.org/10.1080/1464988032000087604

Search via ReFindit


Knight, Frank H. 2006 (1921). Risk, Uncertainty, and Profit. Mineola, NY: Dover Publications.

Search via ReFindit


Korauš, A., Gombár, M., Kelemen, P., Polák, J. 2019. Analysis of respondents' opinions and attitudes toward the security of payment systems. Entrepreneurship and Sustainability Issues, 6(4), 1987-2002. http://doi.org/10.9770/jesi.2019.6.4(31)

Search via ReFindit


Limba, T., Agafonov, K., Paukštė, L., Damkus, M., Plėta, T. (2017). Peculiarities of cybersecurity management in the process of internet voting implementation , Entrepreneurship and Sustainability Issues, 5(2), 368-402. https://doi.org/10.9770/jesi.2017.5.2(15)

Search via ReFindit


Mallozzi, Joseph, Mullie, Paul. 2015. Dark Matter. Toronto: Prodigy Pictures.

Search via ReFindit


Martinovsky, Petr. 2011. Environmental Security and Classical Typology of Security Studies. The Science for Population Protection, 3(2), 1–16. http://www.population-protection.eu/prilohy/casopis/11/81.pdf

Search via ReFindit


Moumen, Z., El Idrissi, N.E.A., Tvaronavičienė, M., Lahrach, A. 2019. Water security and sustainable development. Insights into Regional Development, 1(4), 301-317. https://doi.org/10.9770/ird.2019.1.4(2)

Search via ReFindit


Muniz, J,; da Gloria, M., de Melo, G., Liberato, M., A., R., Wahnfried, I.; Vieira, G. 2018. Towards sustainability: allowance rights for using water resources in Amazonas State of Brazil, Entrepreneurship and Sustainability Issues 5(4): 761-779. https://doi.org/10.9770/jesi.2018.5.4(5)

Search via ReFindit


Njaramba, J, Chigeza, P, Whitehouse, H, 2018. Barriers and challenges experienced by migrant African women entrepreneurs in North Queensland, Australia, Entrepreneurship and Sustainability Issues 5(4): 1054-1068. http://doi.org/10.9770/jesi.2018.5.4(25)

Search via ReFindit


Nordrum, Amy. August 18, 2016. Popular Internet of Things Forecast of 50 Billion Devices by 2020 is Outdated. IEEE Spectrum: Technology, Engineering, and Science News. https://spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated

Search via ReFindit


Paleri, P. (2008). National security: imperatives and challenges. Tata McGraw-Hill Pub. Co.

Search via ReFindit


Pike, A., Rodríguez-Pose, A., & Tomaney, J. (n.d.). Handbook of Local and Regional Development. Retrieved from http://www.regscience.hu:88/record/418/files/DEMO-BOOK-2017-055.pdf?version=1

Search via ReFindit


Prause, G., Tuisk, T., Olaniyi. 2019. Between Sustainability, Social Cohesion and Security. Regional Development in North-Eastern Estonia. Entrepreneurship and Sustainability Issues, 6(3), 1135-1154. http://doi.org/10.9770/jesi.2019.6.3(13)

Search via ReFindit


Rogalev, A., Komarov, I., Kindra, V., Zlyvk, O. 2018. Entrepreneurial assessment of sustainable development technologies for power energy sector. Enterpreneurship and Sustainability Issues, 6(1), 429-445. http://doi.org/10.9770/jesi.2018.6.1(26)

Search via ReFindit


Sebastiani, J., Sanchez, J., Manrod, M. 2019. Understanding New Security Threats, Routledge Published March 6, p. 254. Security and development | SIPRI. (n.d.). Retrieved January 3, 2019, from https://www.sipri.org/yearbook/2015/08

Search via ReFindit


Stewart, F. (n.d.). CRISE Working Paper Development and Security Development and Security. Retrieved from https://assets.publishing.service.gov.uk/media/57a08cd140f0b652dd00159c/wp3.pdf

Search via ReFindit


Tireuov, K., Mizanbekova, S., Kalykova, B., Nurmanbekova, G. 2018. Towards food security and sustainable development through enhancing efficiency of grain industry. Enterpreneurship and Sustainability Issues, 6(1), 446-455. http://doi.org/10.9770/jesi.2018.6.1(27)

Search via ReFindit


Tung, L. T. 2019. Role of Unemployment insurance in Sustainable development in Vietnam: Overview and policy implication, Entrepreneurship and Sustainability Issues, 6(3), 1039-1055. http://doi.org/10.9770/jesi.2019.6.3(6)

Search via ReFindit


Tvaronavičienė M. 2018. Towards internationally tuned approach towards critical infrastructure protection, Journal of Security and Sustainability Issues, 8(2), 143-150. https://doi.org/10.9770/jssi.2018.8.2(2)

Search via ReFindit


Vance, Ashlee. 2017 (2015). Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future. New York: Harper Collins.

Search via ReFindit


Vlasov, A.I., Shakhnov, V.A., Filin, S.S., Krivoshein, A.I. 2019. Sustainable energy systems in the digital economy: concept of smart machines, Entrepreneurship and Sustainability Issues, 6(4), 1975-1986. http://doi.org/10.9770/jesi.2019.6.4(30)

Search via ReFindit


Vulns Tagged Entries - (CGISecurity.com). (n.d.). Retrieved August 25, 2019, from https://www.cgisecurity.com/vulns/

Search via ReFindit


Zetter, K. 2014. An Unprecedented Look at Stuxnet, the World's First Digital Weapon. WIRED. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/

Search via ReFindit