Received:
2019-06-13 | Accepted:
2019-12-10 | Published:
2020-03-30
Title
Securing regional development
Abstract
Regional Development is linked to Sustainability, and also, Development is linked to Security, both nationally and globally. The expanded view of Security has opened the discussion of new technologies introduced non-traditional threats that become vulnerable to regional security and thereby to regional development. Five broad types of situations or premises that constitute a security in which threats overlap and interact, those new threats warrant new security paradigms that traditional international relations ignored so far. The purpose of this research is to analyze and study the impact of these new threats to security and how they affect regional development. Protection to the digital ecosystem and critical infrastructure from threats could be by implementing the security program of Governance, Risk, and Compliance (GRC), however, awareness, preparedness, and resilience of societies with the international community are as key preconditions of further secure and sustainable economic development and general well-being. Case studies of new technologies that threaten global societies economically and socially.
Keywords
regional development, critical infrastructure, cyber security, digital ecosystem, regional development, SDGs (Sustainable Development Goals), new technologies, STEM (Science, Technology, Engineering and Mathematics), sustainable development, trans-state threats
JEL classifications
D83
, O18
, Q56
URI
http://jssidoi.org/ird/article/29
DOI
HAL
Pages
430-442
Funding
This research was partly supported by the project, which has received funding from the European Union's Horizon 2020 research and innovation programme European Research Council (ERC) (Grant Agreement Number 830892)
This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License
References
Burger, J. R., Allen, C. D., Brown, J. H., Burnside, W. R., Davidson, A. D., Fristoe, T. S., … Zuo, W. (2012). The macroecology of sustainability. PLoS Biology, 10(6). https://doi.org/10.1371/journal.pbio.1001345
Search via ReFindit
Buzan, B., & Hansen, L. (2009). The Evolution of International Security Studies. Cambridge: Cambridge University Press. http://doi.org/10.1017/CBO9780511817762
Search via ReFindit
Case Studies | 2015 UN-Water Annual International Zaragoza Conference. Water and Sustainable Development: From Vision to Action. 15-17 January 2015. (n.d.).
Search via ReFindit
Cha, V. D. (2000). Globalization and the Study of International Security. Journal of Peace Research, 37(3), 391–403.
Search via ReFindit
Chandler, D. (2007). The security-development nexus and the rise of “anti-foreign policy.” Journal of International Relations and Development, 10(4), 362–386. https://doi.org/10.1057/palgrave.jird.1800135
Search via ReFindit
Chapter 3. Concept of regional development and its measurements. Retrieved from https://shodhganga.inflibnet.ac.in/bitstream/10603/52566/11/11_chapter%203.pdf
Search via ReFindit
Cherchyk, L., Shershun, M., Khumarova, N., Mykytyn, T. Cherchyk, A. 2019. Assessment of forest enterprises' performance: integrating economic security and ecological impact. Entrepreneurship and Sustainability Issues, 6(4), 1784-1797. http://doi.org/10.9770/jesi.2019.6.4(17)
Search via ReFindit
EUR-Lex - jl0013 - EN - EUR-Lex. (n.d.). Retrieved August 25, 2019, from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=LEGISSUM%3Ajl0013
Search via ReFindit
Faridi, M.F., Sulphey, M. M. 2019. Food security as a prelude to sustainability: a case study in the agricultural sector, its impacts on the Al Kharj community in The Kingdom of Saudi Arabia. Entrepreneurship and Sustainability Issues, 6(3), 1336-1345. https://doi.org/10.9770/jssi.2019.6.3(34)
Search via ReFindit
Fruhlinger, Josh. 2017. What is WannaCry Ransomware, How Does It Infect, and Who Was Responsible? https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html
Search via ReFindit
Gibbs, Samuel. August 20, 2017. Elon Musk Leads 116 Experts Calling for Outright Ban of Killer Robots. The Guardian.
Search via ReFindit
Gueldry, M., Gokcek, G., Hebron, L. 2019. Understanding New Security Threats
Search via ReFindit
Gueldry, M., Wei, L. June 2016. China's Global Energy Diplomacy: Behavior Normalization through Economic Interdependence or Resource Neo-Mercantilism and Power Politics? Journal of Chinese Political Science, 21(2), 217–240.
Search via ReFindit
Huawei ban: Full timeline on how and why its phones are under fire - CNET. (n.d.). Retrieved August 26, 2019, from https://www.cnet.com/news/huawei-ban-full-timeline-on-how-why-its-phones-are-under-fire/
Search via ReFindit
Iorio, M., Monni, S., Brollo, B. 2018. The Brazilian Amazon: a resource curse or renewed colonialism? Entrepreneurship and Sustainability Issues, 5(3). 438-451. https://doi.org/10.9770/jesi.2018.5.3(2)
Search via ReFindit
Kelly, Kevin. 2017. The Inevitable: Understanding the 12 Technological Forces that Will Shape Our Future. New York: Penguin.
Search via ReFindit
Kelly, Kevin. 2018. The Technium: Technology, or the Evolution of Evolution. Kk.Org. http://kk.org/thetechnium/technology-or-t/
Search via ReFindit
Khagram, S., Clark, W., Raad, D. F. (2003). From the Environment and Human Security to Sustainable Security and Development. Journal of Human Development, 4(2), 289–313. https://doi.org/10.1080/1464988032000087604
Search via ReFindit
Knight, Frank H. 2006 (1921). Risk, Uncertainty, and Profit. Mineola, NY: Dover Publications.
Search via ReFindit
Korauš, A., Gombár, M., Kelemen, P., Polák, J. 2019. Analysis of respondents' opinions and attitudes toward the security of payment systems. Entrepreneurship and Sustainability Issues, 6(4), 1987-2002. http://doi.org/10.9770/jesi.2019.6.4(31)
Search via ReFindit
Limba, T., Agafonov, K., Paukštė, L., Damkus, M., Plėta, T. (2017). Peculiarities of cybersecurity management in the process of internet voting implementation , Entrepreneurship and Sustainability Issues, 5(2), 368-402. https://doi.org/10.9770/jesi.2017.5.2(15)
Search via ReFindit
Mallozzi, Joseph, Mullie, Paul. 2015. Dark Matter. Toronto: Prodigy Pictures.
Search via ReFindit
Martinovsky, Petr. 2011. Environmental Security and Classical Typology of Security Studies. The Science for Population Protection, 3(2), 1–16. http://www.population-protection.eu/prilohy/casopis/11/81.pdf
Search via ReFindit
Moumen, Z., El Idrissi, N.E.A., Tvaronavičienė, M., Lahrach, A. 2019. Water security and sustainable development. Insights into Regional Development, 1(4), 301-317. https://doi.org/10.9770/ird.2019.1.4(2)
Search via ReFindit
Muniz, J,; da Gloria, M., de Melo, G., Liberato, M., A., R., Wahnfried, I.; Vieira, G. 2018. Towards sustainability: allowance rights for using water resources in Amazonas State of Brazil, Entrepreneurship and Sustainability Issues 5(4): 761-779. https://doi.org/10.9770/jesi.2018.5.4(5)
Search via ReFindit
Njaramba, J, Chigeza, P, Whitehouse, H, 2018. Barriers and challenges experienced by migrant African women entrepreneurs in North Queensland, Australia, Entrepreneurship and Sustainability Issues 5(4): 1054-1068. http://doi.org/10.9770/jesi.2018.5.4(25)
Search via ReFindit
Nordrum, Amy. August 18, 2016. Popular Internet of Things Forecast of 50 Billion Devices by 2020 is Outdated. IEEE Spectrum: Technology, Engineering, and Science News. https://spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated
Search via ReFindit
Paleri, P. (2008). National security: imperatives and challenges. Tata McGraw-Hill Pub. Co.
Search via ReFindit
Pike, A., Rodríguez-Pose, A., & Tomaney, J. (n.d.). Handbook of Local and Regional Development. Retrieved from http://www.regscience.hu:88/record/418/files/DEMO-BOOK-2017-055.pdf?version=1
Search via ReFindit
Prause, G., Tuisk, T., Olaniyi. 2019. Between Sustainability, Social Cohesion and Security. Regional Development in North-Eastern Estonia. Entrepreneurship and Sustainability Issues, 6(3), 1135-1154. http://doi.org/10.9770/jesi.2019.6.3(13)
Search via ReFindit
Rogalev, A., Komarov, I., Kindra, V., Zlyvk, O. 2018. Entrepreneurial assessment of sustainable development technologies for power energy sector. Enterpreneurship and Sustainability Issues, 6(1), 429-445. http://doi.org/10.9770/jesi.2018.6.1(26)
Search via ReFindit
Sebastiani, J., Sanchez, J., Manrod, M. 2019. Understanding New Security Threats, Routledge Published March 6, p. 254. Security and development | SIPRI. (n.d.). Retrieved January 3, 2019, from https://www.sipri.org/yearbook/2015/08
Search via ReFindit
Stewart, F. (n.d.). CRISE Working Paper Development and Security Development and Security. Retrieved from https://assets.publishing.service.gov.uk/media/57a08cd140f0b652dd00159c/wp3.pdf
Search via ReFindit
Tireuov, K., Mizanbekova, S., Kalykova, B., Nurmanbekova, G. 2018. Towards food security and sustainable development through enhancing efficiency of grain industry. Enterpreneurship and Sustainability Issues, 6(1), 446-455. http://doi.org/10.9770/jesi.2018.6.1(27)
Search via ReFindit
Tung, L. T. 2019. Role of Unemployment insurance in Sustainable development in Vietnam: Overview and policy implication, Entrepreneurship and Sustainability Issues, 6(3), 1039-1055. http://doi.org/10.9770/jesi.2019.6.3(6)
Search via ReFindit
Tvaronavičienė M. 2018. Towards internationally tuned approach towards critical infrastructure protection, Journal of Security and Sustainability Issues, 8(2), 143-150. https://doi.org/10.9770/jssi.2018.8.2(2)
Search via ReFindit
Vance, Ashlee. 2017 (2015). Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future. New York: Harper Collins.
Search via ReFindit
Vlasov, A.I., Shakhnov, V.A., Filin, S.S., Krivoshein, A.I. 2019. Sustainable energy systems in the digital economy: concept of smart machines, Entrepreneurship and Sustainability Issues, 6(4), 1975-1986. http://doi.org/10.9770/jesi.2019.6.4(30)
Search via ReFindit
Vulns Tagged Entries - (CGISecurity.com). (n.d.). Retrieved August 25, 2019, from https://www.cgisecurity.com/vulns/
Search via ReFindit
Zetter, K. 2014. An Unprecedented Look at Stuxnet, the World's First Digital Weapon. WIRED. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
Search via ReFindit