Introduction The study of international relations rests on the premise that there is always a sensible way of explaining a nation’s grand strategy, for they would not survive otherwise. From the Classical Period to the Middle Ages, from the Renaissance to the twenty-first century, historians, statesman, and political theorists have attempted to provide reason and understanding behind the decisions made by nation-states. More often than not, whether through realism or liberalism, through social constructivism
Introduction Cyberterrorism is a critical threat and is the most definitive characteristic of the U.S. contemporary security environment. For years, the American people have been victimized by cyber-attacks by having their personal information, emails, credit card, and banking information stolen by an invisible enemy named cyberterrorism. These types of attacks seem insignificant however; they are small examples of the vulnerabilities that our cyber world is experiencing. Our vulnerabilities
Crime-Maritime Piracy, Smuggling and Human Trafficking: Organised crime groups will utilise the Indian Ocean space to conduct their illicit operations (Hastings, 2012). Major crimes include piracy, smuggling and human trafficking. Piracy is a major security challenge in the IOR as it threatens peace and regional stability, trade and commerce as well as international energy movement (Herbert-Burns, 2012). It has encountered a lot of attention within the media as a successful means of financial gain through
factors such as S&P index and the security prices
Third, the corporate governance structure and shareholder protection of domestic financial institutions may be improved (Rossi & Volpin, 2004). Although China has initiated market deregulation, foreign financial institutions are still facing intensive monitoring from Chinese authorities. Compared to the UK, the US and other developed countries, the degree of openness of Chinese financial market is still
While World War II ended all worries and hardships Americans faced, events gradually initiated signs of the Cold War which created an increased state of tension that swept all of America and Korea. During the 1940s, the potential Communist invasion of nations worldwide began to create a frightening reality to the people of the United States. The Soviet Union’s exportation of Communism greatly worried America as they wanted to contain Communism from all nations, especially nations in Asia. The Korean
classifies China as a ‘transitional developed country.’ More specifically, China is defined as one of the five BRICS countries. These countries consist of; Brazil, Russia, India, China, and South Africa. The BRICS countries do not share a global region, political systems, or economic systems. The textbook argues that the three main goals of these countries are prosperity, stability, and security. In a 2015 article, published in the Journal of Democracy, written by Carl Minzner, entitled China After the
and 2010 when the worm referred to as Stuxnet was used. This worm was primarily directed at Iran in their nuclear facilities and was mainly for disruption of their processing mechanism in their enriched uranium deposits industry. Piggin, R. in his journal The Reality of Cyber Terrorism 2010, stated that the whole idea behind the Stuxnet worm was in reprogramming the systems in a way that would result in the plant sabotage and somehow hide the changes that would be made from the users and programmers
internet? This is a controversy currently being discussed in China. The censorship of the internet in China is also referred to as the Great Firewall. There are 1.4 billion people in China and 751 million citizens use the internet; that is equivalent to the total population of Europe. More than half of the Chinese population uses an internet that is controlled and censored by the government (Feng and Winjing). The Great Firewall in China ensures online safety for children, reduces illegal activity
the media, controlling the use of propaganda, only telling citizens what they want and not the whole truth. Control tactics in 1984 include monitoring citizens through surveillance, like the telescreens in people’s homes. An example is similar to China monitoring its citizens through social media. These tactics are mostly used to track down terrorists or drug lords. “Once combined and fully operational, the tools can help police grab the identities of people as they walk down the street, find out