The Genesis of Security
##plugins.themes.academic_pro.article.main##
Abstract
In the 21st century, the concept of "security" predominantly revolves around global considerations. Mass media frequently discuss global threats to the planet, states, and societies, with individual security often taking a backseat. However, individuals are an integral part of society, and while living within the confines of a particular state, they possess the right to personal security encompassing their businesses, families, and homes. Contemporary notions of personal security are often constrained to the legal definitions of criminal offenses outlined in the state's penal code. But is this perspective sufficient? Can the state genuinely assure the safety of each individual? Is it equipped to guarantee security within the intricate fabric of today's global order, while respecting the tenets of personal freedom and limited intrusion into human life? This article offers a pragmatic exploration by the authors to address these inquiries.
DOI:
https://doi.org/10.61439/VEXY8177
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Baudrillard, J. (2016). The Spirit of Terrorism (A. Kachalov, Trans.). RIPOL klassik.
Boustras, G., & Waring, A. (2020). Towards a reconceptualization of safety and security, their interactions, and policy requirements in a 21st century context. Safety Science, 132, 104942. https://doi.org/10.1016/j.ssci.2020.104942
Bouchard, J. (2018). Profile of the perpetrator of the Nice terror attack that took place on 14th July 2016: A terrorist whose modus operandi may have been imitated in other European attacks. Annales Médico-psychologiques, Revue Psychiatrique, 176(6), 607–612. https://doi.org/10.1016/j.amp.2018.04.002
Derevitsky, A. (2008). Kommercheskaya razvedka [Commercial intelligence]. Piter.
DeTardo-Bora, K. A., & Bora, D. J. (2016). Cybercrimes: an overview of contemporary challenges and impending threats. In Digital Forensics (pp. 119–132). https://doi.org/10.1016/b978-0-12-804526-8.00008-3
Doronin, A. (2009). Biznes-razvedka [Business Intelligence]. Os-89.
Estrada, M. R., & Koutronas, E. (2016). Terrorist attack assessment: Paris November 2015 and Brussels March 2016. Journal of Policy Modeling, 38(3), 553–571. https://doi.org/10.1016/j.jpolmod.2016.04.001
Fielding, J. (2019). Back to basics: tackling security threats in an increasingly complex world. Computer Fraud & Security. https://doi.org/10.1016/s1361-3723(19)30072-7
Harris, L. C., & Ogbonna, E. O. (2012). Motives for service sabotage: an empirical study of front-line workers. Service Industries Journal, 32(13), 2027–2046. https://doi.org/10.1080/02642069.2011.582496
He, A., Xu, S., & Fu, G. (2012). Study on the basic problems of safety culture. Procedia Engineering, 43, 245–249. https://doi.org/10.1016/j.proeng.2012.08.042
Hudson, N. W., & Fraley, R. C. (2018). Moving toward greater security: The effects of repeatedly priming attachment security and anxiety. Journal of Research in Personality, 74, 147–157. https://doi.org/10.1016/j.jrp.2018.04.002
Law of the Russian Federation No. 2446-1 On Security. (1992). http://pravo.gov.ru/proxy/ips/?docbody=&nd=102015025
Law of Ukraine No. 2469-VIII On the National Security of Ukraine. (2018, June 21). https://zakon.rada.gov.ua/laws/show/2469-19#Text
Maltsev, O. V. (2018). Mina zamedlennogo dejstviya: Amalgamnyj metod issledovaniya [The Time Bomb: Amalgam Study Method]. Serednyak T.K. https://books.google.com.ua/books?vid=ISBN6177696597
Maltsev, O. V. (2020, March 21). Where is the World Going? The concept of security in the face of the threats of the 21st century. The Granite of Science. https://un-sci.com/ru/2020/03/21/k-chemu-idet-mir-konczepcziya-bezopasnosti-v-usloviyah-ugroz-xxi-veka/
McBride, D. (2017). Daily digital technology use linked to mental health symptoms for high-risk adolescents. Journal of Pediatric Nursing. https://doi.org/10.1016/j.pedn.2017.06.003
Nordfjærn, T., & Rundmo, T. (2018). Transport risk evaluations associated with past exposure to adverse security events in public transport. Transportation Research Part F: Traffic Psychology and Behaviour, 53, 14–23. https://doi.org/10.1016/j.trf.2017.12.014
Nunes-Vaz, R., & Lord, S. (2014). Designing physical security for complex infrastructures. International Journal of Critical Infrastructure Protection, 7(3), 178–192. https://doi.org/10.1016/j.ijcip.2014.06.003
Scholz, R., Czichos, R., Parycek, P., & Lampoltshammer, T. J. (2020). Organizational vulnerability of digital threats: A first validation of an assessment method. European Journal of Operational Research, 282(2), 627–643. https://doi.org/10.1016/j.ejor.2019.09.020
Wojewidka, J. (2020). The deepfake threat to face biometrics. Biometric Technology Today, 2020(2), 5–7. https://doi.org/10.1016/s0969-4765(20)30023-0