Complex security systems are designed to elevate physical security. Besides people’s first-hand experience of being secured, there is a secondary sensation of anxiety while being watched which should be given a particular emphasis. In this paper, first the Security & Happiness by Design Framework is proposed which is based on research findings in psychology. After a brief literature review on scholarly works addressing the intersection between security and psychology. The concept presented by HIBLISS, the Happiness Initiated Behaviour Led Intelligence Security System, underscores the integration of user well-being, behavioral analysis, and advanced technology within security frameworks. Specifically, the case study of the Jewel Airport in Singapore is cited to enhance the concept’s applicability, detailing its advantages and its role in a holistic risk assessment methodology.
A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.
Using a qualitative research methodology and explanatory approach to collect data, we assessed whether the Beijing Consensus diplomacy in Africa is a promoter or threat to Africa’s pathway to sustainable development. The collected data were analysed using document and content analysis techniques. Analysis of the data revealed that the Beijing Consensus diplomacy in Africa is a positive initiative that has created a win-win situation, promoting sustainable development. The Beijing Consensus is opposed to the Washington Consensus, which influenced a win-lose situation that has deepened poverty, making Africa unable to move towards achieving sustainable development. The study found that China’s resource-for-development approach has similarities with pre-colonial Africa’s barter trade approach, which Africans practised in the entire continent. The analysis showed that applying the Beijing Consensus diplomacy to Africa has led to economic growth and development. The results showed that China’s Belt Road Initiative has transformed Africa, changing the continent from poverty to economic productivity, as road infrastructure is associated with economic growth and development. Moreover, it was evident from the analysis that without an African continental foreign policy rooted in continental sovereignty with transparent terms and conditions, Africa’s current benefits from China’s investments would lead to poverty instead of sustainable development. A continental foreign policy would create an African Consensus, which would act on behalf of the entire continent. This African Consensus diplomacy would thus become a continental foreign policy defining Africa globally. However, as it stands, the Beijing Consensus diplomacy is a promoter of sustainable development, but this promotion would not last long without African Consensus diplomacy. The study recommends that Africa should establish a continental foreign policy with African Consensus diplomacy to enable the continent to have one standard foreign policy and goal when trading with China and any other external world.
The purpose of this paper is to suggest some ways and mechanisms for creating long-term peace based on sustainable development of the world and the purpose of the work is to develop recommendations aimed at counteracting the emergence of dictatorial regimes that were legitimately established. Five common features of such dictators have been identified, namely: coming to power in a legitimate way, using manipulative technologies, openly declaring their aggressive intentions, gradually implementing their aggressive intentions, creating a military potential with the active participation of developed countries, including those with established democracies. The reasons for the creation of dictatorial regimes are substantiated, namely: the imperfection of electoral legislation, excessive conservatism of legislation, insufficient determination and timeliness of countering the strengthening of dictatorships, “national egoism”, the unscrupulousness of dictators in their foreign and domestic policies. It was determined that in order to actively oppose dictatorial regimes, it is necessary to: improve the system of elections to the highest positions and to the legislative bodies of the state, put a strong barrier against manipulative technologies and fakes, through the improvement and effective application of international legislation with the involvement of artificial intelligence, determine the strategy of relations with dictators in all directions in advance: economic, diplomatic, sports, scientific and technical, etc., establish the scope of relations in direct proportion to the index of democracy in a country with an authoritarian regime and, in order to prevent negative consequences on the economy and social condition of the society of one’s country, determine and carefully regulate import and export activities. It is proposed to start an indicator of the effectiveness of the head of state and an internal truth index of the head of state, as well as measures for moral stimulation of heads of state. As a result of the study, two root causes of threats to the existence of humanity were additionally identified, which directly affect the formation of dictatorial regimes. 1) The emergence on the basis of modern information technologies of a powerful system of manipulative technologies, the use of which leads to the power of future dictators. 2) Belated opposition of the democratic world to the formation of dictatorships. This is expressed in condescension to the initial illegal actions of future dictators, uncontrolled cooperation in the economic, political and humanitarian spheres. Two key mechanisms for achieving sustainable development and long-term peace are proposed.
The usage of cybersecurity is growing steadily because it is beneficial to us. When people use cybersecurity, they can easily protect their valuable data. Today, everyone is connected through the internet. It’s much easier for a thief to connect important data through cyber-attacks. Everyone needs cybersecurity to protect their precious personal data and sustainable infrastructure development in data science. However, systems protecting our data using the existing cybersecurity systems is difficult. There are different types of cybersecurity threats. It can be phishing, malware, ransomware, and so on. To prevent these attacks, people need advanced cybersecurity systems. Many software helps to prevent cyber-attacks. However, these are not able to early detect suspicious internet threat exchanges. This research used machine learning models in cybersecurity to enhance threat detection. Reducing cyberattacks internet and enhancing data protection; this system makes it possible to browse anywhere through the internet securely. The Kaggle dataset was collected to build technology to detect untrustworthy online threat exchanges early. To obtain better results and accuracy, a few pre-processing approaches were applied. Feature engineering is applied to the dataset to improve the quality of data. Ultimately, the random forest, gradient boosting, XGBoost, and Light GBM were used to achieve our goal. Random forest obtained 96% accuracy, which is the best and helpful to get a good outcome for the social development in the cybersecurity system.
Copyright © by EnPress Publisher. All rights reserved.