AbstractIt is time to broaden our thinking on the concept of homeland security and recognize the degree to which environmental security, and in particular climate change, affects US homeland security equities. Understanding how environmental security became a national security issue may be beneficial as the homeland security community seeks to understand the emerging issue of climate change and strategic documents linking climate change and homeland security.
In: Canada watch: practical and authoritative analysis of key national issues ; a publication of the York University Centre for Public Law and Public Policy and the Robarts Centre for Canadian Studies of York University
Received: February 13th, 2021 ; Accepted: June 11th, 2021 ; Published: July 8th, 2021 ; Correspondence: veronika.urievna@mail.ru ; Ensuring food security is a strategic goal of any state, especially in the face of population growth. A review of the academic literature showed the presence of problems in ensuring a high level of food security in China: the rigidity of demand for food, limited land resources, structural contradictions between supply and demand. This study proposes an approach to assessing the level of food security, based on the calculation of an integral index consisting of four units of indicators: the sub-index of provision of crop products, the sub-index of productivity, the sub-index of provision of livestock products, and the sub-index of food import dependence. The results show that, in general, the level of food security in China has increased over the period under review, but there are problems in self-sufficiency in crop and dairy products, as well as in an increase in food import dependence. A forecast of the dynamics of the integral index of the food security level and its sub-indices was constructed, which showed that a decrease in the integral index might occur due to a decrease in self-sufficiency in livestock products and import dependence, while the availability of crop products and yields will increase. The study showed that the measures taken by the Chinese government led to some positive changes, but it is necessary to take a comprehensive approach to this problem, to solve which it is necessary to use the potential of all sectors of the food industry.
Practitioners, researchers and policy-makers involved with cyber security often talk about "security hygiene:" ways to encourage users of computer technology to use safe and secure behavior online. But how do we persuade workers to follow simple, fundamental processes to protect themselves and others? These issues are raised by behavioral scientists, to encourage worker, passenger and patient compliance. In this paper, we explore and summarize findings in social psychology about moral values and habit formation, and then integrate them into suggestions for transforming staff security behavior online.
"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments" provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations.