To see the other types of publications on this topic, follow the link: Human-Centric Security.

Journal articles on the topic 'Human-Centric Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Human-Centric Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tarai, Dr Sunita. "National security and migration: A human security centric analysis." International Journal of Applied Research 10, no. 4 (2024): 79–85. http://dx.doi.org/10.22271/allresearch.2024.v10.i4b.11655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saqib, Muhammad, Muhammad Imran Ashraf, and Noor Fatima. "Smart Power Engagement for Sustainable Human Security in South Asia." Global Strategic & Securities Studies Review IV, no. I (2019): 1–10. http://dx.doi.org/10.31703/gsssr.2019(iv-i).01.

Full text
Abstract:
Human Security is one of the complex challenges in South Asian region which has been continuously neglected by the policymakers due to the lack of state-centric comprehensive tendencies for the regional security paradigms. In this context, this research work attempts to encourage hostile South Asian nation-states to amend their hostile state-centric behaviors towards people-centric approaches for peace and security in the region. Although, the concept of human security is poorly concentrated in the region yet huge potential still exists which can successfully attract the masses for continuous
APA, Harvard, Vancouver, ISO, and other styles
3

Deibert, Ronald J. "Toward a Human-Centric Approach to Cybersecurity." Ethics & International Affairs 32, no. 4 (2018): 411–24. http://dx.doi.org/10.1017/s0892679418000618.

Full text
Abstract:
AbstractA “national security–centric” approach currently dominates cybersecurity policies and practices. Derived from a realist theory of world politics in which states compete with each other for survival and relative advantage, the principal cybersecurity threats are conceived as those affecting sovereign states, such as damage to critical infrastructure within their territorial jurisdictions. As part of a roundtable on “Competing Visions for Cyberspace,” this essay presents an alternative approach to cybersecurity that is derived from the tradition of “human security.” Rather than prioritiz
APA, Harvard, Vancouver, ISO, and other styles
4

Liaropoulos, Andrew N. "Reconceptualising Cyber Security." International Journal of Cyber Warfare and Terrorism 6, no. 2 (2016): 32–40. http://dx.doi.org/10.4018/ijcwt.2016040103.

Full text
Abstract:
The cyber security discourse is dominated by states and corporations that focus on the protection of critical information infrastructure and databases. The priority is the security of information systems and networks, rather than the protection of connected users. The dominance of war metaphors in the cyber security debates has produced a security dilemma, which is not sufficiently addressing the needs of people. This article underlines this shortcoming and views cyber security through a human-centric perspective. Freedom of expression and the right to privacy are under attack in the era of cy
APA, Harvard, Vancouver, ISO, and other styles
5

Guyo, Adi. "Violent Extremism in the Northern Frontier Counties of Kenya: Exploring Human Security as a Sustainable Countering Strategy." Strathmore Law Review 6, no. 1 (2021): 195–218. http://dx.doi.org/10.52907/slr.v6i1.167.

Full text
Abstract:
The contemporary rise of terrorism as a form of violent extremism has led the government to adopt a narrow state-centric security approach to mitigate these threats. Violent extremism compromises peace, security, and communal cohesion, and often thrives on human security deficits such as marginalisation and disenfranchisement from the decision-making processes. The prominence of a state-centric security approach has overshadowed the human security dimension of countering violent extremism, thereby compromising state-society relations. On the contrary, a human security approach which entails fr
APA, Harvard, Vancouver, ISO, and other styles
6

Triwardani, Reny. "Is Human Security That Matters? An Analysis Of The Three-Year Report Of Jokowi's Administration On Human Security (HS) Perspective." POPULIKA 12, no. 2 (2024): 193–216. http://dx.doi.org/10.37631/populika.v12i2.1463.

Full text
Abstract:
In the third year of Jokowi's government, the focus remains on the continued economic transformation and the Indonesia-centric paradigm initially set in the first year. This study analyzes the three-year performance report of the Jokowi-JK government using the human security approach. The methodology involves a thorough review of reports and news on implementing equitable development. The study findings indicate that the Jokowi government has significantly prioritized development with a human security approach. Keywords: Human security; Nawa Cita Agenda; Indonesia-centric; Regionalized Develop
APA, Harvard, Vancouver, ISO, and other styles
7

Baral, Bhimnath. "Security Challenges of Small States." Journal of Political Science 17 (February 6, 2017): 1–17. http://dx.doi.org/10.3126/jps.v17i0.20510.

Full text
Abstract:
The concept of Security has a vital role in the study of international relations. This concept is old as human civilization. It has different meaning in different phases of history. However, there have been sea changes in the interpretation of security matters. The traditional state-centric security has transferred into modern human centric approach. But the small states are always threatened by it in different forms and nature. As a precondition for sustainable political, economic and social development, small states are always tortured by several internal and external factors. So, this artic
APA, Harvard, Vancouver, ISO, and other styles
8

Dikito, Anesu Robin, and M. Shamim Kaiser. "The Relationship between Human-centric Cybersecurity and Cybercrime." Journal of Information Technology 11 (July 31, 2023): 58–66. http://dx.doi.org/10.59185/cd2a2q06.

Full text
Abstract:
The aim of this study is to propose a model of human-centric cybersecurity and its relationship tocurbing cybercrime in Zimbabwean commercial banks. The effects of human-centric cyber-crimes (e.g.email phishing, identity theft, hacking and malware) are increasing irrespective of the use of cyber securitytechniques (such as firewalls, antispyware and antivirus). In order to prevent security breaches, the role ofthe human element should always be emphasized. The study proposed a model of human-centric cybersecurity solutions in Zimbabwean commercial banks to counter identity theft. Item framewor
APA, Harvard, Vancouver, ISO, and other styles
9

Arora, Anshu Saxena, Luisa Saboia, Amit Arora, and John R. McIntyre. "Human-Centric Versus State-Driven." International Journal of Intelligent Information Technologies 21, no. 1 (2025): 1–13. https://doi.org/10.4018/ijiit.367471.

Full text
Abstract:
This research examines the contrasting artificial intelligence (AI) governance strategies of the European Union (EU) and China, focusing on the dichotomy between human-centric and state-driven policies. The EU's approach, exemplified by the EU AI Act, emphasizes transparency, fairness, and individual rights protection, enforcing strict regulations for high-risk AI applications to build public trust. Conversely, China's state-driven model prioritizes rapid AI deployment and national security, often at the expense of individual privacy, as seen through its flexible regulatory framework and subst
APA, Harvard, Vancouver, ISO, and other styles
10

Kioskli, Kitty, Eleni Seralidou, and Nineta Polemi. "A Practical Human-Centric Risk Management (HRM) Methodology." Electronics 14, no. 3 (2025): 486. https://doi.org/10.3390/electronics14030486.

Full text
Abstract:
Various standards (e.g., ISO 27000x, ISO 31000:2018) and methodologies (e.g., NIST SP 800-53, NIST SP 800-37, NIST SP 800-161, ETSI TS 102 165-1, NISTIR 8286) are available for risk assessment. However, these standards often overlook the human element. Studies have shown that adversary profiles (AP), which detail the maturity of attackers, significantly affect vulnerability assessments and risk calculations. Similarly, the maturity of the users interacting with the Information and Communication Technologies (ICT) system in adopting security practices impacts risk calculations. In this paper, w
APA, Harvard, Vancouver, ISO, and other styles
11

Chhetri, Mohan Baruwal, Xiao Liu, Marthie Grobler, Thuong Hoang, Karen Renaud, and Jennifer McIntosh. "Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021)." ACM SIGSOFT Software Engineering Notes 47, no. 2 (2022): 12–14. http://dx.doi.org/10.1145/3520273.3520278.

Full text
Abstract:
As the creators, designers, coders, testers, users, and occasional abusers of all software systems-including cyber security systems - humans should be at the centre of all design and development efforts. Despite this, most software engineering and cyber security research and practices tend to be function, data, or process oriented. In contrast, human-centric software engineering focuses on the human-centric issues critical to successful software systems' engineering. The aim of the International Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS) was to provide a
APA, Harvard, Vancouver, ISO, and other styles
12

Hossain, Kamrul. "Securing the Rights: A Human Security Perspective in the Context of Arctic Indigenous Peoples." Yearbook of Polar Law Online 5, no. 1 (2013): 493–522. http://dx.doi.org/10.1163/22116427-91000134.

Full text
Abstract:
Abstract In today’s world the state-centric approach of security has been extended to includea human-centric approach. Since individuals are the ultimate victims of any securitythreats, a state is not secure if insecure inhabitants reside within it. The insecurityof individuals arises from various sources of threats, such as from “fear” aswell as from “want”. While often the concept is confused with that of human rights,the concept of human security embraces policy choices in order for the better implementationof human rights. In a sense therefore, it complements both the conceptsof traditiona
APA, Harvard, Vancouver, ISO, and other styles
13

Na, Onechul, and Hangbae Chang. "Human-Centric Security Capability Enhancement in ICT Convergence Environment." Journal of Digital Contents Society 20, no. 2 (2019): 431–42. http://dx.doi.org/10.9728/dcs.2019.20.2.431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Goonetillake, M. D. J. S., Rangana Jayashanka, and S. V. Rathnayaka. "Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijisp.2022010103.

Full text
Abstract:
Assigning developers for highly secured software projects requires identifying developers’ tendency to contribute towards vulnerable software codes called developer-centric security vulnerability to mitigate issues on human resource management, financial and project timelines. There are problems in assessing the previous codebases in evaluating the developer-centric security vulnerability level of each developer. Thus, this paper suggests a method to evaluate this through the techno-behavioral features of their previous projects. Consequently, we present results of an exploratory study of the
APA, Harvard, Vancouver, ISO, and other styles
15

Klein, Joëlle, and Kamrul Hossain. "Conceptualising Human-centric Cyber Security in the Arctic in Light of Digitalisation and Climate Change." Arctic Review on Law and Politics 11 (2020): 1. http://dx.doi.org/10.23865/arctic.v11.1936.

Full text
Abstract:
The following article revisits existing scholarship on human-centric approaches to security in cyberspace and argues that a holistic understanding of cyber security in the Arctic must include discussion of the use of cyber technology in the everyday lives of individuals and communities, addressing both the ways such tools enable and undermine human security. Simultaneously, the article contextualises the Arctic as a region undergoing rapid change as a result of climate change and increased digitalisation and seeks to understand the consequent implications for human security. In light of these
APA, Harvard, Vancouver, ISO, and other styles
16

Djurdjevic-Lukic, Svetlana. "Broadening security concept: From "national" to "human security"." Medjunarodni problemi 56, no. 4 (2004): 397–408. http://dx.doi.org/10.2298/medjp0404397d.

Full text
Abstract:
In this paper the author explores advantages and disadvantages of expanding the definition of security from the traditional state-centric and military-oriented focus of security to the broader focus on human security. The author's opinion is that human security indicates important social-economic threats, but that the theory of the concept has not yet been coherently developed. Such a broad concept with so many equally valid dimensions of security lacks mechanisms for the establishment of causal relationship among them, and for prioritisation on policy level. There are no clear answers on key
APA, Harvard, Vancouver, ISO, and other styles
17

Agboola, Taofeek, Job Adegede, and John Jacob. "Balancing Usability and Security in Secure System Design: A Comprehensive Study on Principles, Implementation, and Impact on Usability." International Journal of Computing Sciences Research 8 (January 1, 2024): 2995–3009. https://doi.org/10.25147/ijcsr.2017.001.1.199.

Full text
Abstract:
Purpose-The purpose of this study is to provide a comprehensive analysis of the principles and implementation strategies of secure system design, emphasizing the critical balance between security and usability. This study aims to uncover how usability impacts the effectiveness of secure systems, exploring the human-centric approach to security. This research offers insights for organizations to develop systems that ensure robust security while providing a seamless, intuitive user experience. Method-This study employs an extensive review of existing literature on secure system design principles
APA, Harvard, Vancouver, ISO, and other styles
18

Lahiry, Sujit. "The Changing Narrative of Security Discourse: From State Security to Human Security in South Asia?" World Affairs 183, no. 2 (2020): 183–205. http://dx.doi.org/10.1177/0043820020921153.

Full text
Abstract:
Security discourse has radically changed over the years, especially since the Post–Cold War period. The traditional concept focuses on state security and national security, and is essentially based on realist and neo-realist paradigms. However, in 1994, the United Nations Human Development Report for the first time elaborated the notion of human security and the associated Human Development Index (HDI). Human security advocates a people-centric approach to security. The two foundational principles on which human security is based are “freedom from fear” and “freedom from want.” I evaluate the
APA, Harvard, Vancouver, ISO, and other styles
19

Kingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols." Computer Science & IT Research Journal 5, no. 8 (2024): 2083–106. http://dx.doi.org/10.51594/csitrj.v5i8.1493.

Full text
Abstract:
In the rapidly evolving cybersecurity landscape, proactive threat mitigation has become essential for protecting sensitive data and systems from increasingly sophisticated attacks. The paper explores a holistic approach to enhancing cybersecurity by merging data-driven insights with user-centric security practices. This study highlights the limitations of traditional reactive security measures and advocates for a shift towards a proactive strategy that anticipates and addresses potential threats before they materialize. The research emphasizes the importance of leveraging data analytics to gai
APA, Harvard, Vancouver, ISO, and other styles
20

Zojer, Gerald. "The Interconnectedness of Digitalisation and Human Security in the European High North: Cybersecurity Conceptualised through the Human Security Lens." Yearbook of Polar Law Online 10, no. 1 (2019): 297–320. http://dx.doi.org/10.1163/22116427_010010014.

Full text
Abstract:
Digitalisation has increased rapidly in recent decades, and became integral part of the development agenda of most states. The development of cyberspace has led to numerous opportunities for human development, but it also has presented certain challenges to societies. In acknowledging the importance of digital technologies, many states have endorsed strategies for digital development and cybersecurity. Because these strategies are often state-centric, techno-deterministic, and simplistic, they disregard the interconnectedness and complexity of the opportunities and challenges these technologie
APA, Harvard, Vancouver, ISO, and other styles
21

Ph. D, D. Litt, Prof Narottam Gaan,, Dr Sudhansubala Das, and Dr Banita Mahanandia. "Climate Change and Revisiting Security from Traditional State-Centric to Human Security and Beyond." Advances in Politics and Economics 5, no. 3 (2022): p59. http://dx.doi.org/10.22158/ape.v5n3p59.

Full text
Abstract:
Traditional security premised on state and its military apparatus has got itself emasculated in the face of continuing emergence of new kind of threats from the non-traditional and nonstate centric sources. Climate change and deepening environmental crisis along with other crises like demographic change, incidence of poverty, and rise of fatal and dangerous diseases have already thrown down the gauntlet to the realist paradigm of security built on state. Out of all these what stands out as the greatest threat to entire humankind is the climate change with all its devastating consequences like
APA, Harvard, Vancouver, ISO, and other styles
22

Pasupuleti, Murali Krishna. "Human-Centric Cybersecurity: Evaluating Phishing Susceptibility Using Behavioral Metrics." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 412–24. https://doi.org/10.62311/nesx/rphcrcscrcp4.

Full text
Abstract:
Abstract: This study explores the intersection of human behavior and cybersecurity by evaluating phishing susceptibility through behavioral metrics. Despite advancements in technical safeguards, human error remains a primary vector for cyber breaches, particularly in phishing attacks. By integrating behavioral science with empirical cybersecurity methods, this research introduces a predictive framework based on psychological and cognitive traits such as impulsivity, trust propensity, attention span, and prior exposure to security training. A structured phishing simulation involving 320 partici
APA, Harvard, Vancouver, ISO, and other styles
23

NEWMAN, EDWARD. "Critical human security studies." Review of International Studies 36, no. 1 (2010): 77–94. http://dx.doi.org/10.1017/s0260210509990519.

Full text
Abstract:
AbstractFrom a critical security studies perspective – and non-traditional security studies more broadly – is the concept of human security something which should be taken seriously? Does human security have anything significant to offer security studies? Both human security and critical security studies challenge the state-centric orthodoxy of conventional international security, based upon military defence of territory against ‘external’ threats. Both also challenge neorealist scholarship, and involve broadening and deepening the security agenda. Yet critical security studies have not engage
APA, Harvard, Vancouver, ISO, and other styles
24

Dr., Muhammad Shafi, and Muhammad Ali Dinakhel Dr. "National Security Policy of Pakistan (2022-2026): Introduction and Impact on Political Landscape of Pakistan." Al-Azhar 08, no. 02 (2022): 31–41. https://doi.org/10.5281/zenodo.7509757.

Full text
Abstract:
<strong>&nbsp;</strong><em>Pakistan announced its new national security policy, 2022-2026, on </em><em>January 14, 2022</em><em>. </em><em>The new policy is claimed to be citizen centric, focuses human and economic security. It is different from traditional concept of national security that rely on strengthening military and defense. The new policy, shifted the focus of the state on the human security, first time in history of Pakistan.&nbsp; This study focuses on the introduction of the new non-traditional concept of national security first time introduced in Pakistan and initiate debate on i
APA, Harvard, Vancouver, ISO, and other styles
25

Zachosova, Nataliia, Svitlana Bilous, and Yevheniy Lych. "PEOPLE-CENTRIC HR-MANAGEMENT: ENHANCING RECRUITMENT, MOTIVATION AND INTELLECTUAL-PERSONNEL SECURITY OF ENTERPRISES." Economics, Finance and Management Review, no. 2(22) (June 30, 2025): 109–19. https://doi.org/10.36690/2674-5208-2025-2-109-119.

Full text
Abstract:
The article is devoted to the study of human-centrism as a philosophy of the functioning of the HR management system, which ensures the effectiveness of personnel recruitment, their motivation and a high level of intellectual and personnel security of enterprises. It is proposed to understand intellectual and personnel security as the state of the human resource of an enterprise with a high level of intellectual capital, relevant skills and knowledge, capable of counteracting threats and risks arising from the actions or inaction of employees. The main threats to intellectual and personnel sec
APA, Harvard, Vancouver, ISO, and other styles
26

Shih, Hung-Pin, Kee-hung Lai, Xitong Guo, and T. C. E. Cheng. "Believe It or Not." Journal of Global Information Management 29, no. 6 (2021): 1–18. http://dx.doi.org/10.4018/jgim.294329.

Full text
Abstract:
Most theories of information security policy (ISP), except a few focused on the insider-centric view, are grounded in the control-centric perspective, and most ISP compliance models stem from Western countries. Regulatory focus theory (RFT) proposes two modes of motivational regulation, promotion and prevention focused that are supposed to motivate employee compliance in a trade-off. Culture is crucial to the study of ISP that puts control over human connections. Chinese guanxi, a specific dimension of Chinese culture, is better understood underlying the trust-distrust frame. To bridge the the
APA, Harvard, Vancouver, ISO, and other styles
27

Gopireddy, Ravindar Reddy. "Human-Centric Cybersecurity: Addressing the Human Element in Cyber Defense and Ethical Considerations in Cybersecurity." Journal of Artificial Intelligence & Cloud Computing 1, no. 4 (2022): 1–5. http://dx.doi.org/10.47363/jaicc/2022(1)e118.

Full text
Abstract:
The effect of human behaviour in cyber security effort is gigantic. In this paper I am going to delve into the subject of human-centric cybersecurity,under two aspects: primarily inspecting the role one plays within cyber defense and ethical issues in cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
28

Ali, Firkhan Ali Bin Hamid, and Mohd Zalisham Jali. "Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era." Journal of Physics: Conference Series 1018 (May 2018): 012012. http://dx.doi.org/10.1088/1742-6596/1018/1/012012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Choi, Seoung Won, and Julak Lee. "Exploring Perception of Human-Centric Security Concept through Big Data Analysis." Korean Journal of Industry Security 13, no. 3 (2023): 73–90. http://dx.doi.org/10.33388/kais.2023.13.3.073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Işik, Öykü, Yanya Viskovich, and Si Pavitt. "Common pitfalls when mitigating cyber risk : Addressing socio-behavioural factors." Cyber Security: A Peer-Reviewed Journal 8, no. 1 (2024): 6. http://dx.doi.org/10.69554/ueev5385.

Full text
Abstract:
Although humans constitute a pivotal dimension of the cyber security attack surface, prevailing approaches are often ineffective at addressing human risk. From the vantage point of three key socio-behavioural perspectives, a critical analysis of contemporary cyberattacks and cyber security practices offers insights and a range of opportunities to manage the human factor in cyber security. First, the role of metaphors in shaping cyber security discourse, particularly militaristic analogies, is analysed, supported by research advocating for careful metaphor selection to enhance comprehension, fo
APA, Harvard, Vancouver, ISO, and other styles
31

Jeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.

Full text
Abstract:
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wi
APA, Harvard, Vancouver, ISO, and other styles
32

Elliott, Lorraine. "Unsettling Human (In)Security: Challenging Neglect and Making the Unapparent Appear." Irish Studies in International Affairs 34, no. 1 (2023): 27–45. http://dx.doi.org/10.1353/isia.2023.a918354.

Full text
Abstract:
ABSTRACT: The concept of human security, introduced to the global public policy lexicon in 1994, did two things. First, it challenged conventional and dominant state-centric approaches to security to rethink security in universal people-centred terms. Second, in its focus on human life and dignity, it called for a profound transition in security thinking to make all people everywhere matter. This article argues that the development of human security within the UN system has not sufficiently met these objectives. Through an analysis of three key human security sectors—food security, health secu
APA, Harvard, Vancouver, ISO, and other styles
33

Buayairugsa, Jidapa. "SECURITIZATION AGAINST SEX TRAFFICKING OF WOMEN AND CHILDREN: THE CASE OF MULTILATERAL COOPERATION IN THE MEKONG SUB-REGION." EUrASEANs: journal on global socio-economic dynamics, no. 4(17) (August 8, 2019): 30–36. http://dx.doi.org/10.35678/2539-5645.4(17).2019.30-36.

Full text
Abstract:
This research examines the securitization process and the effectiveness of multilateral cooperation against sex trafficking of women and children in the Mekong sub-region. It has been inspired by an open question of why the situation with sex trafficking has not improved despite the availability of a significant number of multilateral anti-trafficking mechanisms. The research analyses and evaluates anti-trafficking mechanisms of the ASEAN and COMMIT up to the mid of 2018 in the light of securitization theory and human security concept. The research concludes that anti-trafficking mechanisms wi
APA, Harvard, Vancouver, ISO, and other styles
34

Hakimi, Musawer, Mohammad Mustafa Quchi, and Abdul Wajid Fazil. "Human factors in cybersecurity: an in depth analysis of user centric studies." Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID) 3, no. 01 (2024): 20–33. http://dx.doi.org/10.58471/esaprom.v3i01.3832.

Full text
Abstract:
This study delves into the intricate intersection of human behavior, cognition, and technology within the cybersecurity domain, aiming to enhance our understanding of the human-centric challenges influencing the effectiveness of cybersecurity measures. The primary objective is to unravel the nuanced landscape where human errors persist as a significant contributing factor to security breaches, emphasizing the need for a holistic comprehension of human factors. The study recognizes the evolving nature of work, with an increasing number of individuals operating from home, and the consequential c
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Hyun-Woo, Jun-Ho Kim, Jong Hyuk Park, and Young-Sik Jeong. "Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device." Scientific World Journal 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/796515.

Full text
Abstract:
Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are eq
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Yanghoon, and Hangbae Chang. "Human centric security policy and management design for small and medium business." Security and Communication Networks 7, no. 10 (2013): 1622–32. http://dx.doi.org/10.1002/sec.814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Makeri, Yakubu Ajiji. "The role of Cyber Security and Human-Technology Centric for Digital Transformation." International Journal of Scientific Research in Computer Science and Engineering 6, no. 6 (2018): 53–59. http://dx.doi.org/10.26438/ijsrcse/v6i6.5359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bramhe, Ulhas Vijay. "Strengthening - Security Component for Ladies." International Journal of Advance and Applied Research 4, no. 36 (2023): 130–32. https://doi.org/10.5281/zenodo.10336970.

Full text
Abstract:
<strong>Abstract</strong>Ladies strengthening is a worldwide issue and a significant idea generally utilized in multi-faceted cycle which empowers ladies to understand and practice their full personality and powers in all circles of life. Ladies structure almost 50% of the human resources in the nation, however they stay the most denied and long ignored portion of the general public, regardless of the sacred assurance for equivalent freedoms and honors for people. The underestimation of ladies in creating social orders can't be defeated without analyzing the foundations of minimization which i
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Arun Kumar. "Human Security in Nepali Perspective." Journal of APF Command and Staff College 2, no. 1 (2019): 60–66. http://dx.doi.org/10.3126/japfcsc.v2i1.26732.

Full text
Abstract:
The conventional security paradigm was challenged and changed, especially after the end of the Cold War. It becomes more specific towards the human security when the UNDP published the Human Development Report in 1994. Thus scope of Human Security specifically focuses on different area which is related to the freedom and dignity of an individual thus it is people centric concept. Due to the globalization after the end of the cold war, the underdeveloped countries like Nepal, got globalized impact on human security. The Human security even more compromised due to the internal armed conflict and
APA, Harvard, Vancouver, ISO, and other styles
40

Budhathoki, Ishwor. "Re-conceptualizing Nepal’s Security Policies: A Comprehensive Framework for Addressing Non-Traditional Security Threats." Shivapuri Journal 26, no. 1 (2025): 79–93. https://doi.org/10.3126/shivapuri.v26i1.75835.

Full text
Abstract:
Nepal’s security setting is changing due to the rise of non-traditional security threats (NTSTs), including climate change, cybersecurity risks, transnational crimes, public health crises, and environmental degradation. However, Nepal’s current security policies remain predominantly state-centric, focusing on traditional military and political concerns, while failing to adequately address the complexities of emerging non-traditional threats. This paper critically examines the policy gaps, institutional weaknesses, and legal shortcomings in Nepal’s security framework. The study explores how Nep
APA, Harvard, Vancouver, ISO, and other styles
41

Wibisono, Rizky Bangun. "Migration, Security, and Human Rights." Sunan Ampel Review of Political and Social Sciences 4, no. 1 (2024): 61–82. https://doi.org/10.15642/sarpass.2024.4.1.61-82.

Full text
Abstract:
This paper aims to examine the complex interplay between migration, human rights, and security, focusing on the recent trends in state responses to refugee protection and the implications for international human rights standards. A qualitative analysis of current literature, policy documents, and case studies was conducted to assess the evolving political dynamics surrounding migration. The study also evaluates the roles of international organizations, such as the United Nations High Commissioner for Refugees (UNHCR), and non-governmental organizations (NGOs) in shaping refugee protection norm
APA, Harvard, Vancouver, ISO, and other styles
42

Piwowarski, Juliusz, and Łukasz Trzciński. "Anthropological Aspects of Security Culture Analyses within the Context of Selected Elements of Threat and Security Typology." Security Dimensions 32, no. 32 (2019): 108–26. http://dx.doi.org/10.5604/01.3001.0014.1149.

Full text
Abstract:
Both security sciences and security studies have traditionally mainly focused on the state as the most important security subject; however, as anthropology of security and the idea of human security assert, it is the security of a human individual that should be highlighted as well. The authors start from discussing the typologies of threat and security. This leads them to focusing on the idea of human security, a concept first proposed by researchers and then taken up by international organizations. The concept of human security, combined with anthropology of security, constitutes a scientifi
APA, Harvard, Vancouver, ISO, and other styles
43

Archana, Todupunuri. "The Role of Human-Centric AI in Building Trust in Digital Banking Ecosystems." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 1 (2025): 1281–86. https://doi.org/10.5281/zenodo.14769362.

Full text
Abstract:
The Digital Banking Ecosystem's need for a human-centric variant rises as the key strategy to restore the lost confidence and implement proper methods, including ethical, explainable, and transparent ones. Thus, based on steps addressing the key challenges raised by the development of artificial intelligence systems, this paper aims to demonstrate how human centered artificial intelligence can improve the user experience, security, and transparency of the digital banking sector. As the method used is structurally systematic and the contexts under consideration include global and US ones, the r
APA, Harvard, Vancouver, ISO, and other styles
44

Adhikari, Naresh Bhakta. "Human Security in South Asia: Lesson for Nepal." BMC Research Journal 4, no. 1 (2025): 100–111. https://doi.org/10.3126/bmcrj.v4i1.80086.

Full text
Abstract:
The concept of human security has evolved beyond traditional state-centric approaches to encompass the protection of individuals from a range of threats, including economic instability, environmental degradation, and political insecurity. South Asia, characterized by significant human security challenges such as poverty, armed insurgencies, environmental vulnerabilities, and governance deficits, presents a critical case for examining the complexities of human security. This study employs a qualitative research methodology, utilizing secondary data sources, to explore the status, challenges, an
APA, Harvard, Vancouver, ISO, and other styles
45

Indraswari, Firstyarinda. "Rethinking Border Management: A Human Security Approach to Combating Human Trafficking in the Mekong Subregion." JAS (Journal of ASEAN Studies) 12, no. 2 (2025): 353–82. https://doi.org/10.21512/jas.v12i2.11591.

Full text
Abstract:
The research examined the relationship between border regulations, human trafficking, and human security in the Mekong subregion. The research applied a qualitative case study methodology to analyze border management policies from 1993 to 2023, employing the first and second-generation human security concepts as a theoretical framework. By focusing on specific regulations and agreements within the Mekong Subregion, the research assessed their ability to address transnational threats such as human trafficking. The findings reveal that while political and economic dimensions dominate, critical a
APA, Harvard, Vancouver, ISO, and other styles
46

Kim, Yuhyun, Heejin Ahn, Taeseop Kim, Byungtae Ahn, and Dong-Geol Choi. "Human-Centric Depth Estimation: A Hybrid Approach with Minimal Data." Electronics 14, no. 11 (2025): 2283. https://doi.org/10.3390/electronics14112283.

Full text
Abstract:
This study presents a novel system for accurate camera-to-person distance estimation in CCTV environments. To address the limitations of existing approaches—which often require extensive training data and lack object-level precision—we propose a hybrid framework that integrates SAM’s zero-shot segmentation with monocular depth estimation. Our method isolates human subjects from complex backgrounds and incorporates Kernel Density Estimation (KDE), log-space learning, and linear residual blocks to improve prediction accuracy. This approach is designed to resolve the non-linear mapping between vi
APA, Harvard, Vancouver, ISO, and other styles
47

UNTALAN, Carmina Yu. "Okinawa Beyond the Hub-and-spoke Alliance System: A Reappraisal." East Asian Policy 12, no. 04 (2020): 19–33. http://dx.doi.org/10.1142/s1793930520000288.

Full text
Abstract:
Okinawa is a cornerstone of the US–Japan alliance. However, it has been marginalised in East Asian international relations whereby a state-centric view of international relations predominates. In an era of power transitions and increasing importance of non-traditional security concerns, Washington and Tokyo need to recognise Okinawa’s contribution as a non-state actor in upholding human security values for the alliance to stay attuned to shifting regional and global needs.
APA, Harvard, Vancouver, ISO, and other styles
48

Sudheer Kotilingala. "The non-human identity crisis: Managing machine identities in the modern enterprise." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 944–54. https://doi.org/10.30574/wjarr.2025.26.1.1118.

Full text
Abstract:
The rapid integration of artificial intelligence, robotic process automation, IoT devices, and service accounts into enterprise infrastructures has created what security professionals term a "Non-Human Identity Crisis." As machine identities proliferate across technology stacks, traditional security models designed for human authentication prove inadequate for addressing the unique challenges of machine-to-machine communications. This document examines the fundamental security challenges posed by the ephemeral nature of machine identities in cloud-native environments, lifecycle management gaps
APA, Harvard, Vancouver, ISO, and other styles
49

Spitka, Timea. "The Myth of Protection: Gendering Protection under the Responsibility to Protect in Gaza." Global Responsibility to Protect 11, no. 1 (2019): 77–103. http://dx.doi.org/10.1163/1875984x-01101005.

Full text
Abstract:
Although international norms on the Responsibility to Protect ( R2P ), norms stemming from United Nations Security Council Resolution 1325 and the agenda of Women, Peace and Security (wps) have shifted the narrative from a state-centric to a human-centric approach to security, they have failed to intersect in the most difficult contexts. This paper examines the intersections between Pillar iii of R2P, Resolution 1325 and the agenda of wps with a focus on protection in Gaza. Within the Gaza context, all authorities can be seen as failing in their responsibility to protect, however, no steps hav
APA, Harvard, Vancouver, ISO, and other styles
50

KONYSHEV, Valery N., and Maria L. LAGUTINA. "Human Security in Arctic: Threats through the Prism of the “Northern Mentality”." Arctic and North, no. 45 (December 22, 2021): 85–112. http://dx.doi.org/10.37482/issn2221-2698.2021.45.85.

Full text
Abstract:
The article is devoted to the analysis of threats to human security in the Russian Arctic, taking into account the peculiarities of the “northern mentality”. The authors note that the concept of “human security” is relatively new for the Arctic zone of the Russian Federation (AZRF), as until recently security in the northern regions of Russia was defined mainly from the state-centric positions. The universalist approach is hardly applicable in practical policy: it is impossible to build a policy of “human security in general” and transfer it to the conditions of the Arctic zone of the Russian
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!