Skip to main content
Book cover

e-Citizens pp 43–108Cite as

Safety and Security

  • Chapter
  • First Online:

Abstract

Why approach the e-Citizenship universe dealing with safety and security? Because security and more specifically cyber security has been the enabler for all the rest of the applications and services and as we will see in this chapter still is a key aspect. The demand for “safety and security” in all its forms has increased, especially quantitatively and qualitatively, making clear the need for new approaches to enable the entire sector to ensure the best results taking care of all these aspects, up to integrated multidisciplinary approaches activated in the case of complex problems.

The role of ICTs in Safety and Security. Human Factors and the concept of “Feeling Safe”. Slow onset disasters and cyber technology including IoT, CCTV and Drones. Ethical and Moral Aspects in UAV and artificial intelligence, machine learning and more. Cyber-security, “Mother” of ICTs & Security, Biometrics, Cyber Warriors, Hackers and Cybercriminals, information and data stream management, risk assessment approach, cyber-ranges and the Twenty-First Century Cyber Warfare.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ronchi AM, WSIS Forum 2015, High Policy Statements. https://www.itu.int/net4/wsis/forum/2015/Content/doc/outcomes/Policy_Statements_Booklet_WSIS2015.pdf

  2. Ronchi AM, Duggal P et al, WSIS Forum 2016 Outcomes. https://www.itu.int/net4/wsis/forum/2016/Outcomes/

  3. Grillo (Cricket) – Grillo’s alerts will tell you when the earthquake will arrive and how strong it will feel where you are. http://grillo.io

  4. Virgo – Safety device for the protection of operators working in risky environment. http://www.intellitronika.com/virgo/

  5. Critical Link is building a network of volunteer emergency First Responders, who are dispatched through SMS and Mobile alert to save lives when people are injured in Dhaka. https://play.google.com/store/apps/details?id=com.ionicframework.critical ink453552

  6. Clever care framework for remote management, guidance and custom care. http://www.clevercare.com.br

  7. Universal Doctor, We make communication easier when you need it most. http://www.universaldoctor.com

  8. PharmaSecure, identifies fake or expired drugs. http://www.pharmasecure.com

  9. ỌMỌMI is designed with the child in mind. It is the first app worldwide that covers all of the WHO childhood survival strategies. http://www.omomiapp.com/main

  10. Water Source provides a map of drinkable water sources. http://find.watersupply.at

  11. Peer Water Exchange, India (2010) www.peerwater.org

  12. Food Security Cluster, coordinates the food security response. http://foodsecuritycluster.net

  13. Food Security Portal – the Food Security Portal, facilitated by IFPRI, aims to provide improved food security for the world’s poor and increased resilience of global food systems against food and financial crises. It pools information in structured ways. http://www.foodsecurityportal.org

  14. Thiesmeier L, Capture and readiness of slow-onset disaster information in Southeast Asia. https://www.itu.int/net4/wsis/forum/2016/Content/AgendaFiles/ document/7ea0c767-3a4b-40fe-8a30abd09b80c666/5_THIESMEYER_WORKSHOP_172.pdf

  15. SAS report on The Internet of Things. http://www.sas.com/it_it/offers/ebook/iot-visualise-the-impact/index.html

  16. Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society, http://workspace.unpan.org/sites/Internet/Documents/UNPAN96078.pdf

  17. Rubin J (2008) Vigenere Cipher. Retrieved May 4, 2009, from http://www.juliantrubin.com/encyclopedia/mathematics/vigenere_cipher.html

  18. Cohen F (1990) A short history of cryptography. Retrieved May 4, 2009, from http://www.all.net/books/ip/Chap2-1.html, New World Encyclopedia (2007)

  19. Pawlan M (1998, February) Cryptography: the ancient art of secret messages. Retrieved May 4, 2009, from http://www.pawlan.com/Monica/crypto/

  20. Kahn D (1997) The Codebreakers: the story of secret writing. Scribner, New York. ISBN:978-1-439-10355-5

    Google Scholar 

  21. Damico Tony M (2009) A brief history of cryptography. Inq J 1(11): 1/1, 2015 Student Pulse. All rights reserved. ISSN: 2153-5760

    Google Scholar 

  22. Thawte (2013) History of cryptography, an easy to understand history of cryptography. Thawte

    Google Scholar 

  23. Taylor K (2002, July 31) Number theory 1. Retrieved May 4, 2009, from http://math.usask.ca/encryption/lessons/lesson00/ page1.html

  24. Data Encryption Standard (1999) Federal Information Processing. Standards Publication 46-3

    Google Scholar 

  25. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  26. Fyffe S, Abate T (2016) Stanford cryptography pioneers Whitfield Diffie and Martin Hellman win ACM 2015 A.M. Turing Award, Stanford News Service, Stanford University, Stanford, CA

    Google Scholar 

  27. Milanov E (2009) The RSA algorithm, accelerated (honors) advanced calculus. University of Washington, Seattle

    Google Scholar 

  28. Zhao W (1999) Robust image based 3D face recognition. PhD Dissertation, University of Maryland

    Google Scholar 

  29. Babel C (2015) Tackling privacy concerns is key to expanding the internet of things, Wired Innovation Insights, Feb 2015

    Google Scholar 

  30. iPolice (2013) The iPolice app helps locate the nearest police station with address and contact details. www.ipolice.com

Encryption and User Identity

  1. Cryptography. Retrieved May 4, 2009, from http://www.newworldencyclopedia.org/entry/Cryptography

  2. European Parliament STOA (2000) Prison Technologies: an appraisal of technologies of political control – Final Study, European Parliament Directorate General for Research Directorate A, The STOA Programme, Luxembourg, July 2000, PE 289.666/Fin.St./EN

    Google Scholar 

  3. United Nations Manual on the prevention and control of computer-related crime, UN 2001

    Google Scholar 

  4. Whitman M, Mattord H (2005) Principles of information security. [University of Phoenix Custom Edition e-text]. Canada, Thomson Learning, Inc. Retrieved May 4, 2009, from University of Phoenix, rEsource, CMGT/432

    Google Scholar 

Cyber Laws, Cyber Crimes, Cyber Security

  1. Duggal P (2018) Cyber Law 3.0, LexisNexis, Gurgaon, India, ISBN 978-81-3125-366-3

    Google Scholar 

  2. European Commission (2017) Resilience, Deterrence and Defence: building strong cybersecurity for the EU, JOIN (2017) 450 final

    Google Scholar 

  3. High Representative of the European Union for Foreign Affairs and Security Policy (2013) Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN (2013) 1 final

    Google Scholar 

  4. NATO Cooperative Cyber Defence Centre of Excellence (2017) Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press

    Google Scholar 

  5. Ompall, Pandey T, Alam B (2017) How to report cyber crimes in Indian territory. Int J Sci Technol Manag 6(04), April 2017, ISSN 2394-1537

    Google Scholar 

  6. United Nations General Assembly Resolution Fifty-first, Agenda item 148 session A/RES/51/162, Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law (UNCITRAL), 30 January 1997

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ronchi, A.M. (2019). Safety and Security. In: e-Citizens. Springer, Cham. https://doi.org/10.1007/978-3-030-00746-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00746-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00745-4

  • Online ISBN: 978-3-030-00746-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics