Abstract
Why approach the e-Citizenship universe dealing with safety and security? Because security and more specifically cyber security has been the enabler for all the rest of the applications and services and as we will see in this chapter still is a key aspect. The demand for “safety and security” in all its forms has increased, especially quantitatively and qualitatively, making clear the need for new approaches to enable the entire sector to ensure the best results taking care of all these aspects, up to integrated multidisciplinary approaches activated in the case of complex problems.
The role of ICTs in Safety and Security. Human Factors and the concept of “Feeling Safe”. Slow onset disasters and cyber technology including IoT, CCTV and Drones. Ethical and Moral Aspects in UAV and artificial intelligence, machine learning and more. Cyber-security, “Mother” of ICTs & Security, Biometrics, Cyber Warriors, Hackers and Cybercriminals, information and data stream management, risk assessment approach, cyber-ranges and the Twenty-First Century Cyber Warfare.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ronchi AM, WSIS Forum 2015, High Policy Statements. https://www.itu.int/net4/wsis/forum/2015/Content/doc/outcomes/Policy_Statements_Booklet_WSIS2015.pdf
Ronchi AM, Duggal P et al, WSIS Forum 2016 Outcomes. https://www.itu.int/net4/wsis/forum/2016/Outcomes/
Grillo (Cricket) – Grillo’s alerts will tell you when the earthquake will arrive and how strong it will feel where you are. http://grillo.io
Virgo – Safety device for the protection of operators working in risky environment. http://www.intellitronika.com/virgo/
Critical Link is building a network of volunteer emergency First Responders, who are dispatched through SMS and Mobile alert to save lives when people are injured in Dhaka. https://play.google.com/store/apps/details?id=com.ionicframework.critical ink453552
Clever care framework for remote management, guidance and custom care. http://www.clevercare.com.br
Universal Doctor, We make communication easier when you need it most. http://www.universaldoctor.com
PharmaSecure, identifies fake or expired drugs. http://www.pharmasecure.com
ỌMỌMI is designed with the child in mind. It is the first app worldwide that covers all of the WHO childhood survival strategies. http://www.omomiapp.com/main
Water Source provides a map of drinkable water sources. http://find.watersupply.at
Peer Water Exchange, India (2010) www.peerwater.org
Food Security Cluster, coordinates the food security response. http://foodsecuritycluster.net
Food Security Portal – the Food Security Portal, facilitated by IFPRI, aims to provide improved food security for the world’s poor and increased resilience of global food systems against food and financial crises. It pools information in structured ways. http://www.foodsecurityportal.org
Thiesmeier L, Capture and readiness of slow-onset disaster information in Southeast Asia. https://www.itu.int/net4/wsis/forum/2016/Content/AgendaFiles/ document/7ea0c767-3a4b-40fe-8a30abd09b80c666/5_THIESMEYER_WORKSHOP_172.pdf
SAS report on The Internet of Things. http://www.sas.com/it_it/offers/ebook/iot-visualise-the-impact/index.html
Outcome document of the high-level meeting of the General Assembly on the overall review of the implementation of the outcomes of the World Summit on the Information Society, http://workspace.unpan.org/sites/Internet/Documents/UNPAN96078.pdf
Rubin J (2008) Vigenere Cipher. Retrieved May 4, 2009, from http://www.juliantrubin.com/encyclopedia/mathematics/vigenere_cipher.html
Cohen F (1990) A short history of cryptography. Retrieved May 4, 2009, from http://www.all.net/books/ip/Chap2-1.html, New World Encyclopedia (2007)
Pawlan M (1998, February) Cryptography: the ancient art of secret messages. Retrieved May 4, 2009, from http://www.pawlan.com/Monica/crypto/
Kahn D (1997) The Codebreakers: the story of secret writing. Scribner, New York. ISBN:978-1-439-10355-5
Damico Tony M (2009) A brief history of cryptography. Inq J 1(11): 1/1, 2015 Student Pulse. All rights reserved. ISSN: 2153-5760
Thawte (2013) History of cryptography, an easy to understand history of cryptography. Thawte
Taylor K (2002, July 31) Number theory 1. Retrieved May 4, 2009, from http://math.usask.ca/encryption/lessons/lesson00/ page1.html
Data Encryption Standard (1999) Federal Information Processing. Standards Publication 46-3
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Fyffe S, Abate T (2016) Stanford cryptography pioneers Whitfield Diffie and Martin Hellman win ACM 2015 A.M. Turing Award, Stanford News Service, Stanford University, Stanford, CA
Milanov E (2009) The RSA algorithm, accelerated (honors) advanced calculus. University of Washington, Seattle
Zhao W (1999) Robust image based 3D face recognition. PhD Dissertation, University of Maryland
Babel C (2015) Tackling privacy concerns is key to expanding the internet of things, Wired Innovation Insights, Feb 2015
iPolice (2013) The iPolice app helps locate the nearest police station with address and contact details. www.ipolice.com
Encryption and User Identity
Cryptography. Retrieved May 4, 2009, from http://www.newworldencyclopedia.org/entry/Cryptography
European Parliament STOA (2000) Prison Technologies: an appraisal of technologies of political control – Final Study, European Parliament Directorate General for Research Directorate A, The STOA Programme, Luxembourg, July 2000, PE 289.666/Fin.St./EN
United Nations Manual on the prevention and control of computer-related crime, UN 2001
Whitman M, Mattord H (2005) Principles of information security. [University of Phoenix Custom Edition e-text]. Canada, Thomson Learning, Inc. Retrieved May 4, 2009, from University of Phoenix, rEsource, CMGT/432
Cyber Laws, Cyber Crimes, Cyber Security
Duggal P (2018) Cyber Law 3.0, LexisNexis, Gurgaon, India, ISBN 978-81-3125-366-3
European Commission (2017) Resilience, Deterrence and Defence: building strong cybersecurity for the EU, JOIN (2017) 450 final
High Representative of the European Union for Foreign Affairs and Security Policy (2013) Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN (2013) 1 final
NATO Cooperative Cyber Defence Centre of Excellence (2017) Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press
Ompall, Pandey T, Alam B (2017) How to report cyber crimes in Indian territory. Int J Sci Technol Manag 6(04), April 2017, ISSN 2394-1537
United Nations General Assembly Resolution Fifty-first, Agenda item 148 session A/RES/51/162, Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law (UNCITRAL), 30 January 1997
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ronchi, A.M. (2019). Safety and Security. In: e-Citizens. Springer, Cham. https://doi.org/10.1007/978-3-030-00746-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-00746-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00745-4
Online ISBN: 978-3-030-00746-1
eBook Packages: Computer ScienceComputer Science (R0)