[email protected] | |
3275638434 | |
Paper Publishing WeChat |
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Global and International Security Under Spatial Grasp Paradigm
Peter Simon Sapaty
Full-Text PDF XML 158 Views
DOI:10.17265/2328-2134/2024.02.004
National Academy of Sciences, Kyiv, Ukraine
Global and international security
cannot be provided from a single point or a set of separate points whatever powerful
these might be (even with quantum supercomputers!). It should rather be deeply embedded
and integrated with bodies of real systems wherever in physical, virtual, or combined
spaces they may exist. So global security capabilities should not only be distributed,
but rather be really spatial, self-organized, and dynamic, also exhibiting overall
integrity, awareness, and consciousness features. The paper describes applicability
of the patented and revealed in 10 books Spatial Grasp Model and Technology (SGT)
and its basic Spatial Grasp Language (SGL) which conceptually and functionally match
security problems of large distributed and heterogeneous systems. It investigates
very practical security solutions for finding and tracing distribution of forbidden
items, world roaming criminals, recovery from natural and human-made disasters,
tracing and elimination of moving dangerous objects in terrestrial and celestial
spaces, as well as analysis and restoration of damaged transport networks. It advises
how different security infrastructures can be organized and managed, and how to
cooperate and integrate within global security systems with higher awareness and
consciousness levels over them. The provided security-oriented version of SGL can
be quickly implemented and integrated with existing distributed management and security
systems.
global security, international security, critical infrastructures, Spatial Grasp Technology, Spatial Grasp Language, distributed language interpretation, self-recovering security scenarios, global security awareness and consciousness
Peter Simon Sapaty. (2024). Global and International Security Under Spatial Grasp Paradigm. International Relations and Diplomacy, Mar.-Apr. 2024, Vol. 12, No. 2, 72-85.
Alpha Media LLC. (2024). “Sophisticated criminal groups” roaming the desert, ready to attack…you. Retrieved from https://www.knewsradio.com/sophisticated-criminal-groups-roaming-the-desert-ready-to-attack-you/
Butcher, F. (2018). Role of research psychology in defence and security. Retrieved from https://militaryhealth.bmj.com/content/165/2/113
Check Point. (2024). What is network security? Retrieved from https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/
Chitadze, N. (2022). World politics and the challenges for international security. Retrieved from https://www.igi-global.com/book/world-politics-challenges-international-security/279369
Cottam, M. L., Mastors, E., Preston, T., & Dietz, B. (2022). The political psychology of international security and conflict. London: Routledge. Retrieved from https://www.taylorfrancis.com/chapters/mono/10.4324/9780429244643-13/political-psychology-international-security-conflict-martha-cottam-elena-mastors-thomas-preston-beth-dietz
Davis, J. W. (Ed.). (October 1, 2012). Psychology, strategy and conflict: Perceptions of insecurity in international relations (Routledge global security studies). London: Routledge. Retrieved from https://www.amazon.in/Psychology-Strategy-Conflict-Perceptions-International/dp/0415622042
Ganame, A. K., Bourgeois, J., Bidou, R.,
& Spies, F. (2008). A global security architecture for intrusion detection
on computer networks. Computers &
Security, 27(1-2), 30-47. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/
S0167404808000047
Gheciu, A., & Wohlforth, W. C. (August 4, 2020). The Oxford handbook of international security. Oxford: Oxford University Press.
Hough, P. (March 27, 2018). Understanding global security (4th ed.). London: Routledge.
IGI Global. (2024). What is distributed security? Retrieved from https://www.igi-global.com/dictionary/blockchain-for-transformation-in-digital-marketing/102330
Kay, S. (March 6, 2015). Global security in the twenty-first century: The quest for power and the search for peace (3rd ed.). Lanham, MD: Rowman & Littlefield Publishers.
Mandel, R. (April 3, 2013). Global security upheaval: Armed nonstate groups usurping state stability functions (1st ed.). Stanford: Stanford University Press.
Masakowski, Y. R. (July 15, 2020). Artificial intelligence and global security: Future trends, threats and considerations. Bingley: Emerald Publishing Limited.
Morgan, P. M. (February 27, 2006). International security: Problems and solutions (1st ed.). Washington, DC: CQ Press.
Moulos, V., Chatzikyriakos, G., Kassouras, V., Doulamis, A., Doulamis, N., Leventakis, G., …, Gatzioura, A. (2018). A robust information life cycle management framework for securing and governing critical infrastructure systems. Inventions, 3(4), 71. Retrieved from https://doi.org/10.3390/inventions3040071
Neack, L. (April 11, 2023). National, international, and human security: Protection against violence (3rd ed.). Lanham: Rowman & Littlefield Publishers.
NordLayer. (2024). Network security: Everything you need to know. Retrieved from https://nordlayer.com/learn/network-security/what-is-network-security/
O’Connor, T. R. (January 14, 2019). Global security. Solana Beach, CA: Cognella Academic Publishing.
Prynne, M. (February 24,
2014). More than 750 foreign criminals roaming Britain’s streets. Retrieved
from https://www.telegraph.co.uk/
news/uknews/law-and-order/10657400/More-than-750-foreign-criminals-roaming-Britains-streets.html
RAND. (2024). Global security. Retrieved from https://www.rand.org/topics/global-security.html
RinaldiS. M.,PeerenboomJ. P.,Kelly, T. K. (2002). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11-25. doi:10.1109/37.969131
Rowan University. (2024). Global security
problems. Retrieved from https://chss.rowan.edu/centers/inter_majors/interdisciplinary_
programs/internationalstudies/global_security_resource/global-security-problems.html
Safdar, M. A., Akhtar, N., Baig, K., & Ahamad, W. (2022). Global security and human rights. Journal of Positive School Psychology, 6(10), 867-874. Retrieved from https://journalppw.com/index.php/jpsp/article/view/13207/8577
Sapaty, P. S. (1993). A distributed processing system. European Patent N 0389655, Publ. 10.11.93, European Patent Office.
Sapaty, P. S. (1999). Mobile processing in distributed and open environments. New York: John Wiley & Sons.
Sapaty, P. S. (2005). Ruling distributed dynamic worlds. New York: John Wiley & Sons.
Sapaty, P. S. (2017). Managing distributed dynamic systems with spatial grasp technology. New York: Springer.
Sapaty, P. S. (2018). Holistic analysis and management of distributed social systems. New York: Springer.
Sapaty, P. S. (2019). Complexity in international security: A holistic spatial approach. Bingley: Emerald Publishing.
Sapaty, P. S. (2021). Symbiosis of real and simulated worlds under spatial grasp technology. New York: Springer.
Sapaty, P. S. (2022). Spatial grasp as a model for space-based control and management systems. Boca Raton: CRC Press.
Sapaty, P. S. (2023a). The spatial grasp model: Applications and investigations of distributed dynamic worlds. Bingley: Emerald Publishing.
Sapaty, P. S. (2023b). Spatial management of air and missile defence operations. Mathematical Machines and Systems, 6(1), 30-49. Retrieved from http://www.immsp.kiev.ua/publications/articles/2023/2023_1/01_23_Sapaty.pdf
Sapaty, P. S. (2023c). Providing distributed system integrity under spatial grasp technology. Mathematical Machines and Systems, 6(2), 18-27. Retrieved from http://www.immsp.kiev.ua/publications/articles/2023/2023_2/02_23_Sapaty.pdf
Sapaty, P. S. (2023d). Providing global
awareness in distributed dynamic systems. International
Relations and Diplomacy, 11(2), 87-100. doi:10.17265/2328-2134/2023.02.002.
Retrieved from https://www.davidpublisher.com/Public/uploads/Contribute/
6486c3d05a6cc.pdf
Sapaty, P. S. (2023e). Simulating distributed consciousness with spatial grasp model. Mathematical Machines and Systems, 6(3), 13-30.
Sapaty, P. S. (2023f). Network centrality operations under spatial grasp technology. Journal of Advances in Artificial Intelligence and Machine Learning, 1(1), 1-11. Retrieved from https://www.scivisionpub.com/journals/articleinpress-journal-of-advances-in-artificial-intelligence-and-machine-learning
Sapaty, P. S. (2023g). Managing distributed systems with spatial grasp patterns. Mathematical Machines and Systems, 6(4), 11-25. Retrieved from http://www.immsp.kiev.ua/publications/articles/2023/2023_4/04_23_Sapaty.pdf
Sapaty, P. S. (2024a). Providing integrity, awareness, and consciousness in distributed dynamic systems. Boca Raton: CRC Press.
Sapaty, P. S. (2024b). Spatial networking in the united physical, virtual, and mental world. New York: Springer. Retrieved from https://www.amazon.com/Spatial-Networking-Physical-Virtual-Decision/dp/3031621530/
Schneier, B. (June 2008). The psychology of security. Communications of the ACM, 50(5), 50-79. Retrieved from https://www.researchgate.net/publication/221462155_The_Psychology_of_Security
Sherman, R. L. (March 1992). Distributed systems security. Computers & Security, 11(1), 24-28. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/016740489290216E
U.S. News. (January 27, 2024). Illegal border crossings from Mexico reach highest on record in December before January lull. Retrieved from https://apnews.com/article/immigration-border-crossings-mexico-biden-18ac91ef502e0c5433f74de6cc629b32
Universidad Europea. (2024). International security threats—What are the main ones? Retrieved from https://universidadeuropea.com/en/blog/international-security-threats/
University of St Andrews. (2024). IR4546: The psychology of international security, Academic year(s): 2018-2019. Retrieved from https://portal.st-andrews.ac.uk/catalogue/View?code=IR4546&academic_year=2018%2F9
Wikipedia. (2024a). Security. Retrieved from https://en.wikipedia.org/wiki/Security
Wikipedia. (2024b). Security. Retrieved from https://www.merriam-webster.com/dictionary/security
Wikipedia. (2024c). International security. Retrieved from https://en.wikipedia.org/wiki/International_security
Xiao, Y., & Pan, Y. (Eds.). (August 2007). Security in distributed and networking systems. Retrieved from https://www.worldscientific.com/worldscibooks/10.1142/6513#t=aboutBook