Paper Status Tracking
Contact us
[email protected]
Click here to send a message to me 3275638434
Paper Publishing WeChat

Article
Affiliation(s)

National Academy of Sciences, Kyiv, Ukraine

ABSTRACT

Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be (even with quantum supercomputers!). It should rather be deeply embedded and integrated with bodies of real systems wherever in physical, virtual, or combined spaces they may exist. So global security capabilities should not only be distributed, but rather be really spatial, self-organized, and dynamic, also exhibiting overall integrity, awareness, and consciousness features. The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology (SGT) and its basic Spatial Grasp Language (SGL) which conceptually and functionally match security problems of large distributed and heterogeneous systems. It investigates very practical security solutions for finding and tracing distribution of forbidden items, world roaming criminals, recovery from natural and human-made disasters, tracing and elimination of moving dangerous objects in terrestrial and celestial spaces, as well as analysis and restoration of damaged transport networks. It advises how different security infrastructures can be organized and managed, and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them. The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.

KEYWORDS

global security, international security, critical infrastructures, Spatial Grasp Technology, Spatial Grasp Language, distributed language interpretation, self-recovering security scenarios, global security awareness and consciousness

Cite this paper

Peter Simon Sapaty. (2024). Global and International Security Under Spatial Grasp Paradigm. International Relations and Diplomacy, Mar.-Apr. 2024, Vol. 12, No. 2, 72-85.

References

Alpha Media LLC. (2024). “Sophisticated criminal groups” roaming the desert, ready to attack…you. Retrieved from https://www.knewsradio.com/sophisticated-criminal-groups-roaming-the-desert-ready-to-attack-you/

Butcher, F. (2018). Role of research psychology in defence and security. Retrieved from https://militaryhealth.bmj.com/content/165/2/113

Check Point. (2024). What is network security? Retrieved from https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/

Chitadze, N. (2022). World politics and the challenges for international security. Retrieved from https://www.igi-global.com/book/world-politics-challenges-international-security/279369

Cottam, M. L., Mastors, E., Preston, T., & Dietz, B. (2022). The political psychology of international security and conflict. London: Routledge. Retrieved from https://www.taylorfrancis.com/chapters/mono/10.4324/9780429244643-13/political-psychology-international-security-conflict-martha-cottam-elena-mastors-thomas-preston-beth-dietz

Davis, J. W. (Ed.). (October 1, 2012). Psychology, strategy and conflict: Perceptions of insecurity in international relations (Routledge global security studies). London: Routledge. Retrieved from https://www.amazon.in/Psychology-Strategy-Conflict-Perceptions-International/dp/0415622042

Ganame, A. K., Bourgeois, J., Bidou, R., & Spies, F. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1-2), 30-47. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/
S0167404808000047

Gheciu, A., & Wohlforth, W. C. (August 4, 2020). The Oxford handbook of international security. Oxford: Oxford University Press.

Hough, P. (March 27, 2018). Understanding global security (4th ed.). London: Routledge.

IGI Global. (2024). What is distributed security? Retrieved from https://www.igi-global.com/dictionary/blockchain-for-transformation-in-digital-marketing/102330

Kay, S. (March 6, 2015). Global security in the twenty-first century: The quest for power and the search for peace (3rd ed.). Lanham, MD: Rowman & Littlefield Publishers.

Mandel, R. (April 3, 2013). Global security upheaval: Armed nonstate groups usurping state stability functions (1st ed.). Stanford: Stanford University Press.

Masakowski, Y. R. (July 15, 2020). Artificial intelligence and global security: Future trends, threats and considerations. Bingley: Emerald Publishing Limited.

Morgan, P. M. (February 27, 2006). International security: Problems and solutions (1st ed.). Washington, DC: CQ Press.

Moulos, V., Chatzikyriakos, G., Kassouras, V., Doulamis, A., Doulamis, N., Leventakis, G., …, Gatzioura, A. (2018). A robust information life cycle management framework for securing and governing critical infrastructure systems. Inventions, 3(4), 71. Retrieved from https://doi.org/10.3390/inventions3040071

Neack, L. (April 11, 2023). National, international, and human security: Protection against violence (3rd ed.). Lanham: Rowman & Littlefield Publishers.

NordLayer. (2024). Network security: Everything you need to know. Retrieved from https://nordlayer.com/learn/network-security/what-is-network-security/

O’Connor, T. R. (January 14, 2019). Global security. Solana Beach, CA: Cognella Academic Publishing.

Prynne, M. (February 24, 2014). More than 750 foreign criminals roaming Britain’s streets. Retrieved from https://www.telegraph.co.uk/
news/uknews/law-and-order/10657400/More-than-750-foreign-criminals-roaming-Britains-streets.html

RAND. (2024). Global security. Retrieved from https://www.rand.org/topics/global-security.html

Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2002). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11-25. doi:10.1109/37.969131

Rowan University. (2024). Global security problems. Retrieved from https://chss.rowan.edu/centers/inter_majors/interdisciplinary_
programs/internationalstudies/global_security_resource/global-security-problems.html

Safdar, M. A., Akhtar, N., Baig, K., & Ahamad, W. (2022). Global security and human rights. Journal of Positive School Psychology, 6(10), 867-874. Retrieved from https://journalppw.com/index.php/jpsp/article/view/13207/8577

Sapaty, P. S. (1993). A distributed processing system. European Patent N 0389655, Publ. 10.11.93, European Patent Office.

Sapaty, P. S. (1999). Mobile processing in distributed and open environments. New York: John Wiley & Sons.

Sapaty, P. S. (2005). Ruling distributed dynamic worlds. New York: John Wiley & Sons.

Sapaty, P. S. (2017). Managing distributed dynamic systems with spatial grasp technology. New York: Springer.

Sapaty, P. S. (2018). Holistic analysis and management of distributed social systems. New York: Springer.

Sapaty, P. S. (2019). Complexity in international security: A holistic spatial approach. Bingley: Emerald Publishing.

Sapaty, P. S. (2021). Symbiosis of real and simulated worlds under spatial grasp technology. New York: Springer.

Sapaty, P. S. (2022). Spatial grasp as a model for space-based control and management systems. Boca Raton: CRC Press.

Sapaty, P. S. (2023a). The spatial grasp model: Applications and investigations of distributed dynamic worlds. Bingley: Emerald Publishing.

Sapaty, P. S. (2023b). Spatial management of air and missile defence operations. Mathematical Machines and Systems, 6(1), 30-49. Retrieved from http://www.immsp.kiev.ua/publications/articles/2023/2023_1/01_23_Sapaty.pdf

Sapaty, P. S. (2023c). Providing distributed system integrity under spatial grasp technology. Mathematical Machines and Systems, 6(2), 18-27. Retrieved from http://www.immsp.kiev.ua/publications/articles/2023/2023_2/02_23_Sapaty.pdf

Sapaty, P. S. (2023d). Providing global awareness in distributed dynamic systems. International Relations and Diplomacy, 11(2), 87-100. doi:10.17265/2328-2134/2023.02.002. Retrieved from https://www.davidpublisher.com/Public/uploads/Contribute/
6486c3d05a6cc.pdf

Sapaty, P. S. (2023e). Simulating distributed consciousness with spatial grasp model. Mathematical Machines and Systems, 6(3), 13-30.

Sapaty, P. S. (2023f). Network centrality operations under spatial grasp technology. Journal of Advances in Artificial Intelligence and Machine Learning, 1(1), 1-11. Retrieved from https://www.scivisionpub.com/journals/articleinpress-journal-of-advances-in-artificial-intelligence-and-machine-learning

Sapaty, P. S. (2023g). Managing distributed systems with spatial grasp patterns. Mathematical Machines and Systems, 6(4), 11-25. Retrieved from http://www.immsp.kiev.ua/publications/articles/2023/2023_4/04_23_Sapaty.pdf

Sapaty, P. S. (2024a). Providing integrity, awareness, and consciousness in distributed dynamic systems. Boca Raton: CRC Press.

Sapaty, P. S. (2024b). Spatial networking in the united physical, virtual, and mental world. New York: Springer. Retrieved from https://www.amazon.com/Spatial-Networking-Physical-Virtual-Decision/dp/3031621530/

Schneier, B. (June 2008). The psychology of security. Communications of the ACM, 50(5), 50-79. Retrieved from https://www.researchgate.net/publication/221462155_The_Psychology_of_Security

Sherman, R. L. (March 1992). Distributed systems security. Computers & Security, 11(1), 24-28. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/016740489290216E

U.S. News. (January 27, 2024). Illegal border crossings from Mexico reach highest on record in December before January lull. Retrieved from https://apnews.com/article/immigration-border-crossings-mexico-biden-18ac91ef502e0c5433f74de6cc629b32

Universidad Europea. (2024). International security threats—What are the main ones? Retrieved from https://universidadeuropea.com/en/blog/international-security-threats/

University of St Andrews. (2024). IR4546: The psychology of international security, Academic year(s): 2018-2019. Retrieved from https://portal.st-andrews.ac.uk/catalogue/View?code=IR4546&academic_year=2018%2F9

Wikipedia. (2024a). Security. Retrieved from https://en.wikipedia.org/wiki/Security

Wikipedia. (2024b). Security. Retrieved from https://www.merriam-webster.com/dictionary/security

Wikipedia. (2024c). International security. Retrieved from https://en.wikipedia.org/wiki/International_security

Xiao, Y., & Pan, Y. (Eds.). (August 2007). Security in distributed and networking systems. Retrieved from https://www.worldscientific.com/worldscibooks/10.1142/6513#t=aboutBook

About | Terms & Conditions | Issue | Privacy | Contact us
Copyright © 2001 - David Publishing Company All rights reserved, www.davidpublisher.com
3 Germay Dr., Unit 4 #4651, Wilmington DE 19804; Tel: 1-323-984-7526; Email: [email protected]