2 resultados para Situation analysis
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
China's Silk Road Economic Belt plan is a part of One Belt, One Road initiative that aims to create trade routes from China all the way to Europe. Despite the potential benefits, there are also problems along the way. In this research I am examining the adverse effects of one part of the Silk Road Economic Belt with my focus on Xinjiang Uyghur minority and their rights and Central Asian regional stability. Moreover, I suggest that China's past commitments in the international society as well as her actions in relations to the undertaking can give an insight into a regime where China would be the dominant power in international society. I have used qualitative analysis to study the topics. My most important methodological tools to examine the topics are as follows. I utilise conceptual analysis to borrow concepts from international relations field. I use method of situation analysis when I am describing the current circumstances in China's Xinjiang and Central Asia. Inductive analysis is the overall method since I suggest that the content I have examined could give an insight to how China regards and relates to international law in the future. Moreover, my theoretical framework of the research sees international law as a tool that a state can use to gain more power but at the same time international law restricts state's behaviour. Based on the findings of this research, in case of Xinjiang the New Silk Road is likely to worsen Uyghurs situation because of Beijing's worries and harsh actions to prevent any disturbance. However, the New Silk Road could bring stability and maintain regional security in Central Asia when the states could see it beneficial to unite for cooperation which can result with greater benefits. China's potential future regime will emphasize sovereignty and non-interference to states’ domestic matters. Moreover, there will be no room for minority rights in China's concept of human rights. Human rights are meant to protect rights of masses but are of secondary importance since development and security will be more important goals to pursue. In the field of cooperation, China is increasingly using multilateral forums to discuss the matters but reserves bilateral negotiations for executing the plans.
Resumo:
Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.