The COVID-19 pandemic has resulted in over 5.2 million deaths. Vaccine hesitancy remains a public health challenge, especially in Eastern Europe. Our study used a sample of essential workers living in the Republic of North Macedonia to: (1) Describe rates of vaccine hesitancy and risk perception of COVID-19; (2) Explore predictors of vaccine hesitancy; and (3) Describe the informational needs of hesitant and non-hesitant workers. A phone survey was administered in North Macedonia from 4–16 May 2021. Logistic regression explored associations of COVID-19 vaccine hesitancy with sociodemographic characteristics, non-COVID-19 vaccine hesitancy, previous diagnosis of COVID-19, and individual risk perception of contracting COVID-19. Chi-squared analyses compared differences in informational needs by hesitancy status. Of 1003 individuals, 44% were very likely to get the vaccine, and 56% reported some level of hesitancy. Older age, Albanian ethnicity, increased education, previous COVID-19 diagnosis, acceptance of other vaccines, and increased risk perception of COVID-19 infection were negatively associated with vaccine hesitancy. Results indicated significant differences in top informational needs by hesitancy status. The top informational needs of the hesitant were the freedom to choose to be vaccinated without consequences (57% vs. 42%, p < 0.01) and that all main international agencies recommended the vaccine (35% vs. 24%, p < 0.01).
As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.
The emergence of new non-state actors in the post Cold War reality have dramatically changed security environment around the globe. Modern terrorism practiced by Al Qaeda and its associated movement (AQAM) has posed serious threat to critical information infrastructure given the trend of connecting control systems that run these infrastructures to the internet. Although AQAM have not been successful to launch cyber-attack that will cause mass casualties, environment damage or financial effects, the possibility remain alarming since creativity in the age of globalization never ends. Additionally by using the so called "dot-com culture" modern terrorists effectively employ negative effects of globalization to rich to the societies' remote pockets and Islamic social nomads and thus enlarge their capabilities to affect our critical information infrastructure. Therefore to effectively protect our CII from modern terrorists we need to consider comprehensive and holistic approach build on direct and indirect mechanisms. IntroductionThe end of the Cold War and technological development has stimulated the process of globalization. On one hand globalization has spurred economy and improved our way of living. On the other it has stimulated environment where non-state actors including terrorist organizations have gained unimagined power. Using violent ideology especially after military response to 9/11 attacks, Al Qaeda have build global network of associated movements. Launching an ideological war these activists successfully have attracted many religious Islamic groups and individuals that were impressed with the idea to oppose.Today Al Qaeda's and its associated movements' (AQAM) activities represent modern terrorism. They pose asymmetric, unconventional, and apocalyptic threats around the globe. In this context cyber-world has become both, battle-space for modern terrorists' ideological and information warfare and medium for global radicalization.AQAM's interest to engage cyber-world for its own purposes raises serious alarm. Recent trend to connect control systems that run critical infrastructure to the internet makes these utilities especially vulnerable in the context of AQAM's interest. Thus many modern systems that run our everyday life and we depend on are also infrastructures that could be used to affect our security. Yet until today AQAM have not been successful to launch large scale cyber-attack that will cause mass casualties, environment damage or financial effects. Nevertheless security analyses and recent practice confirm that AQAM can affect critical information infrastructure both directly and indirectly.
Progress in information and communication technologies has affected our way of living in a unique way. The effects of cyber-based technologies on the population as a whole are huge and not limited just to information. There are emotional, societal, economic, psychological, and political effects in addition to easy access and sharing of information. Today computer systems that monitor and control industrial, infrastructure, or facility-based processes (widely known as supervisory control and data acquisition-SCADA) reduce labor costs, improve systems performance and reliability. Nevertheless, security challenges from cyberspace to these infrastructures make them critical for our safety and security. The growing asymmetry is a game changer. Non-state actors or smaller nations can take on much bigger powers in cyberspace, and through it, in the physical world, as well. Cyber-attacks on critical infrastructure such as electricity and water supplies could be similar to those that would be caused by weapons of mass destruction. At the same time SCADA systems have been developed in security vacuum which creates "paradox of modernity". As a result the more technologically advanced the state is the more vulnerable to cyber threats is.Cyber-attacks in Estonia (2007) Urged by this complexity some countries and organizations such as U.S. and NATO have considered radical measures to confront upcoming threats from cyber-attacks. In its first formal cyber strategy U.S. concluded that computer 1
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.