The Need for a National ICT/ITU in India and South Asia
The need of a national ICT/ITU in the Indian subcontinent is imperative. This has been achieved by the implementation of a National Internet Policy, National e-governance policy, and a National Information Technology policy covering ICT/ITU-S activities in the country. There need no national ICT policy for South Asia. Rather, we need to have a National ICT Policy and a National IT Policy which have a combined scope and have been integrated into a single policy. Such a policy must provide for a National Information Technology Commission (NITC) for the Indian subcontinent, with the purpose of promoting information technology in India and South Asia. This body shall be empowered to promote information technology, including ITU activities on a national / regional basis, and also to oversee the ITU-S programmes. NITC should have a mission to develop, encourage, and facilitate IT-related activities in this region. This has been achieved under the ‘National ICT Policy’ which was adopted by the ICT Ministerial Advisory Committee in August 2007. In August 2010, the ICT Subcommittee of the ICT Council discussed the need for the creation and development of a dedicated ICT Ministry to facilitate the development and implementation of information technology in the subcontinent.
To implement the NIDS is the primary purpose of the ICT/ITU-S Council. The ICT Council oversees the development and implementation of the National IT Development Strategy and National IT Development Plan (NIDP) for South Asia.
The NIDS and NIDP are the driving forces behind national IT efforts and the policy development of this region. To enhance the effectiveness of the strategy and plan, the ICT Council is constituted to advise the State and UTs on their implementation of the NIDP and NIDS and on the coordination of national IT activities of the UTs in NIDP and NIDS.
India and South Asia need a single, integrated National Information Technology Policy for the region.
The impact of the confidence-building measures on norm diffusion in the South Asian region.
This study compares the effect of the confidence-building measures between the South Asian region and developed countries. The South Asian region is found to have undergone a considerable reduction in social and institutional norms. At the most recent survey, significant reductions were observed in the three domains of social norms, institutional norms, and institutional practices. The most significant reductions were observed in the norms related to gender roles, the norms pertaining to caste, and the norms relating to religiosity and the social norms regarding trust, respect and reciprocity. In addition, substantial reductions were observed in the norms related to social roles, norms pertaining to economic activity and norms regarding the use and abuse of trust. There were significant reductions in norms related to the distribution of wealth and norms regarding the protection of the rights of the downtrodden. Also, there were significant reductions in the norms related to the distribution of economic wealth at the state level. Additionally, significant reductions were observed in the norms related to political participation, norms regarding the treatment of the handicapped, and norms relating to the treatment of the disabled. These findings suggest that the confidence-building measures are not solely focused on building the norms in the South Asian region. Instead, the measures appear to have been more effective in building positive norms in other domains, particularly in the norms pertaining to the distribution of wealth and the social roles and rights of the downtrodden. This study sheds light on the effectiveness of confidence building measures in various domains, which are not necessarily focused exclusively on norms related to these domains. The main conclusion is that the confidence-building measures can have a significant impact on the diffusion and adoption of norms, which appear to be related to the diffusion of norms in other domains, and the promotion of rights and social roles, which are not, in every domain, directly related to norms.
The current study seeks to examine the impact of the confidence-building measures among a South Asian region. The South Asian region has been the focus of various investigations [1,2,3,4,5]. However, the effectiveness of confidence building measures has been mostly explored in developed countries [6,7,8].
Communication CBMs, the Norm Compliance and Galwan Valley Conflict
INTRODUCTION The growing interest in communications to and within the Galwan Valley has not only raised the challenges of communication regulation but has also made governance and communication management a part of the mainstream of the overall security of the society. Governance, communication management and security are integrated and interlinked processes and are mutually interdependent. These processes involve people, organizations, and society to realize the goals of security, which in our case is security of our assets and communications. An integrated approach to security management and governance provides the basis for sound governance and communication management. Security of assets, communication, and network management are interrelated and interdependent. There is an on-going evolution of the approach of governing and communications management towards a shared vision of governance. It involves the coordination, coordination and interdependence of governance and communication management. The security of assets, communication, and network management are interrelated and interdependent and the approach of governance and communications management to security and communications management is not a uniform one. The goal of the discussion and presentation is to provide an integrated approach of governance, communication, security and communication management. GOVERNANCE, COMMUNICATIONS MANAGEMENT, AND SECURITY The general approach of governance includes the concept of empowerment to achieve the collective good. The basic approach of communication management entails providing an effective communicative channel to achieve the collective good. The goal of security of assets, communication, and network management is achieving the security goals of the organization, organization’s customers, suppliers, and society. The concept of governance in the context of security and communication management includes the concept of empowerment and accountability of the managers in the organization. These concepts are integrated and interrelated in the overall approach of communication and security management. The basic approach of governing involves the management of the basic processes, which in our scenario includes security of the assets and communication. The concept of communication, which in our case involves the concept of communication security management, is also integrated with the approach of governance. The basic approach of governance and communication management involves the management of the basic processes, which in our scenario includes security of the assets and communication. The concept of communication, which in our case involves the concept of communication security management, is also integrated with the approach of governance.
The Wuhan summit and the border dispute between India and China.
The Wuhan summit and the border dispute between India and China. Neelesh Harnawat | Article on behalf of the Asian Security Network | January 10, 2018 | Article Comments (10) | The Wuhan summit and the border dispute between India and China. Introduction In the past 2-3 days, India has decided to hold a bilateral summit with China in Wuhan. The bilateral summit comes amid a fresh spat between India and China over the status of the border along India-China border. China has accused India of “using the region for creating trouble” and also of violating the “One China” principle and claiming the region to be part of China. The region was a strategic frontier for two great powers long before it was officially designated as “One China”. The region was also a frontline of conflict during the Partition and its partitioning events. In the aftermath of the Partition, the boundary in the state of Rajasthan was defined after India and Pakistan were officially assigned separate states. In the aftermath of the Partition, a border dispute was fought in the area between India and Pakistan. This prompted the Chinese side to create an international boundary based on the border in the state of Rajasthan and designate the disputed area as a “Chinese border”, thus adding to the existing tension in the region. China has tried to rework the border into a regional approach as it claims that it is “India’s duty” to protect the people and the “integrity of the country” through the creation of an international boundary to solve the border dispute. The region has also been claimed by several other countries in order to justify the creation of a “Chinese border”. In other words, the “Chinese border” has been imposed on the people of India and China by the foreign powers and their governments. This brings about further tension in the region. The Wuhan Summit has been scheduled to take place at the end of the month, but with the spat between India and China arising, it has had to be postponed to the beginning of next month. In this article, we discuss the latest developments and implications of the Wuhan summit on the relationship between India and China.
Tips of the Day in Network Security
How should you manage security? This is a question we often hear, and our answer is constantly evolving. We have not been able to put a value on what we do, but it is fun. We are focused on helping companies proactively protect their data from unauthorized access, and keep it secure for your use.
To see what we are up to, check out some of the projects we are working on.
Cyber threats are a worldwide epidemic. A recent report shows that more than 700,000 individuals are infected with malware, most of them on the Internet, and some even on phones. In 2015 alone, there were over 1 billion network traffic malware events. We are seeing a rise in malware that has the ability to penetrate and break into security applications. Organizations, such as Facebook and Apple, have invested billions in security technologies so that an intruder cannot gain access to the critical data of your organization.
We are protecting your company’s data, but it is now more vital than ever that you adopt a security strategy.