Center for Security Research Articles,Publications CSR was part of the research project on cyber bullying

CSR was part of the research project on cyber bullying


On January 31st 2022, three WEASA alumni members from different editions presented their research on cyberbullying in Macedonia and Serbia. One of the researchers was Oliver Risteski MA, our Head of the Department for Law Enforcement Research. The valuable piece of the research caught the attention of the attendees, who shared their appreciation and feedback after the presentation, and demonstrated their deep interest in the topic. The research found out that mostly women and underaged girls are under attack by ex-husbands or ex-partners/boyfriends who share personal photos online without their consent, conduct blackmail, and harass for revenge or other reasons. 

On the following link you can find the full research with the recommendations:

https://www.weasa.org/wp-content/uploads/2021/02/Research-on-cyber-stalking-in-North-Macedonia-and-Serbia.pdf

Related Post

When an order endsWhen an order ends

By Alessandro Politi, Director of the NATO Defense College Foundation

This article intends to discuss three points: the quest for a new world order, echoing the one established in 1945, is pointless; what should be done when an existing order cannot be adapted, and how the transition to a different order should be presently governed, taking into account also the new US administration.

The solutions proposed are to: adopt a flexible globalisation model where shared responsibilities and decision-making are realistically rebalanced; to refuse a fragmenting multipolarism; to relaunch global sustainability by redressing social imbalances at home and abroad in order to tackle climate change and to phase out an outdated model of consumerist capitalism. The overarching global priorities are essentially two: ensuring human security vis-à-vis climate change (and attendant pandemics) and favouring shared prosperity, which means the transition to a fairer hybrid economic system where economic policies are fully accountable to the taxpayer.

Will the Biden presidency understand these two strategic priorities? In short, the answer is: in word yes, in deed yo, with a strong tendency towards a no. Political handicaps in Congress and American socio-cultural conditions may significantly limit the President’s concrete choices, reducing complex decisions to a zero-sum game with China and risking an economic stalemate that could turn into hot confrontation. (more…)

Psychological aspects of modern warfarePsychological aspects of modern warfare

Aleksandar Nacev

While war has long been viewed as a competition between adversaries, peace has been defined by absence of such conflict. But what happens when the line between war and peace is blurred and hardly visible? Countries today face a number of actors who use a wide range of political, informational, military, and economic measures to influence, coerce, intimidate, or undermine its interests or those of its friends and allies. To accomplish military goals without putting one’s nation, civilians, or even opposition troops at mortal risk is certainly the ideal manner in which to win a war. (more…)

Cybersecurity basics more important than ever in the new normal of remote workCybersecurity basics more important than ever in the new normal of remote work

Blagoja Janakievski

In this new work-from-anywhere environment that we’re all in thanks to the COVID-19 pandemic, cybersecurity, trust, and protecting customer data is more important than ever. We saw the largest workforce transmit transformation in history as everyone went remote almost overnight in March 2020.

The best thing that any business can do in securing yourself, especially as adapting to this new environment, this new work from anywhere environment, is to nail the basics. There are a small number of really important cybersecurity hygiene actions, so think about it in the current climate as washing your hands from a cybersecurity perspective, that businesses can do to really eliminate the risk associated with a lot of common cybersecurity threats. So some examples of this are enabling strong multi-factor authentication or ensuring that you’re rapidly patching all of your devices to it to inoculate them against known vulnerabilities, to prevent things like ransomware attacks. And then finally, treating cybersecurity like a team sport, building a culture of awareness in your company so that all the employees in your company can act like security trailblazers.

(more…)