Search results
1 – 10 of over 8000This paper aims to understand whether Portugal, being a relatively peripheral country – in political, economic and military terms – of Southwest Europe, was recently a target of…
Abstract
Purpose
This paper aims to understand whether Portugal, being a relatively peripheral country – in political, economic and military terms – of Southwest Europe, was recently a target of hybrid threats. The prevalence of a specific type of threat was found. Thus, this paper analyses the non-kinetic hybrid threats in Portugal, in a temporary hiatus of two years (2017-2018).
Design/methodology/approach
This study has two parts: a conceptual analysis of hybrid threats created by us and, based on the typology previously presented, an analysis of the hybrid threats in Portugal between 2017 and 2018. The first part relied on source analysis, as the result of a desk review methodology, supported by monographs, declassified official documents and reports. The second part is also the result of source analysis, but more extensive. In addition to the desk review methodology, the study included semi-structured interviews with different stakeholders from the Portuguese security and armed forces, who asked not to be quoted. Media content analysis was also carried out – for trends and fact-check – mostly for the events related to the “narratives led operations” (for propaganda, misinformation, counter-information and strategic leaks).
Findings
To date, Portugal – compared with other European states – has not been a significant target for hybrid threats. It is diluted in the Portuguese geopolitical dimension. Nevertheless, not escaping what is happening in Europe, it has also been the target of non-kinetic hybrid threats, especially in cyberspace. In the field of so-called “narrative-driven operations”, there have been some occurrences – whether related to fake news, far-right movements or strategic leaks. In addition, cyberattacks from foreign groups for information and data gathering have increased in recent years, making governmental and private critical infrastructures more vulnerable.
Research limitations/implications
One of the characteristics of hybrid threats is their difficult identification. Therefore, information is scarce, which has complicated the research, leading us to assume, in many cases, speculation about the threat. It should also be taken into account that, in the case of cyberspace, until 2018, 90% of the occurrences were not reported, and the study has dealt with only official numbers.
Originality/value
It is not a policy paper. Although it neither points out national vulnerabilities to this type of threat nor makes procedural recommendations or considerations, it is fundamental in identifying the peculiarity of hybrid threats in a democratic state.
Details
Keywords
Finland’s defence policy.
Details
DOI: 10.1108/OXAN-DB225706
ISSN: 2633-304X
Keywords
Geographic
Topical
The purpose of this paper is to provide a brief answer to the following questions: in the arena for State and non-State actors, who and how may guarantee the balance between…
Abstract
Purpose
The purpose of this paper is to provide a brief answer to the following questions: in the arena for State and non-State actors, who and how may guarantee the balance between democracy, State and market? How can the citizens’ economic well-being be prioritized, in terms of national security?
Design/methodology/approach
Adapting both the link analysis approach and the order of Pierce’s inference stages, the author illustrates the state of the art, some economic indices and Italy’s need for countermeasures.
Findings
Starting from the notion of “social sustainability of the political decisions,” given by the author, the paper highlights the opportunity to rethink the concept of political warfare, in view of a productive fabric characterized by both a high number of small and medium-sized enterprises and the pervasiveness of mafia-type organizations. At the end, the author shares some proposal in the fields of Public Law and Social Marketing and a broader definition of the above-mentioned concept.
Originality/value
This study shows the link between security studies, people’s perception of grey areas and polarization of opinions and wealth, giving the reader a bottom-up input to the comprehension of the contemporary complexity.
Details
Keywords
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.
Abstract
Purpose
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.
Design
This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.
Findings
Using modeling such as hybrid simulation and a threat-opportunity-weakness-strength matrix, organizations are able to mitigate the complexities of current business environments in order to devise and adopt strategies for the future.
Originality
The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.
Details
Keywords
Anna Visvizi and Miltiadis D. Lytras
The purpose of this paper is to contextualise and examine critically the collection of the papers dealing with the broad and multi-faceted question of risk, threats and challenges…
Abstract
Purpose
The purpose of this paper is to contextualise and examine critically the collection of the papers dealing with the broad and multi-faceted question of risk, threats and challenges governments are exposed to in the 21st century. To this end, the concept of ‘distributed risks and threats’ is introduced to account of challenges spread across the context, in which governments are embedded.
Design/methodology/approach
This paper offers a critical insight into the content of the issue.
Findings
The key argument that this paper advances is that while the nature of risks, threats and challenges that governments are exposed to today is qualitatively new and their scope unprecedented, a lot of governments’ capacity remains idle, i.e. ready to be deployed to address these risks, threats and challenges.
Research limitations/implications
As a review paper, the points conveyed in this paper sketch and highlight, rather than explore in-depth, the possible and new research avenues that the collection of papers prompts.
Practical implications
This paper highlights that the – developed over the centuries – capacity of the government to act and address risks and threats is incommensurate with the agility of challenges borne in the 21st century.
Originality/value
This paper introduces the concept of ‘distributed risks and threats’ to account of the qualitatively new and hybrid challenges spread across the context, in which governments are embedded. This conceptualization of risks and threats, or challenges, offers a handy way to contextualize the variety of ways in which the government is challenged today.
Details
Keywords
Sandro Cabral and Claude Ménard
Building on the literature of hybrids in the context of public organizations, this paper aims to discuss under which conditions hybrids can adequately provide “critical services”…
Abstract
Purpose
Building on the literature of hybrids in the context of public organizations, this paper aims to discuss under which conditions hybrids can adequately provide “critical services”, a subset of public services characterized by their simultaneous exposure to externalities, socio-economic cohesion and legitimacy concerns.
Design/methodology/approach
The authors collect indications from two stylized examples, prisons and defense, to develop propositions as a step toward assessing the potential role of hybrids as alternatives to direct public provision or full privatization in the delivery of critical services.
Findings
This paper examines the conditions under which hybrid arrangements outperform the polar cases of public bureaus and full privatization in the delivery of a specific subset of public goods that the authors identify as “critical services”.
Originality/value
The authors suggest that there might be comparative advantages in relying on hybrid arrangements rather than the usual solutions of fully private or fully governmental provision. However, they also submit that these advantages are conditional to the capacity of hybrids to reconcile competing interests to achieve socio-economic cohesion, to combine capabilities dispersed among partners to benefit from positive externalities and to satisfy legitimacy concerns with respect to the role of government.
Details
Keywords
The purpose of this paper is to analyse supply chain network management (SCNM) in the context of emergency preparedness management (EPM). The results of this study revealed that…
Abstract
Purpose
The purpose of this paper is to analyse supply chain network management (SCNM) in the context of emergency preparedness management (EPM). The results of this study revealed that civil-military relations are essential for EPM to function as a coordinated approach to safety and security, and are necessary to respond effectively to complex emergencies and mitigating threats to developed countries. Civil-military relations are still a concern in the context of communication, the exercise of authority, and the coordination of emergency supplies (ES) to emergency operations.
Design/methodology/approach
This qualitative study is based on field observations, with attention focused on the EPM of Sweden, Finland, and Poland. The analysis of a broader SCNM through EPM was supported by semi-structured interviews among civil-military actors in Sweden, information collected from informal conversations known as “hanging out”, and secondary materials. Empirically, the analysis included a variety of civil-military relationships and identified implications for management, policy, and planning that are applicable to developed countries.
Findings
The management of civil-military relations is a meaningful resource when used as an overall approach for safety and security. The integration of civil-military relations in EPM in the planning of ES is a long-standing and complex matter. The management of Swedish civil-military relations in EPM is recognising that implications for management are imbedded in continuous policy changes in, for example, the Swedish policy history. Civil-military relational complications that arise in the field of operations are impossible to anticipate during emergency planning, as those complications are grounded in policy changes.
Originality/value
Escalating threats to developed countries are highlighted. The study underlines the primary measures used in studying military involvement in EPM. An understanding of SCNM as a choice for management can be obtained in future research that focuses on a broader role of the military in EPM. Sweden has emphasised a clearer role for the military by reactivating total defence planning and by evolving common practices and processes with civil actors in civil defence. Meanwhile, Poland and Finland are increasing their focus on supporting the management of civil-military policies on safety and security regarding communication, authority, and developing coordination. Consistent with findings from previous reports on SCNM, civil-military relations are essential for EPM. This study confirmed the importance of civil-military coordination, the management and practice of authority, and shared forms of communication.
Details
Keywords
Aleksandra Kuczyńska-Zonik and Agata Tatarenko
The objective of this chapter is to outline the problem of information security in Russia and Central and Eastern European (CEE) countries since 2000. It demonstrates the…
Abstract
The objective of this chapter is to outline the problem of information security in Russia and Central and Eastern European (CEE) countries since 2000. It demonstrates the specifics of Russian propaganda in the CEE, which visibly poses a security threat to those countries. To address this issue, the authors present the evolution of Russian information policy, propaganda, its tools and instruments (traditional and social media), and examine the mechanisms of exerting social influence used in practice in the CEE countries. The authors discuss the implications of Russia’s information war with the West and for the CEE states’ domestic problems, which provide vast opportunities for Russian activity in the region. Changes in information policy and information management are bound to a revision of Russian foreign policy. The authors assumed that the information war in the CEE is not directed toward the countries of this region but rather aims to weaken the West, especially the European Union. Moreover, there is a need to speak out about the rise of populism and extremist movements exploited through Russian media influence to undermine regional stability and weaken state authorities. Additionally, it is suggested more attention should be paid to education and public awareness. The lack of new media literacy skills, together with the combination of populism and pro-Russia business links in the CEE states, will increase their vulnerabilities to more risks than information security.
Details
Keywords
Critical infrastructure is an attractive target, given the difficulty of attributing such attacks and the lack of immediate fatalities, which reduces the likelihood of escalation…
Details
DOI: 10.1108/OXAN-DB278095
ISSN: 2633-304X
Keywords
Geographic
Topical
Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details