Search results

1 – 10 of over 8000
Article
Publication date: 4 May 2020

Felipe Pathe Duarte

This paper aims to understand whether Portugal, being a relatively peripheral country – in political, economic and military terms – of Southwest Europe, was recently a target of…

Abstract

Purpose

This paper aims to understand whether Portugal, being a relatively peripheral country – in political, economic and military terms – of Southwest Europe, was recently a target of hybrid threats. The prevalence of a specific type of threat was found. Thus, this paper analyses the non-kinetic hybrid threats in Portugal, in a temporary hiatus of two years (2017-2018).

Design/methodology/approach

This study has two parts: a conceptual analysis of hybrid threats created by us and, based on the typology previously presented, an analysis of the hybrid threats in Portugal between 2017 and 2018. The first part relied on source analysis, as the result of a desk review methodology, supported by monographs, declassified official documents and reports. The second part is also the result of source analysis, but more extensive. In addition to the desk review methodology, the study included semi-structured interviews with different stakeholders from the Portuguese security and armed forces, who asked not to be quoted. Media content analysis was also carried out – for trends and fact-check – mostly for the events related to the “narratives led operations” (for propaganda, misinformation, counter-information and strategic leaks).

Findings

To date, Portugal – compared with other European states – has not been a significant target for hybrid threats. It is diluted in the Portuguese geopolitical dimension. Nevertheless, not escaping what is happening in Europe, it has also been the target of non-kinetic hybrid threats, especially in cyberspace. In the field of so-called “narrative-driven operations”, there have been some occurrences – whether related to fake news, far-right movements or strategic leaks. In addition, cyberattacks from foreign groups for information and data gathering have increased in recent years, making governmental and private critical infrastructures more vulnerable.

Research limitations/implications

One of the characteristics of hybrid threats is their difficult identification. Therefore, information is scarce, which has complicated the research, leading us to assume, in many cases, speculation about the threat. It should also be taken into account that, in the case of cyberspace, until 2018, 90% of the occurrences were not reported, and the study has dealt with only official numbers.

Originality/value

It is not a policy paper. Although it neither points out national vulnerabilities to this type of threat nor makes procedural recommendations or considerations, it is fundamental in identifying the peculiarity of hybrid threats in a democratic state.

Details

Transforming Government: People, Process and Policy, vol. 14 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Expert briefing
Publication date: 10 November 2017

Finland’s defence policy.

Article
Publication date: 24 January 2020

Alessandro Arcobasso

The purpose of this paper is to provide a brief answer to the following questions: in the arena for State and non-State actors, who and how may guarantee the balance between…

Abstract

Purpose

The purpose of this paper is to provide a brief answer to the following questions: in the arena for State and non-State actors, who and how may guarantee the balance between democracy, State and market? How can the citizens’ economic well-being be prioritized, in terms of national security?

Design/methodology/approach

Adapting both the link analysis approach and the order of Pierce’s inference stages, the author illustrates the state of the art, some economic indices and Italy’s need for countermeasures.

Findings

Starting from the notion of “social sustainability of the political decisions,” given by the author, the paper highlights the opportunity to rethink the concept of political warfare, in view of a productive fabric characterized by both a high number of small and medium-sized enterprises and the pervasiveness of mafia-type organizations. At the end, the author shares some proposal in the fields of Public Law and Social Marketing and a broader definition of the above-mentioned concept.

Originality/value

This study shows the link between security studies, people’s perception of grey areas and polarization of opinions and wealth, giving the reader a bottom-up input to the comprehension of the contemporary complexity.

Article
Publication date: 27 February 2020

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

141

Abstract

Purpose

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

Design

This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.

Findings

Using modeling such as hybrid simulation and a threat-opportunity-weakness-strength matrix, organizations are able to mitigate the complexities of current business environments in order to devise and adopt strategies for the future.

Originality

The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.

Details

Strategic Direction, vol. 36 no. 4
Type: Research Article
ISSN: 0258-0543

Keywords

Article
Publication date: 23 July 2020

Anna Visvizi and Miltiadis D. Lytras

The purpose of this paper is to contextualise and examine critically the collection of the papers dealing with the broad and multi-faceted question of risk, threats and challenges…

234

Abstract

Purpose

The purpose of this paper is to contextualise and examine critically the collection of the papers dealing with the broad and multi-faceted question of risk, threats and challenges governments are exposed to in the 21st century. To this end, the concept of ‘distributed risks and threats’ is introduced to account of challenges spread across the context, in which governments are embedded.

Design/methodology/approach

This paper offers a critical insight into the content of the issue.

Findings

The key argument that this paper advances is that while the nature of risks, threats and challenges that governments are exposed to today is qualitatively new and their scope unprecedented, a lot of governments’ capacity remains idle, i.e. ready to be deployed to address these risks, threats and challenges.

Research limitations/implications

As a review paper, the points conveyed in this paper sketch and highlight, rather than explore in-depth, the possible and new research avenues that the collection of papers prompts.

Practical implications

This paper highlights that the – developed over the centuries – capacity of the government to act and address risks and threats is incommensurate with the agility of challenges borne in the 21st century.

Originality/value

This paper introduces the concept of ‘distributed risks and threats’ to account of the qualitatively new and hybrid challenges spread across the context, in which governments are embedded. This conceptualization of risks and threats, or challenges, offers a handy way to contextualize the variety of ways in which the government is challenged today.

Details

Transforming Government: People, Process and Policy, vol. 14 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Open Access
Article
Publication date: 8 July 2019

Sandro Cabral and Claude Ménard

Building on the literature of hybrids in the context of public organizations, this paper aims to discuss under which conditions hybrids can adequately provide “critical services”…

1110

Abstract

Purpose

Building on the literature of hybrids in the context of public organizations, this paper aims to discuss under which conditions hybrids can adequately provide “critical services”, a subset of public services characterized by their simultaneous exposure to externalities, socio-economic cohesion and legitimacy concerns.

Design/methodology/approach

The authors collect indications from two stylized examples, prisons and defense, to develop propositions as a step toward assessing the potential role of hybrids as alternatives to direct public provision or full privatization in the delivery of critical services.

Findings

This paper examines the conditions under which hybrid arrangements outperform the polar cases of public bureaus and full privatization in the delivery of a specific subset of public goods that the authors identify as “critical services”.

Originality/value

The authors suggest that there might be comparative advantages in relying on hybrid arrangements rather than the usual solutions of fully private or fully governmental provision. However, they also submit that these advantages are conditional to the capacity of hybrids to reconcile competing interests to achieve socio-economic cohesion, to combine capabilities dispersed among partners to benefit from positive externalities and to satisfy legitimacy concerns with respect to the role of government.

Details

RAUSP Management Journal, vol. 54 no. 3
Type: Research Article
ISSN: 2531-0488

Keywords

Article
Publication date: 4 December 2017

Elvira Kaneberg

The purpose of this paper is to analyse supply chain network management (SCNM) in the context of emergency preparedness management (EPM). The results of this study revealed that…

Abstract

Purpose

The purpose of this paper is to analyse supply chain network management (SCNM) in the context of emergency preparedness management (EPM). The results of this study revealed that civil-military relations are essential for EPM to function as a coordinated approach to safety and security, and are necessary to respond effectively to complex emergencies and mitigating threats to developed countries. Civil-military relations are still a concern in the context of communication, the exercise of authority, and the coordination of emergency supplies (ES) to emergency operations.

Design/methodology/approach

This qualitative study is based on field observations, with attention focused on the EPM of Sweden, Finland, and Poland. The analysis of a broader SCNM through EPM was supported by semi-structured interviews among civil-military actors in Sweden, information collected from informal conversations known as “hanging out”, and secondary materials. Empirically, the analysis included a variety of civil-military relationships and identified implications for management, policy, and planning that are applicable to developed countries.

Findings

The management of civil-military relations is a meaningful resource when used as an overall approach for safety and security. The integration of civil-military relations in EPM in the planning of ES is a long-standing and complex matter. The management of Swedish civil-military relations in EPM is recognising that implications for management are imbedded in continuous policy changes in, for example, the Swedish policy history. Civil-military relational complications that arise in the field of operations are impossible to anticipate during emergency planning, as those complications are grounded in policy changes.

Originality/value

Escalating threats to developed countries are highlighted. The study underlines the primary measures used in studying military involvement in EPM. An understanding of SCNM as a choice for management can be obtained in future research that focuses on a broader role of the military in EPM. Sweden has emphasised a clearer role for the military by reactivating total defence planning and by evolving common practices and processes with civil actors in civil defence. Meanwhile, Poland and Finland are increasing their focus on supporting the management of civil-military policies on safety and security regarding communication, authority, and developing coordination. Consistent with findings from previous reports on SCNM, civil-military relations are essential for EPM. This study confirmed the importance of civil-military coordination, the management and practice of authority, and shared forms of communication.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 7 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Book part
Publication date: 7 May 2019

Aleksandra Kuczyńska-Zonik and Agata Tatarenko

The objective of this chapter is to outline the problem of information security in Russia and Central and Eastern European (CEE) countries since 2000. It demonstrates the…

Abstract

The objective of this chapter is to outline the problem of information security in Russia and Central and Eastern European (CEE) countries since 2000. It demonstrates the specifics of Russian propaganda in the CEE, which visibly poses a security threat to those countries. To address this issue, the authors present the evolution of Russian information policy, propaganda, its tools and instruments (traditional and social media), and examine the mechanisms of exerting social influence used in practice in the CEE countries. The authors discuss the implications of Russia’s information war with the West and for the CEE states’ domestic problems, which provide vast opportunities for Russian activity in the region. Changes in information policy and information management are bound to a revision of Russian foreign policy. The authors assumed that the information war in the CEE is not directed toward the countries of this region but rather aims to weaken the West, especially the European Union. Moreover, there is a need to speak out about the rise of populism and extremist movements exploited through Russian media influence to undermine regional stability and weaken state authorities. Additionally, it is suggested more attention should be paid to education and public awareness. The lack of new media literacy skills, together with the combination of populism and pro-Russia business links in the CEE states, will increase their vulnerabilities to more risks than information security.

Expert briefing
Publication date: 30 March 2023

Critical infrastructure is an attractive target, given the difficulty of attributing such attacks and the lack of immediate fatalities, which reduces the likelihood of escalation…

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 10 of over 8000