Search results

21 – 30 of over 84000
Book part
Publication date: 6 September 2021

Robert M. Lawler

Border security is a crucial part of the country’s broader homeland security efforts. It is a multifaceted and complex issue which attempts to accomplish two seemingly…

Abstract

Border security is a crucial part of the country’s broader homeland security efforts. It is a multifaceted and complex issue which attempts to accomplish two seemingly contradictory objectives – the prevention of people and goods from entering the country, while at the same time, facilitating lawful travel and trade. Although it is primarily a federal responsibility, securing the border crosses over multiple homeland security domains, as well jurisdictions. In recent years, numerous strategies and structures have been implemented to foster a whole-of-government approach to border security. This chapter presents border security in the larger context of homeland security. It examines the strategies and coordinating structures developed to create a secured border and an overview of the interaction of law enforcement agencies at the various jurisdictional levels. Although these structures create a robust network of mutually supportive agencies to effectuate border security, a major strategic challenge to securing the nation’s borders still persists.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 6 July 2020

Vladimir Plotnikov, Yury Nikitin, Maksim Maramygin and Ruslan Ilyasov

The purpose of this paper is to show how institutional conditions affect food security at the national level.

Abstract

Purpose

The purpose of this paper is to show how institutional conditions affect food security at the national level.

Design/methodology/approach

A qualitative research with the usage of the methods of institutional, evolutionary, comparative and retrospective analysis is performed in this paper. During the study, emphasis was placed on the theory of sustainable development, the theory of economic security, the theory of economic systems and the theory of competitive advantages.

Findings

Food security policies can be based on the use of the liberal or conservative paradigm. The liberal paradigm focuses on food supply. The conservative paradigm also considers food independence. The growth of global instability has led to increased use of the conservative paradigm. Within the framework of these paradigms, four alternative models of food security have been proposed: “Pure” market, procurement, distribution, directive. For their selection, the matrix method was used. The combination of market and nonmarket management methods in the production and distribution of food is considered. Each of the models is given a meaningful interpretation, and their strengths and weaknesses are identified, the conditions of applicability and efficiency factors are indicated.

Originality/value

The failure of the authorities to provide the population with access to food is largely determined by institutional factors. The system of national institutions sets limits for food security. The main limitations are: technological, land, labor, infrastructure, cluster, ecological. To overcome them, it is recommended to use the tools of innovative, scientific, technological, migration, financial, investment, cluster, sustainable development and other types of state policies. Institutional shocks that lead to crises have a significant impact on food security. The study, using the example of Russia, shows that effective institutional overcoming of them is possible using the conservative paradigm.

Details

International Journal of Sociology and Social Policy, vol. 41 no. 1/2
Type: Research Article
ISSN: 0144-333X

Keywords

Book part
Publication date: 14 December 2023

Syed Amir Shah and tavis d. jules

After the electoral victory in 2018, the newly formed Pakistan Tehreek-e-Insaf (PTI) government presented its National Education Policy Framework, chalking out its priorities of…

Abstract

After the electoral victory in 2018, the newly formed Pakistan Tehreek-e-Insaf (PTI) government presented its National Education Policy Framework, chalking out its priorities of bringing more than 22 million out-of-school children to schools, improving educational quality, and introducing a uniform education system in the country. However, the government’s grand ambitions, transpired quickly, only to produce a draft of a new unified curriculum in 2020. This chapter investigates the newly formulated Single National Curriculum (SNC) in Pakistan by using the lens of Critical Cultural Political Economy of Education (CCPEE). To understand the endogenous and exogenous factors shaping the SNC, the chapter argues that securitization and neoliberalization are the significant factors informing the development and the production of the new curriculum.

Details

Annual Review of Comparative and International Education 2022
Type: Book
ISBN: 978-1-83797-484-9

Keywords

Book part
Publication date: 6 September 2021

Chris D. Bertram

Successful National Security Special Events (NSSE) have several critical components that will ensure success; one key component is collaboration among various and distinctive…

Abstract

Successful National Security Special Events (NSSE) have several critical components that will ensure success; one key component is collaboration among various and distinctive organizations. During the 2002 Winter Olympics in Salt Lake City, Utah, 11,000 public safety officers came together from federal, state, and local agencies and successfully protected the games. In subsequent years following the 9/11 terror attacks and the Olympic Games, however, law enforcement and public safety agencies at every level have, at times, struggled to successfully implement collaborations on a continuing and consistent basis.

Creating collaborations that endure throughout a national security event is an important issue for public safety organizations. What are the key factors that foster an environment in which collaborations can be sustained? Based on research and numerous interviews with law enforcement and public safety leaders involved in the 2002 Winter Olympics, several factors were identified that impact the effectiveness and endurance of collaborations. The enablers for effective collaborations before, during, and after the 2002 Winter Olympics included leadership, trust, social capital, and felt need.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 12 March 2018

Rashmi Anand, Sanjay Medhavi, Vivek Soni, Charru Malhotra and D.K. Banwet

Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of…

1176

Abstract

Purpose

Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of information security and implementation of IT policy which supports e-Governance in a focused approach of Mission Mode. In this context, there is a need to assess situation of the programme which covers a study of initiatives and actions taken by various actor involved and processes which are responsible for overall e-Governance. Therefore, the purpose of this case study is to develop a Situation-Actor-Process (SAP), Learning-Action-Performance (LAP) based inquiry model to synthesize situation of information security governance, IT policy and overall e-Governance.

Design/methodology/approach

In this case study both systematic inquiry and matrices based SAP-LAP models are developed. Actors are classified who are found responsible and engaged in IT policy framing, infrastructure development and also in e-Governance implementation. Based on a synthesis of SAP components, various LAP elements were then synthesized then which further led to learning from the case study. Suitable actions and performance have also been highlighted, followed by a statement of the impact of the efficacy i.e. transformation of information security, policy and e-Governance on the Digital India programme.

Findings

On developing the SAP-LAP framework, it was found that actors like the Ministry of Electronics and Information Technology of the Govt. of India secures a higher rank in implementing various initiatives and central sector schemes to accelerate the agenda of e-Governance. Actions of other preferred actors include more investments in IT infrastructure, policy development and a mechanism to address cyber security threats for effective implementation of e-Governance. It was found that actors should be pro-active on enhancing technical skills, capacity building and imparting education related to ICT applications and e-Governance. Decision making should be based on the sustainable management practices of e-Governance projects implementation to manage change, policy making and the governmental process of the Indian administration and also to achieve Sustainable Development Goals by the Indian economy.

Research limitations/implications

The SAP-LAP synthesis is used to develop the case study. However, few other qualitative and quantitative multi criteria decision making approaches could also be explored for the development of IT security based e-Governance framework in the Indian context.

Practical implications

The synthesis of SAP leads to LAP components which can bridge the gaps between information security, IT policy governance and e-Governance process. Based on the learning from the Situation, it is said that the case study can provide decision making support and has impact on the e-Governance process i.e. may enhance awareness about e-services available to the general public. Such work is required to assess the transparency and accountability on the Government.

Social implications

Learning based on the SAP-LAP framework could provide decision making support to the administrators, policy makers and IT sector stakeholders. Thus, the case study would further help in addressing the research gaps, accelerating e-Governance initiatives and in capturing cyber threats.

Originality/value

The SAP-LAP model is found as an intuitive approach to analyze the present status of information security governance, IT policy and e-Governance in India in a single unitary model.

Details

Information & Computer Security, vol. 26 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 April 2020

Abhilash Panda and Andrew Bower

The purpose of this paper is to concentrate on the place of cyber security risk in the framework of global commitments adopted in 2015 to reduce disaster risks in an all-hazards…

Abstract

Purpose

The purpose of this paper is to concentrate on the place of cyber security risk in the framework of global commitments adopted in 2015 to reduce disaster risks in an all-hazards approach. It explores the correlations between traditional risks associated with critical infrastructures – as understood by the Sendai framework – cyber security risks and the cascading effects characteristic of today’s complex and interrelated shocks and stresses. It takes a step further, expanding the focus of traditionally understood technological risks to explore cyber security risks, at the heart of our societies’ digital transformations,and showcase opportunities from the European context.

Design/methodology/approach

By reviewing existing literature on cyber security, disaster resilience and cascading disasters, this paper highlights current challenges and good practices undertaken by various governments.

Findings

Understanding disaster risks is a precondition to improving the mitigation of impacts of existing risks and preventing new risks. Effective risk reduction relies on a solid understanding of losses resulting from events to inform future actions, and on the assessment of risks relying on a robust evidence base and state-of-the-art scientific capacity to model and simulate potential hazards. In this context, embedding cyber security risks, and the complexity of cascading impacts in improving the understanding of disaster risks, calls for appropriate methods and tools allowing for a multi-risk and holistic focus to the assessment of risks and the planning of risk management capacities that follow.

Research limitations/implications

Globally and in Europe, focus on interconnected risk and their impacts is steadily increasing. Risk assessments are still conservative; incorporation of cyber resilience into national and local level DRR plans is yet not visible.

Originality/value

Existing research is restricted to cyber security and disaster resilience, as separated subjects. This paper, for the first time, brings together the interconnection between the two topic options to address them.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 11 no. 4
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 1 March 1988

Jim Dray

Computer users face fundamentally new levels of risks in information security because of increased use of networks, increased computer literacy, an explosion in microcomputer use…

Abstract

Computer users face fundamentally new levels of risks in information security because of increased use of networks, increased computer literacy, an explosion in microcomputer use and decentralized data processing capabilities, and increased dependency on information technology overall. Realizing this fact is considerably easier than taking action to ease these risks, for computer security is fraught with hidden problems and contradictions. For example, while teenaged hackers have brought computer security and crime to the attention of policymakers and the public, most systems can be protected from hackers rather easily. The abuse of computer systems by those authorized to use them, as well as such mundane issues as protection from operator errors and natural or man‐made disasters, are more difficult problems. The Federal Government's experience in this area provides a number of lessons that are applicable to the private sector as well.

Details

Office Technology and People, vol. 4 no. 3
Type: Research Article
ISSN: 0167-5710

Abstract

Details

Unfunded Pension Systems: Ageing and Variance
Type: Book
ISBN: 978-0-44451-732-6

Book part
Publication date: 2 December 2019

Hadar Glottman

This chapter attempts to uncover the decision code of Vladimir Vladimirovich Putin, based on 12 decisions he made concerning the Middle East during his third term as president…

Abstract

This chapter attempts to uncover the decision code of Vladimir Vladimirovich Putin, based on 12 decisions he made concerning the Middle East during his third term as president, from 2012 until October 2015.

The study was carried out to understand Putin’s line of thought and decision-making, in light of Putin’s increasing importance throughout the last decade, globally and in the Middle East, in particular. After understanding the decision calculus of Putin, it might also be possible to predict his future decisions concerning the region.

Decision rules can be inferred by analyzing a set of decisions. Analysis of such decisions is made in this chapter using the Applied Decision Analysis (ADA) method that uncovers historic decisions, and aims to peer into the mind of the decision-maker.

The results show the main decision rule for each of Putin’s decisions. The work proves that when it comes to foreign issues, the decision code which leads Putin in his decisions is rational. The results also reveal Putin’s strong desire to promote Russia and himself, while using holistic, maximizing, and compensatory processing, as long as his political survival is not compromised.

Details

How Do Leaders Make Decisions?
Type: Book
ISBN: 978-1-83867-812-8

Keywords

Article
Publication date: 18 May 2020

Konstantin Vodenko, Valentina I. Rodionova, Lyudmila A. Shvachkina and Maria P. Tikhonovskova

The purpose of this paper is to develop a model of management of cultural security of Russian society.

Abstract

Purpose

The purpose of this paper is to develop a model of management of cultural security of Russian society.

Design/methodology/approach

The methodological foundation of this research consists in comprehensive approach and activity approach, which make it possible to comprehend specific aspects of cultural security management as an element of the national security system. The research uses a riskologic approach, which reveals the nature of modern risks and threats to cultural security in the information society. A constructivist approach is used, from the perspective of which the interaction between cultural identity and historical memory of society is analyzed.

Findings

It has been found that historical memory is one of the factors that are able to ensure cultural security of society in the context of threats associated with the processes of cultural intervention, current geopolitical confrontation, during which information and psychological methods of destructive influence on the cultural identity of peoples are abundantly used. Therefore, in the system for managing cultural security of society, one should use a historical memory resource aimed at preserving the cultural identity of the people and transmitting it to the coming generations.

Originality/value

It has been substantiated that the growing geopolitical confrontation in the world and the crisis state of the spiritual realm of Russian society bring up the question of state responsibility for the cultural situation and the need to implement an effective national cultural policy. It has been established that only through the reliance on the cultural factor, crisis phenomena can be overcome and social stability and civil society consolidation can be achieved. The role of historical memory in the preservation of cultural identity of the people and ensuring cultural security of Russian society in the context of external and internal threats has been identified. In order to preserve and transmit historical memory, one should use all the structures responsible for the process of socialization of an individual: family, educational system, mass media, cultural establishments and leisure industry.

Details

International Journal of Sociology and Social Policy, vol. 41 no. 1/2
Type: Research Article
ISSN: 0144-333X

Keywords

21 – 30 of over 84000