Search results

1 – 10 of over 53000
Article
Publication date: 30 August 2021

Pernille H. Christensen

Between 2013 and 2016 Western countries experienced a nearly 600% increase in terrorist attacks. Among the most significant shift in terrorism trends during this time is the…

Abstract

Purpose

Between 2013 and 2016 Western countries experienced a nearly 600% increase in terrorist attacks. Among the most significant shift in terrorism trends during this time is the recent focus on civilians in crowded places as a frequent target. Although crowded places have become critical targets for terrorist attacks, there remains a dearth of research studying crowded places or the built environment practitioner's role in creating crowded places that are as resilient as possible against terrorism.

Design/methodology/approach

This paper presents the results from 33 in-depth, semi-structured, one-hour interviews with property developers, property investors, property managers, security consultants, designers, planners and government/policy officials in Sydney, Canberra and Melbourne, Australia. A purposive, snowball sampling method was used to identify participants in the study.

Findings

This research extends the existing literature base on counterterrorism protective security, a distinctly under-researched component of the terrorism research discourse, by developing a baseline of threat considerations considered during the planning, design and development process. This paper presents the Australian results of a first-of-its-kind international study that connects the planning, design and development of real estate in crowded places with planning for protective counterterrorism, and investigates what, when and how counterterrorism protective security (CTPS) is considered in the development process of crowded places. The findings show that a series of common threats were identified across the stakeholder groups, including development risk, development location/site selection, natural phenomena and human-induced issues.

Research limitations/implications

This research extends the current knowledge base on CTPS and has the potential to influence decision-makers in both the counterterrorism policy landscape and those influential in developing standards for the planning, design, construction and management of real estate assets.

Originality/value

An original contribution of this research is detailing the significant range of threats, impacts of events and organisational influences that exist in informing the real estate development process.

Details

Journal of European Real Estate Research, vol. 15 no. 1
Type: Research Article
ISSN: 1753-9269

Keywords

Article
Publication date: 22 March 2024

Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…

Abstract

Purpose

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.

Design/methodology/approach

The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.

Findings

The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.

Research limitations/implications

Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.

Practical implications

The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.

Social implications

Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.

Originality/value

This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 June 2016

Michelle S. Dojutrek, Samuel Labi and J. Eric Dietz

Transportation project evaluation and prioritization use traditional performance measures including travel time, safety, user costs, economic efficiency and environmental quality…

Abstract

Purpose

Transportation project evaluation and prioritization use traditional performance measures including travel time, safety, user costs, economic efficiency and environmental quality. The project impacts in terms of enhancing the infrastructure resilience or mitigating the consequences of infrastructure damage in the event of disaster occurrence are rarely considered in project evaluation. This paper aims to present a methodology to address this issue so that in prioritizing investments, infrastructure with low security can receive the attention they deserve. Second, the methodology can be used for prioritizing candidate investments from a budget that is dedicated specifically to security enhancement.

Design/methodology/approach

In defining security as the absence of risk of damage from threats due to inherent structural or functional resilience, this paper uses security-related considerations in investment prioritization, thus introducing robustness in such evaluation. As this leads to an increase in the number of performance criteria in the evaluation, the paper adopts a multi-criteria analysis approach. The paper’s methodology quantifies the overall security level for an infrastructure in terms of the threats it faces, its resilience to damage and the consequences in the event of the infrastructure damage.

Findings

The paper demonstrates that it is feasible to develop a security-related measure that can be used as a performance criterion in the evaluation of general transportation projects or projects dedicated specifically toward security improvement. Through a case study, the paper applies the methodology by measuring the risk (and hence, security) of each for multiple infrastructure assets. On the basis of the multiple types of impacts including risk impacts (i.e. increase in security) because of each candidate investment, the paper shows how to prioritize security investments across the multiple infrastructure assets using multi-criteria analysis.

Originality/value

The overall framework consists of the traditional steps in risk management, and the paper’s specific contribution is in the part of the framework that measures the risk. The paper shows how infrastructure security can be quantified and incorporated in the project evaluation process.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 7 no. 3
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 1 October 2006

Maria Karyda, Evangelia Mitrou and Gerald Quirchmayr

This paper seeks to provide an overview of the major technical, organizational and legal issues pertaining to the outsourcing of IS/IT security services.

5884

Abstract

Purpose

This paper seeks to provide an overview of the major technical, organizational and legal issues pertaining to the outsourcing of IS/IT security services.

Design/methodology/approach

The paper uses a combined socio‐technical approach to explore the different aspects of IS/IT security outsourcing and suggests a framework for accommodating security and privacy requirements that arise in outsourcing arrangements.

Findings

Data protection requirements are a decisive factor for IS/IT security outsourcing, not only because they pose restrictions to management, but also because security and privacy concerns are commonly cited among the most important concerns prohibiting organizations from IS/IT outsourcing. New emerging trends such as outsourcing in third countries, pose significant new issues, with regard to meeting data protection requirements.

Originality/value

The paper illustrates the reasons for which the outsourcing of IS/IT security needs to be examined under a different perspective from traditional IS/IT outsourcing. It focuses on the specific issue of personal data protection requirements that must be accommodated, according to the European Union directive.

Details

Information Management & Computer Security, vol. 14 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 11 December 2017

Michael Dickmann and Ashley Helen Watson

The purpose of this paper is to explore the factors which influence individuals to take up international assignments in hostile environments (HEs). Using an intelligent careers…

Abstract

Purpose

The purpose of this paper is to explore the factors which influence individuals to take up international assignments in hostile environments (HEs). Using an intelligent careers (IC) perspective, an expanded framework of expatriation drivers to work in hostile contexts is developed that comprises individual, organizational and location-specific factors. In addition, the understanding of career capital acquisition and transfer is refined.

Design/methodology/approach

A “deviant” case study method to challenge the underlying assumptions of career capital maximization and transfer in global careers is used. To investigate the case, 25 individuals in an international development organization who had to decide whether to work in HEs were interviewed.

Findings

Five insights into decision drivers and career capital effects associated with postings to HEs are presented. These span all three levels of individual, organizational and location-specific decision factors.

Research limitations/implications

Due to the case study approach, the usual limitations of qualitative case-based research with respect to generalizability apply. In the conclusions three theoretical implications for the IC framework with respect to career capital acquisition, utilization and temporal effects are outlined.

Practical implications

A range of practical implications in relation to the selection, talent management, performance and reward approaches as well as repatriation and family considerations in global mobility are explored.

Social implications

The insights help organizations to design global mobility policies for HEs. In addition, individuals and their families benefit from greater clarity of global mobility drivers in the context of high risks.

Originality/value

The drivers of individuals to accept assignments to HEs are under-researched. This paper operationalizes and applies a holistic decision to work abroad framework, expands the literature on of the motivations of individuals and develops valuable insights to nuance the IC framework.

Details

Journal of Global Mobility: The Home of Expatriate Management Research, vol. 5 no. 4
Type: Research Article
ISSN: 2049-8799

Keywords

Article
Publication date: 31 August 2010

Sayed Gholam Hassan Tabatabaei, Amir Vahid Dastjerdi, Wan M.N. Wan Kadir, Suhaimi Ibrahim and Elahe Sarafian

Automated composition of semantic web services has become one of the recent critical issues in today's web environment. Despite the importance of artificial intelligence…

607

Abstract

Purpose

Automated composition of semantic web services has become one of the recent critical issues in today's web environment. Despite the importance of artificial intelligence (AI)‐planning techniques for web service composition, previous works in that area do not address security issues, which is the focus of this paper. The purpose of this paper is to propose an approach to achieve security conscious composition of semantic web services.

Design/methodology/approach

The proposed approach called security conscious composition of semantic web services (SCAIMO) is based on the prior work, i.e. AIMO. The AIMO is an effective approach for web service discovery and composition based on AI‐planning, web service modeling ontology (WSMO), and description logic (DL). In this paper, definitions of secure matchmaking and web service composition are formalized based on DLs. Moreover, security capabilities and constraint types in the proposed SCAIMO framework are presented.

Findings

This paper proposes a secure task matchmaker which is responsible for matching security conscious tasks with operators and methods based on WSMO and DL to support the proposed SCAIMO framework. In addition, the paper implements and evaluates the SCAIMO using a test case and the result shows that the approach can provide an applicable solution.

Originality/value

The key contribution of this paper encompasses the new framework to support security capabilities and constraints during composition of semantic web services as well as the new secure task matchmaker.

Details

International Journal of Web Information Systems, vol. 6 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 28 April 2020

Nicole Jenne

Relations between the People's Republic of China and Latin America have gradually expanded from commerce and finance to cover different aspects of security. The purpose of this…

Abstract

Purpose

Relations between the People's Republic of China and Latin America have gradually expanded from commerce and finance to cover different aspects of security. The purpose of this article is to provide an overview over security cooperation between China and South America. Specifically, it analyses the motivations for security cooperation on both sides and its value added for Sino–South American relations.

Design/methodology/approach

The article describes four dimensions of security cooperation between China and South America: functional cooperation, defence diplomacy, long-term cooperation initiatives and arms sales. For each dimension of security cooperation, the main motivations on the two sides are discussed, together with the value added of security cooperation to the “comprehensive and cooperative partnership” China's policy papers on Latin America and the Caribbean have called for.

Findings

Security and defence considerations have not caused the development of Sino–South American security cooperation. Instead, it were the rapidly growing economic links from the 2000s on that facilitated China's broader political engagement with South America, including in the field of security. There are a number of important motivations that indicate security cooperation between China and South American states will further expand in the future.

Practical implications

Security cooperation should not only be practiced as an end in itself but also serve tangible outcomes to reduce insecurity.

Originality/value

In the context of Sino–Latin American relations, security cooperation has received relatively little attention beyond a comparatively small group of pundits despite the fact that military diplomacy has become increasingly important in bolstering China's growing international profile. This article makes an original contribution in discussing four dimensions of security cooperation between China and South America.

Details

Asian Education and Development Studies, vol. 10 no. 3
Type: Research Article
ISSN: 2046-3162

Keywords

Article
Publication date: 7 September 2015

Robert H. Rosenblum, Susan A. Gault-Brown and Amy B. Caiazza

To provide an overview of the basic model used by many peer-to-peer lending platforms and some of the key peer lending regulatory and structuring considerations under the federal…

1373

Abstract

Purpose

To provide an overview of the basic model used by many peer-to-peer lending platforms and some of the key peer lending regulatory and structuring considerations under the federal securities laws.

Design/methodology/approach

Explains how the basic peer lending model works, how “borrower dependent notes” or “BDNs” may be offered in private placements or less commonly through public offerings, how companies engaged in peer lending are compensated, how sponsors of peer lending programs generally avoid registration as broker-dealers under the Securities Exchange Act of 1934, as investment advisers under the Investment Advisers Act of 1940 and as investment companies under the Investment Company Act of 1940, and how peer lending platforms are structured to take into account the laws that govern online transactions, consumer privacy, and other related issues.

Findings

The authors expect that peer-to-peer lending platforms will continue to mature and evolve, and they expect that the issues discussed in this article will continue to drive their structuring decisions, business models, and regulatory compliance under the federal securities laws.

Originality/value

Practical guidance from experienced financial services lawyers.

Article
Publication date: 19 September 2008

Kevin C. Desouza

The purpose of this paper is to focus on a neglected dimension in strategic sourcing – security.

915

Abstract

Purpose

The purpose of this paper is to focus on a neglected dimension in strategic sourcing – security.

Design/methodology/approach

The paper describes two vignettes which illustrate different kinds of security breaches and discusses securing strategic sourcing efforts.

Findings

The paper points to the need to seriously consider the security dimension in sourcing agreements.

Originality/value

This paper will hopefully raise awareness to the security dimension in the context of strategic sourcing.

Details

Strategic Outsourcing: An International Journal, vol. 1 no. 3
Type: Research Article
ISSN: 1753-8297

Keywords

1 – 10 of over 53000