Search results

1 – 10 of over 13000

Abstract

Details

Environmental Security in Greece
Type: Book
ISBN: 978-1-80071-360-4

Open Access
Article
Publication date: 13 May 2020

Ahmed Mohamed Hassan

Iraqi society has suffered from loss or fragility of human security since 2003. The developmental policies, programs and plans of the successive Iraqi Governments throughout the…

4748

Abstract

Purpose

Iraqi society has suffered from loss or fragility of human security since 2003. The developmental policies, programs and plans of the successive Iraqi Governments throughout the transitional period have not been able to achieve human security, despite the availability of different resources. They have also not prevented or limited the spread of corruption, according to domestic and international reports. Now the country faces a large phenomenon of corruption and the dilemma of human security loss. This study aims to ascertain the nature of the relationship between the phenomenon of corruption and the dilemma of loss or fragility of human security in Iraq since 2003 to learn about the form of this relationship, how the selected variables contribute to the two phenomena and determine the degree of impact of corruption and its dimensions on human security and its components.

Design/methodology/approach

This research uses the social survey methodology of the sample taken from the Iraqi society and benefits from system analysis approach to identify the inputs and outputs of the variables researched. Moreover, the study uses the case study methodology to collect data and information precisely in an in-depth manner to support qualitative and quantitative analysis and clarifies the situation at the macro level of both phenomena.

Findings

Findings show the prevalence of corruption structurally in the Iraqi state and society. The contribution of dimensions and selected indicators in the spread of corruption and lack of human security varies. Findings also underline a strong statistical correlation between the two variables and their reverse relationship. In other words, the more the corruption is, the less the opportunities of human security are. There is also a strong impact of corruption and its dimensions on the conditions of human security factors.

Practical implications

The paper provides profitable findings and recommendations, which can be used by the Iraqi relevant institutions to eliminate corruption, achieve human security and benefit from its indicators in research and development.

Originality/value

The new addition of this research can be represented by linking the two phenomena and trying to build national standards with the capacity to describe, interpret and predict.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 11 September 2017

Milton Mueller

The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for…

1708

Abstract

Purpose

The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for cybersecurity-related discourse to dominate and change the way we approach the established problems of internet governance.

Design/methodology/approach

The paper demonstrates the centrality of internet connectivity to any definition of cyberspace and to cybersecurity, which clarifies the way internet governance and cybersecurity governance are interdependent. Drawing on classic notions of a security dilemma, the paper also argues for distinguishing between national cybersecurity and societal cybersecurity.

Findings

Major structural features of the governance problem in cybersecurity and internet governance are analogous. Joint production of internet services and cybersecurity makes them heavily interdependent. This means that cybersecurity governance and internet governance models need to be compatible, and the approach we take to one will influence how we approach the other.

Originality/value

The interdependence of cybersecurity governance and internet governance has not been carefully examined before, and the relationship is not well understood. These two strands of thinking about cyberspace governance have not been properly connected. This paper bridges the gap and makes policymakers more aware of the potential tensions between a cybersecurity perspective and an internet governance perspective.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 6 June 2019

Jeffrey P. Kaleta, Jong Seok Lee and Sungjin Yoo

The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and…

1088

Abstract

Purpose

The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and desirable but difficult to use (i.e. difficult to memorize) whereas simple passwords are easy to use, but are insecure and undesirable. Construal level theory (CLT) explains how high vs low construal level causes people to focus on “desirability” vs “feasibility” of an action, which in the research context can translate into the “security” vs “usability” of using passwords.

Design/methodology/approach

The authors conducted a series of three laboratory experiments manipulating people’s construal level and investigating its impact on password use.

Findings

The authors found that people who were induced to think at a high construal level created or showed intention to choose stronger passwords relative to people who were induced to think at a low construal level. Furthermore, this effect was also significantly different from the control group who did not receive any experimental treatment. In addition, the authors found that perspective taking targeted at the desirability of creating a strong password further strengthened the effect of a high construal level on intended password choice.

Originality/value

This research makes several contributions to existing literature on password security. First, this research offers CLT as a theoretical lens to explain an individual’s thinking and behavior concerning online password use. Second, this research offers empirical evidence that a high construal level improves users’ password use, a desirable feature for improved security. Third, this research contributes to the literature on how to apply nudging to influence human behavior toward more desirable, stronger, password use. Finally, our research identifies PT as a factor enhancing the positive effect of a high construal level on online users’ password use.

Book part
Publication date: 25 March 2010

Roderick M. Kramer

In their original invitation, editors Kaye Schoonhoven and Frank Dobbin urged the contributors to this volume to be substantive and scholarly in their approach to their essays. I…

Abstract

In their original invitation, editors Kaye Schoonhoven and Frank Dobbin urged the contributors to this volume to be substantive and scholarly in their approach to their essays. I have tried to honor their request by summarizing the results of a programmatic line of scholarly inquiry on a thorny academic problem. It is also a problem of enormous and enduring real-world importance: As the world continues to confront divisive and escalating conflicts over how to share increasingly scarce global resources, we need to have a better understanding of when and why people are willing to cooperate to solve such problems.

Details

Stanford's Organization Theory Renaissance, 1970–2000
Type: Book
ISBN: 978-1-84950-930-5

Article
Publication date: 31 October 2019

Peter Robertson, Jingdong Yuan and Harsha Konara Mudiyanselage

The purpose of this paper is to describe how China’s rapid growth and increasing resource dependence have changed its relationship with India and their respective defense…

Abstract

Purpose

The purpose of this paper is to describe how China’s rapid growth and increasing resource dependence have changed its relationship with India and their respective defense strategies. In particular, we consider China's Belt and Road Initiative, India's “Act East” policy and the strategic and economic value of the Indian Ocean and South China Sea regions.

Design/methodology/approach

The authors find no econometric evidence of interactions between China and India’s military spending using a Richardson-Baumol arms race model. Likewise, in a cross-county panel data study of military spending, they find that China’s military spending has no independent effect on military spending in other countries. The authors also show that once wage costs and other sources of military inflation are accounted for, the pattern of real defense spending growth is much less intense than is suggested by nominal data. Nevertheless, they show that China has been undertaking intense military modernization with rapidly rising capital-labor ratios in its defense spending.

Findings

The authors find little evidence of a traditional arms race, but also show that China, and to a lesser extent India, have been realigning their military capabilities to these new security risks while maintaining overall military burden on the economy.

Research limitations/implications

Econometric analysis is limited by data availability and is necessarily historical, whereas the security situation is very fluid and may change in the short term.

Practical implications

The paper identifies factors that are likely to influence China and India's attitudes to defense spending in the coming years.

Social implications

The paper finds that there is not an arms race in the traditional sense but may be an arms race in terms of new technologies and military modernization.

Originality/value

This is a very much underexplored topic in economics. The authors take an interdisciplinary approach showing how economics tools can be used to help understand this important issue in international relations.

Details

Indian Growth and Development Review, vol. 13 no. 2
Type: Research Article
ISSN: 1753-8254

Keywords

Article
Publication date: 14 March 2019

Jih-Un Kim

The purpose of this paper is to describe how China’s approach to a nuclear North Korea has changed and find key variables that explain the changes.

Abstract

Purpose

The purpose of this paper is to describe how China’s approach to a nuclear North Korea has changed and find key variables that explain the changes.

Design/methodology/approach

This paper adopts the traditional qualitative method, referring to different types of reliable and authoritative Chinese and English scholars, books and articles.

Findings

Although China has accumulated distrust of North Korea and reprimanded the regime for its nuclear program, it has never ignored the strategic value or balance – especially vis-à-vis the USA – the neighboring country provides for it. And for that matter, it has been keen to prevent North Korea from bypassing it and getting closer to the USA. With this strategic calculation in mind, China has mostly made gestures in implementing the UN sanctions against North Korea, though not always.

Originality/value

This paper proves that China’s strategic calculation has been a constant key variable that explains its approach toward a nuclear North Korea since the inception of the issue in the early 1990s.

Details

Asian Education and Development Studies, vol. 8 no. 3
Type: Research Article
ISSN: 2046-3162

Keywords

Article
Publication date: 4 March 2014

Mark A. Harris and Karen P. Patten

This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business…

8559

Abstract

Purpose

This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs.

Design/methodology/approach

This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs.

Findings

This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy.

Practical implications

This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices.

Originality/value

This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.

Details

Information Management & Computer Security, vol. 22 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Abstract

Details

International Perspectives on Democratization and Peace
Type: Book
ISBN: 978-1-80043-068-6

Article
Publication date: 19 May 2023

Oluwafemi David Bodunde, Goodluck Tamaramieye Layefa and Joseph Kehinde Fasae

This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.

Abstract

Purpose

This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.

Design/methodology/approach

This paper draws on security and ethical literature, while a multimethod approach consisting of in-depth and focus group interviews was used. Content analysis was also relied upon from the interviews granted by media experts on terrorism, security and ethics.

Findings

Findings revealed that journalists are facing problems in areas of freedom of expression, framing, content selection and personal security. Again, this paper opines that elements of public awareness and issues of relevance also push the media to excessive reporting in which ethics and security must stand to play a restraining role.

Research limitations/implications

The first limitation of this paper is the inability to interview some terrorists and know their reaction to mass media reporting on their activities because nobody is ready to own up that he is a terrorist and to point to an individual as a terrorist is a dangerous phenomenon. Again, not all reporters are ready for interviews because of the fact that they are not prepared for the academic exercise but rather for assignments that can yield fat money such as selling secret information to those who can buy them with huge amounts of money like the politicians.

Practical implications

There is a threat to life on both sides of the government and terrorists. Favoring one side in their report is an offense from another side. There is also a violation of their human rights in freedom of speech as a result of the political situation in Nigeria where the government is faced with insecurity that hinders media from freedom of the press to publish reports. Moreover, where the ethical issue is suppressed, it makes the government unpopular all over the world because of the lack of press freedom.

Originality/value

To the best of the authors’ knowledge, this paper is novel as being the first of its kind where media experts are involved in research attempts on media reporting and violent extremism in relation to security and ethical issues in Nigeria.

Details

Journal of Aggression, Conflict and Peace Research, vol. 15 no. 4
Type: Research Article
ISSN: 1759-6599

Keywords

1 – 10 of over 13000