Search results
1 – 10 of over 13000
Iraqi society has suffered from loss or fragility of human security since 2003. The developmental policies, programs and plans of the successive Iraqi Governments throughout the…
Abstract
Purpose
Iraqi society has suffered from loss or fragility of human security since 2003. The developmental policies, programs and plans of the successive Iraqi Governments throughout the transitional period have not been able to achieve human security, despite the availability of different resources. They have also not prevented or limited the spread of corruption, according to domestic and international reports. Now the country faces a large phenomenon of corruption and the dilemma of human security loss. This study aims to ascertain the nature of the relationship between the phenomenon of corruption and the dilemma of loss or fragility of human security in Iraq since 2003 to learn about the form of this relationship, how the selected variables contribute to the two phenomena and determine the degree of impact of corruption and its dimensions on human security and its components.
Design/methodology/approach
This research uses the social survey methodology of the sample taken from the Iraqi society and benefits from system analysis approach to identify the inputs and outputs of the variables researched. Moreover, the study uses the case study methodology to collect data and information precisely in an in-depth manner to support qualitative and quantitative analysis and clarifies the situation at the macro level of both phenomena.
Findings
Findings show the prevalence of corruption structurally in the Iraqi state and society. The contribution of dimensions and selected indicators in the spread of corruption and lack of human security varies. Findings also underline a strong statistical correlation between the two variables and their reverse relationship. In other words, the more the corruption is, the less the opportunities of human security are. There is also a strong impact of corruption and its dimensions on the conditions of human security factors.
Practical implications
The paper provides profitable findings and recommendations, which can be used by the Iraqi relevant institutions to eliminate corruption, achieve human security and benefit from its indicators in research and development.
Originality/value
The new addition of this research can be represented by linking the two phenomena and trying to build national standards with the capacity to describe, interpret and predict.
Details
Keywords
The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for…
Abstract
Purpose
The purpose of this paper is to clarify the relationship between cybersecurity governance and internet governance and to explore the effects of the current tendency for cybersecurity-related discourse to dominate and change the way we approach the established problems of internet governance.
Design/methodology/approach
The paper demonstrates the centrality of internet connectivity to any definition of cyberspace and to cybersecurity, which clarifies the way internet governance and cybersecurity governance are interdependent. Drawing on classic notions of a security dilemma, the paper also argues for distinguishing between national cybersecurity and societal cybersecurity.
Findings
Major structural features of the governance problem in cybersecurity and internet governance are analogous. Joint production of internet services and cybersecurity makes them heavily interdependent. This means that cybersecurity governance and internet governance models need to be compatible, and the approach we take to one will influence how we approach the other.
Originality/value
The interdependence of cybersecurity governance and internet governance has not been carefully examined before, and the relationship is not well understood. These two strands of thinking about cyberspace governance have not been properly connected. This paper bridges the gap and makes policymakers more aware of the potential tensions between a cybersecurity perspective and an internet governance perspective.
Details
Keywords
Jeffrey P. Kaleta, Jong Seok Lee and Sungjin Yoo
The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and…
Abstract
Purpose
The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and desirable but difficult to use (i.e. difficult to memorize) whereas simple passwords are easy to use, but are insecure and undesirable. Construal level theory (CLT) explains how high vs low construal level causes people to focus on “desirability” vs “feasibility” of an action, which in the research context can translate into the “security” vs “usability” of using passwords.
Design/methodology/approach
The authors conducted a series of three laboratory experiments manipulating people’s construal level and investigating its impact on password use.
Findings
The authors found that people who were induced to think at a high construal level created or showed intention to choose stronger passwords relative to people who were induced to think at a low construal level. Furthermore, this effect was also significantly different from the control group who did not receive any experimental treatment. In addition, the authors found that perspective taking targeted at the desirability of creating a strong password further strengthened the effect of a high construal level on intended password choice.
Originality/value
This research makes several contributions to existing literature on password security. First, this research offers CLT as a theoretical lens to explain an individual’s thinking and behavior concerning online password use. Second, this research offers empirical evidence that a high construal level improves users’ password use, a desirable feature for improved security. Third, this research contributes to the literature on how to apply nudging to influence human behavior toward more desirable, stronger, password use. Finally, our research identifies PT as a factor enhancing the positive effect of a high construal level on online users’ password use.
Details
Keywords
In their original invitation, editors Kaye Schoonhoven and Frank Dobbin urged the contributors to this volume to be substantive and scholarly in their approach to their essays. I…
Abstract
In their original invitation, editors Kaye Schoonhoven and Frank Dobbin urged the contributors to this volume to be substantive and scholarly in their approach to their essays. I have tried to honor their request by summarizing the results of a programmatic line of scholarly inquiry on a thorny academic problem. It is also a problem of enormous and enduring real-world importance: As the world continues to confront divisive and escalating conflicts over how to share increasingly scarce global resources, we need to have a better understanding of when and why people are willing to cooperate to solve such problems.
Peter Robertson, Jingdong Yuan and Harsha Konara Mudiyanselage
The purpose of this paper is to describe how China’s rapid growth and increasing resource dependence have changed its relationship with India and their respective defense…
Abstract
Purpose
The purpose of this paper is to describe how China’s rapid growth and increasing resource dependence have changed its relationship with India and their respective defense strategies. In particular, we consider China's Belt and Road Initiative, India's “Act East” policy and the strategic and economic value of the Indian Ocean and South China Sea regions.
Design/methodology/approach
The authors find no econometric evidence of interactions between China and India’s military spending using a Richardson-Baumol arms race model. Likewise, in a cross-county panel data study of military spending, they find that China’s military spending has no independent effect on military spending in other countries. The authors also show that once wage costs and other sources of military inflation are accounted for, the pattern of real defense spending growth is much less intense than is suggested by nominal data. Nevertheless, they show that China has been undertaking intense military modernization with rapidly rising capital-labor ratios in its defense spending.
Findings
The authors find little evidence of a traditional arms race, but also show that China, and to a lesser extent India, have been realigning their military capabilities to these new security risks while maintaining overall military burden on the economy.
Research limitations/implications
Econometric analysis is limited by data availability and is necessarily historical, whereas the security situation is very fluid and may change in the short term.
Practical implications
The paper identifies factors that are likely to influence China and India's attitudes to defense spending in the coming years.
Social implications
The paper finds that there is not an arms race in the traditional sense but may be an arms race in terms of new technologies and military modernization.
Originality/value
This is a very much underexplored topic in economics. The authors take an interdisciplinary approach showing how economics tools can be used to help understand this important issue in international relations.
Details
Keywords
The purpose of this paper is to describe how China’s approach to a nuclear North Korea has changed and find key variables that explain the changes.
Abstract
Purpose
The purpose of this paper is to describe how China’s approach to a nuclear North Korea has changed and find key variables that explain the changes.
Design/methodology/approach
This paper adopts the traditional qualitative method, referring to different types of reliable and authoritative Chinese and English scholars, books and articles.
Findings
Although China has accumulated distrust of North Korea and reprimanded the regime for its nuclear program, it has never ignored the strategic value or balance – especially vis-à-vis the USA – the neighboring country provides for it. And for that matter, it has been keen to prevent North Korea from bypassing it and getting closer to the USA. With this strategic calculation in mind, China has mostly made gestures in implementing the UN sanctions against North Korea, though not always.
Originality/value
This paper proves that China’s strategic calculation has been a constant key variable that explains its approach toward a nuclear North Korea since the inception of the issue in the early 1990s.
Details
Keywords
Mark A. Harris and Karen P. Patten
This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business…
Abstract
Purpose
This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs.
Design/methodology/approach
This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs.
Findings
This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy.
Practical implications
This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices.
Originality/value
This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.
Details
Keywords
Oluwafemi David Bodunde, Goodluck Tamaramieye Layefa and Joseph Kehinde Fasae
This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.
Abstract
Purpose
This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.
Design/methodology/approach
This paper draws on security and ethical literature, while a multimethod approach consisting of in-depth and focus group interviews was used. Content analysis was also relied upon from the interviews granted by media experts on terrorism, security and ethics.
Findings
Findings revealed that journalists are facing problems in areas of freedom of expression, framing, content selection and personal security. Again, this paper opines that elements of public awareness and issues of relevance also push the media to excessive reporting in which ethics and security must stand to play a restraining role.
Research limitations/implications
The first limitation of this paper is the inability to interview some terrorists and know their reaction to mass media reporting on their activities because nobody is ready to own up that he is a terrorist and to point to an individual as a terrorist is a dangerous phenomenon. Again, not all reporters are ready for interviews because of the fact that they are not prepared for the academic exercise but rather for assignments that can yield fat money such as selling secret information to those who can buy them with huge amounts of money like the politicians.
Practical implications
There is a threat to life on both sides of the government and terrorists. Favoring one side in their report is an offense from another side. There is also a violation of their human rights in freedom of speech as a result of the political situation in Nigeria where the government is faced with insecurity that hinders media from freedom of the press to publish reports. Moreover, where the ethical issue is suppressed, it makes the government unpopular all over the world because of the lack of press freedom.
Originality/value
To the best of the authors’ knowledge, this paper is novel as being the first of its kind where media experts are involved in research attempts on media reporting and violent extremism in relation to security and ethical issues in Nigeria.
Details