Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 4 October 2019

Saleh Zaid Al-Otaibi

This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring…

2974

Abstract

Purpose

This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring Revolutions to the national security of the Gulf Cooperation Council (GCC) countries after the breakout of demonstrations and protests in some of the member states. In addition to its analysis of threat of the Regional Security of the Gulf as a result of Yemeni Revolution and Civil War and Iranian intervention to support Houthis within light of regional anarchy and security competition according to the Neorealism and how the GCC Countries face such threats.

Design/methodology/approach

The study depended on the historical methodology to track the developments of some events related to the Gulf Security and crisis in Yemen. Moreover, it used the analytical approach to analyze the impact of Arab Revolutions and Yemeni Civil War on the Arab Gulf Security. In addition, it depended on the realistic approach to explain the security state at the national and regional level of the Arab Gulf countries within light of regional anarchy, security competition and Iranian support to Houthis “Non-State Actors” (Kenneth Waltz), as well as the offensive realism (John Mearsheimer).

Findings

The Arab Revolutions had an effect on the national security of GCC countries according to the Neorealism due to the breakout of demonstrations and protests in Saudi Arabia, Kuwait and Sultanate of Oman which reached to the degree of threatening the existence of the state as in Bahrain. The Gulf Regional Security is influenced by Revolution and Civil War in Yemen as a result of that Iranian support to Houthis within light of security competition between Iran and Saudi Arabia, leading to the threat of the Arabian Gulf Security as Yemen is the southern gate to the GCC Countries and having joint borders with Saudi Arabia and Sultanate of Oman. Moreover, the GCC countries dealt with that threat individually, such as, performing internal reforms, or collectively through using military force, such as Bahrain and Yemen (Offensive Realism).

Originality/value

This study is an introduction to explain the Arab Spring Revolutions, conflict in Yemen and its threat to the Arab Gulf Security according to the Neorealism based on that the GCC countries sought to keep its existence and sovereignty in confrontation to the demonstrations and internal protests and to keep the regional security in confrontation to the threats of neighboring countries such as the Civil War in Yemen and the Iranian Support to Houthis in light of the regional anarchy.

Details

Review of Economics and Political Science, vol. 5 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 20 June 2019

Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li and Guttorm Sindre

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing…

4310

Abstract

Purpose

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between the cyber and physical world, security has become an additional concern in these industries. The purpose of this paper is to evaluate how well bow-tie analysis performs in the context of security, and the study’s hypothesis is that the bow-tie notation has a suitable expressiveness for security and safety.

Design/methodology/approach

This study uses a formal, controlled quasi-experiment on two sample populations – security experts and security graduate students – working on the same case. As a basis for comparison, the authors used a similar experiment with misuse case analysis, a well-known technique for graphical security modelling.

Findings

The results show that the collective group of graduate students, inexperienced in security modelling, perform similarly as security experts in a well-defined scope and familiar target system/situation. The students showed great creativity, covering most of the same threats and consequences as the experts identified and discovering additional ones. One notable difference was that these naïve professionals tend to focus on preventive barriers, leading to requirements for risk mitigation or avoidance, while experienced professionals seem to balance this more with reactive barriers and requirements for incident management.

Originality/value

Our results are useful in areas where we need to evaluate safety and security concerns together, especially for domains that have experience in health, safety and environmental hazards, but now need to expand this with cybersecurity as well.

Details

Information & Computer Security, vol. 27 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 15 July 2019

Elina Haapamäki and Jukka Sihvonen

This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides…

22251

Abstract

Purpose

This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit.

Design/methodology/approach

This is a synthesis paper that summarizes the research literature on cybersecurity, introducing knowledge from the extant research and revealing areas requiring further examination.

Findings

This synthesis identifies a research framework that consists of the following research themes: cybersecurity and information sharing, cybersecurity investments, internal auditing and controls related to cybersecurity, disclosure of cybersecurity activities and security threats and security breaches.

Practical implications

Academics, practitioners and the public would benefit from a research framework that categorizes the research topics related to cybersecurity in the accounting field. This type of analysis is vital to enhance the understanding of the academic research on cybersecurity and can be used to support the identification of new lines for future research.

Originality/value

This is the first literature analysis of cybersecurity in the accounting field, and it has significant implications for research and practice by detailing, for example, the benefits of and obstacles to information sharing. This synthesis also highlights the importance of the model for cybersecurity investments. Further, the review emphasizes the role of internal auditing and controls to improve cybersecurity.

Details

Managerial Auditing Journal, vol. 34 no. 7
Type: Research Article
ISSN: 0268-6902

Keywords

Open Access
Article
Publication date: 5 January 2023

Tadele Shimels and Lemma Lessa

Information systems' security is more critical than ever before since security threats are rapidly growing. Before putting in place information systems' security measures…

2070

Abstract

Purpose

Information systems' security is more critical than ever before since security threats are rapidly growing. Before putting in place information systems' security measures, organizations are required to determine the maturity level of their information security governance. Literature review reveals that there is no recent study on information systems' security maturity level of banks in Ethiopia. This study thus seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators.

Design/methodology/approach

Four private banks are selected as a representative sample. The system security engineering capability maturity model (SSE-CMM) is used as the maturity measurement criteria, and the measurement was based on ISO/IEC 27001 information security control areas. The data for the study were gathered using a questionnaire.

Findings

A total of 93 valid questionnaires were gathered from 110 participants in the study. Based on the SSE-CMM maturity model assessment criteria the private banking industry's current maturity level is level 2 (repeatable but intuitive). Institutions have a pattern that is repeated when completing information security operations but its existence was not thoroughly proven and institutional inconsistency still exists.

Originality/value

This study seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators. This topic has not been attempted previously in the context of Ethiopian financial sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 27 February 2023

Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…

5235

Abstract

Purpose

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.

Design/methodology/approach

Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.

Findings

The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.

Originality/value

This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 23 August 2019

Adnan Alenezi

This study aims to scrutinize and analyze the regional challenges facing Kuwait and their impact on Kuwait’s national security since the outbreak of Arab Spring revolutions in…

4363

Abstract

Purpose

This study aims to scrutinize and analyze the regional challenges facing Kuwait and their impact on Kuwait’s national security since the outbreak of Arab Spring revolutions in 2011. These challenges are as follows: the Iranian threat, the Arab Spring revolutions and the recent Gulf crisis with Qatar.

Design/methodology/approach

The study adopts national interest approach, which focuses on a state’s economic, military and cultural objectives. According to this approach, a state seeks to achieve its own national interests. There are multiple national interests, but the ultimate goal is the survival and security of the state.

Findings

The study concludes that the Gulf countries, including Kuwait, are facing unprecedented challenges as a result of the dire consequences of the Arab Spring revolutions, the control of Houthi group on Yemen’s institutions and the repercussions of negotiations between 5 + 1 group (Russia, China, France, Britain, the USA + German) and Iran on the Iranian nuclear program. These developments are not in the interest of the Gulf countries in general and Kuwait in particular. The study recommends that Kuwait must adopt an external strategy based on achieving the regional balance with the countries of the region and dealing with different challenges according to its national interest.

Originality/value

The importance of the study stems from the fact that the Arab region witnessed many developments at the political, economic and social levels since the outbreak of the Arab Spring revolutions. These developments posed many threats to Arab countries such as the spread of terrorism, religious extremism, terrorist organizations and non-state actors. They also became a key determinant of foreign policy. Kuwait was affected by these developments. In addition, it faces threats affecting its national security such as the Iranian threat, the Arab Spring revolutions and the Gulf crisis with Qatar. The study addresses these threats and how Kuwait, as a small state, has dealt with such enormous ones.

Details

Review of Economics and Political Science, vol. 5 no. 1
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 20 August 2019

Ahmed Elbassoussy

The purpose of this paper is to develop an integrated theoretical framework for energy security concept and to shed light on the policies and strategies applied by the European…

11628

Abstract

Purpose

The purpose of this paper is to develop an integrated theoretical framework for energy security concept and to shed light on the policies and strategies applied by the European Union countries to confront the challenges that faces them.

Design/methodology/approach

The research paper uses Regional Security complexes theory, which mainly developed in Copenhagen school for security studies, that founded by Barry Buzan. This school tried to clarify the untraditional security aspects, through expanding its scope by adding new dimensions than military perspective.

Findings

Despite the consolidated efforts exerted by the European Union to assure safe levels of energy security, and their continuous pursuit to be liberated from Russian energy over dependence, but the results are still limited.

Originality/value

The value of this research paper stems from the fact that it encompass the theoretical aspect by shedding light on all the developments occurred to energy security concept, in addition to the Empirical side, by analyzing various European energy security challenges and their confrontation strategies.

Details

Review of Economics and Political Science, vol. 4 no. 4
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 30 June 2007

Nilufer Oral

The Black Sea region has become as an important energy transit route for Caspian and Russian oil and natural gas to western markets. Since 1996 the quantity of oil exported from…

Abstract

The Black Sea region has become as an important energy transit route for Caspian and Russian oil and natural gas to western markets. Since 1996 the quantity of oil exported from the Black Sea through the Turkish Straits and the number of transiting tankers has doubled and will continue to expand. However, these are also two waterways where the risk of either an accidental or intentional disaster is significant bringing serious repercussions for energy supply security. This paper will analyze measures taken by Black Sea coastal States to provide for secure ports and shipping against accidental and intentional disasters. The paper will examine the role of technology, such as satellite based VTS providers in the Black Sea, implementation of the ISPS Code, the role of the relatively new BlackSeaFor in providing both port and navigational security. The paper will further make recommendations for further improvements for enhancement of security emergency response planning. In addition, the paper will examine current security measures taken by the Turkish Administration for oil transportation through the Turkish Straits.

Details

Journal of International Logistics and Trade, vol. 5 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

1 – 10 of over 1000