Search results

21 – 30 of over 37000
Open Access
Article
Publication date: 4 October 2019

Saleh Zaid Al-Otaibi

This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring…

2979

Abstract

Purpose

This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring Revolutions to the national security of the Gulf Cooperation Council (GCC) countries after the breakout of demonstrations and protests in some of the member states. In addition to its analysis of threat of the Regional Security of the Gulf as a result of Yemeni Revolution and Civil War and Iranian intervention to support Houthis within light of regional anarchy and security competition according to the Neorealism and how the GCC Countries face such threats.

Design/methodology/approach

The study depended on the historical methodology to track the developments of some events related to the Gulf Security and crisis in Yemen. Moreover, it used the analytical approach to analyze the impact of Arab Revolutions and Yemeni Civil War on the Arab Gulf Security. In addition, it depended on the realistic approach to explain the security state at the national and regional level of the Arab Gulf countries within light of regional anarchy, security competition and Iranian support to Houthis “Non-State Actors” (Kenneth Waltz), as well as the offensive realism (John Mearsheimer).

Findings

The Arab Revolutions had an effect on the national security of GCC countries according to the Neorealism due to the breakout of demonstrations and protests in Saudi Arabia, Kuwait and Sultanate of Oman which reached to the degree of threatening the existence of the state as in Bahrain. The Gulf Regional Security is influenced by Revolution and Civil War in Yemen as a result of that Iranian support to Houthis within light of security competition between Iran and Saudi Arabia, leading to the threat of the Arabian Gulf Security as Yemen is the southern gate to the GCC Countries and having joint borders with Saudi Arabia and Sultanate of Oman. Moreover, the GCC countries dealt with that threat individually, such as, performing internal reforms, or collectively through using military force, such as Bahrain and Yemen (Offensive Realism).

Originality/value

This study is an introduction to explain the Arab Spring Revolutions, conflict in Yemen and its threat to the Arab Gulf Security according to the Neorealism based on that the GCC countries sought to keep its existence and sovereignty in confrontation to the demonstrations and internal protests and to keep the regional security in confrontation to the threats of neighboring countries such as the Civil War in Yemen and the Iranian Support to Houthis in light of the regional anarchy.

Details

Review of Economics and Political Science, vol. 5 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Book part
Publication date: 15 October 2008

Dion E. Phillips

During the period 1962-2001 (9/11), the author identified 25 terrorist acts in the English-speaking Caribbean. Apart from US action in Grenada in 1983, the extra-regional response…

Abstract

During the period 1962-2001 (9/11), the author identified 25 terrorist acts in the English-speaking Caribbean. Apart from US action in Grenada in 1983, the extra-regional response to these acts was minimal. However, in the aftermath of 9/11, the US has introduced a number of counter-terrorist measures into the region from Washington through such agencies as Southcom, the FBI, the DEA, and the Department of Homeland Security, now including the Coast Guard, to forestall future acts of terrorism. Also the UN, the OAS, and the CARICOM, at the instigation of the US, have encouraged Caribbean nations to adopt resolutions and pass anti-terrorist legislation at the local level in the fight against terrorism. US policy toward the region is based on its own self-interest since it considers the Caribbean its “Third Border,” one that is difficult to close to security threats. In all of this, the Caribbean nations welcome the security, more so because of the incidental protection it offers to their fragile tourist-dependent economies that are sensitive to political and other threats. This coincidence of interest has seen the US merge drug-trafficking and terrorism into one consolidated threat. Traditionally, the Caribbean region has not allocated a large part of its budget to security concerns, but with external assistance, particularly from the US, the region's police and military forces have been called upon to adapt to the global threats of the post-9/11 era by strengthening operational capacity, mission readiness, and intensify regional cooperation. This new thrust also includes making border tightening security measures more comprehensive and robust as well as the sharing of information, including intelligence. As long as the US perceives the terrorist threat a priority, Caribbean security policy will continue apace.

Details

Armed Forces and Conflict Resolution: Sociological Perspectives
Type: Book
ISBN: 978-1-8485-5122-0

Book part
Publication date: 11 June 2021

Forough Nasirpouri Shadbad and David Biros

Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…

Abstract

Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.

Details

Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress
Type: Book
ISBN: 978-1-83909-812-3

Keywords

Book part
Publication date: 6 September 2021

Robert M. Lawler

Border security is a crucial part of the country’s broader homeland security efforts. It is a multifaceted and complex issue which attempts to accomplish two seemingly…

Abstract

Border security is a crucial part of the country’s broader homeland security efforts. It is a multifaceted and complex issue which attempts to accomplish two seemingly contradictory objectives – the prevention of people and goods from entering the country, while at the same time, facilitating lawful travel and trade. Although it is primarily a federal responsibility, securing the border crosses over multiple homeland security domains, as well jurisdictions. In recent years, numerous strategies and structures have been implemented to foster a whole-of-government approach to border security. This chapter presents border security in the larger context of homeland security. It examines the strategies and coordinating structures developed to create a secured border and an overview of the interaction of law enforcement agencies at the various jurisdictional levels. Although these structures create a robust network of mutually supportive agencies to effectuate border security, a major strategic challenge to securing the nation’s borders still persists.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 12 July 2013

Kai S. Koong, Mohammad I. Merhi and Jun Sun

The purpose of this study is to find out whether efforts to improve the information security of government agencies and homeland information security have paid off and also…

1160

Abstract

Purpose

The purpose of this study is to find out whether efforts to improve the information security of government agencies and homeland information security have paid off and also different incentives (internal/external) impact s on the improvement of information security of the government agencies?

Design/methodology/approach

This study examines the information security status of 24 federal agencies in the USA over the period 2002 through 2007 using latent growth modeling. The information security status of these agencies was tracked with the grades revealed in the Federal Computer Security Report Cards. In addition, the number of employees (internal threat incentives) and budgets incentives of federal agencies were gathered from the agencies and other governmental websites for the same period of time.

Findings

Results indicated that high critical‐information agencies even though they have an overall low performance in information security, they are performing better than the low critical‐information agencies regarding solving external threats. Results also revealed that whereas agencies have generally paid more attention to information security over the years, their performances are more pertinent to change in budget incentives than other incentives.

Research limitations/implications

The outcomes reported are confined to the data presented by the Federal Computer Security Report Cards. Another limitation is the number of employees that counts the total number of employees in the agencies whether they are related to the systems of the agencies or not. Finally, using a time‐lag analysis of budget to predict the current security score would be more straightforward, but this could not be applied in this study due to the insufficient sample size, as “the House Committee on Oversight and Government Reform” no longer released the report cards after 2007.

Practical implications

The results should be of interest for the federal agencies that are included in this study, as well as for the organizations that are responsible for the information security of government agencies at different levels. Policy makers, IT managers, software developers and security specialists can also use the outcomes reported in this study for the better decision making that can enhance the information security in the public sector. The theoretical and methodological framework used in this study may also contribute to the current literature of homeland information security incentives and be helpful for future studies on its critical success factors.

Originality/value

This study examines fundamental issues that have not yet to be established. To our knowledge, this is the first study that assesses different incentives that have an effect on the Federal agencies' information security performance because of the lack of data in this domain. Also, the statistical techniques used to test the research propositions fit the objective of the study. Not only this, but the results found in this research assure the importance of one of the incentives that has been identified in the literature as a crucial element that affects the information security performance of the organizations.

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 7 March 2018

Thomas Stafford, George Deitz and Yaojie Li

The purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the…

3189

Abstract

Purpose

The purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the workplace, with specific focus on the role of non-malicious insiders who unknowingly or innocuously thwart corporate information security (IS) directives by engaging in unsafe computing practices. The ameliorative effects of auditor-identified training and motivational programs to emphasize pro-security behaviors are explored.

Design/methodology/approach

This study applies qualitative case analysis of technology user security perceptions combined with interpretive analysis of depth interviews with auditors to examine and explain the rubrics of non-malicious technology user behaviors in violation of cybersecurity directives, to determine the ways in which auditors can best assist management in overcoming the problems associated with security complacency among users.

Findings

Enterprise risk management benefits from audits that identify technology users who either feel invulnerable to cyber threats and exploits or feel that workplace exigencies augur for expedient workarounds of formal cybersecurity policies.

Research limitations/implications

Implications for consideration of CyberComplacency and Cybersecurity Loafing expand the insider threat perspective beyond the traditional malicious insider perspective.

Practical implications

Implications for consideration of CyberComplacency and Cybersecurity Loafing include broadened perspectives for the consultative role of IS audit in the firm.

Social implications

CyberComplacency is a practice that has great potential for harm in all walks of life. A better understanding of these potential harms is beneficial.

Originality/value

This study is the first to characterize CyberComplacency as computer users who feel they operate invulnerable platforms and are subsequently motivated to engage in less cybersecurity diligence than the company would desire. This study is also the first to characterize the notion of Cybersecurity Loafing to describe technically competent workers who take unauthorized but expedient steps around certain security polices in the name of workgroup efficiency.

Details

Managerial Auditing Journal, vol. 33 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 14 March 2016

Amit Das and Habib Ullah Khan

– This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.

3676

Abstract

Purpose

This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.

Design/methodology/approach

A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems.

Findings

The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft.

Research limitations/implications

Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future.

Practical implications

Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement.

Social implications

Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk.

Originality/value

The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.

Details

Information & Computer Security, vol. 24 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 March 2018

Sissel Haugdal Jore, Inger-Lise Førland Utland and Victoria Hell Vatnamo

Despite the common focus on studying future events, the study of risk management and foresight have developed as two segmented scientific fields. This study aims to investigate…

Abstract

Purpose

Despite the common focus on studying future events, the study of risk management and foresight have developed as two segmented scientific fields. This study aims to investigate whether current risk management methodology is sufficient for long-term planning against threats from terrorism and other black swan events, and whether perspectives from foresight studies can contribute to more effective long-term security planning.

Design/methodology/approach

This study investigates the planning process of the rebuilding of the Norwegian Government Complex destroyed during a terrorist attack in 2011. The study examines whether security risk managers find current security risk management methodology sufficient for dealing with long-term security threats to the Norwegian Government Complex.

Findings

Current security risk management methodology for long-term security planning is insufficient to capture black swan events. Foresight perspectives could contribute by engaging tools to mitigate the risk of these events. This could lead to more robust security planning.

Originality/value

The main contribution of this paper is to investigate whether perspectives and methodology from foresight studies can improve current security risk management methodology for long-term planning and look for cross-fertilization between foresight and risk studies. A framework for scenario development based on security risk management methodology and foresight methodology is proposed that can help bridge the gap.

Details

foresight, vol. 20 no. 1
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 9 November 2015

Abdulrahman Alqahtani

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…

1145

Abstract

Purpose

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data.

Design/methodology/approach

This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Findings

The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey).

Originality/value

It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

21 – 30 of over 37000