Search results
21 – 30 of over 37000This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring…
Abstract
Purpose
This study aims to analyze the impact of Arab Revolution on the Arabian Gulf security by applying on Yemeni Revolution. This can be achieved by analyzing the threat of Arab Spring Revolutions to the national security of the Gulf Cooperation Council (GCC) countries after the breakout of demonstrations and protests in some of the member states. In addition to its analysis of threat of the Regional Security of the Gulf as a result of Yemeni Revolution and Civil War and Iranian intervention to support Houthis within light of regional anarchy and security competition according to the Neorealism and how the GCC Countries face such threats.
Design/methodology/approach
The study depended on the historical methodology to track the developments of some events related to the Gulf Security and crisis in Yemen. Moreover, it used the analytical approach to analyze the impact of Arab Revolutions and Yemeni Civil War on the Arab Gulf Security. In addition, it depended on the realistic approach to explain the security state at the national and regional level of the Arab Gulf countries within light of regional anarchy, security competition and Iranian support to Houthis “Non-State Actors” (Kenneth Waltz), as well as the offensive realism (John Mearsheimer).
Findings
The Arab Revolutions had an effect on the national security of GCC countries according to the Neorealism due to the breakout of demonstrations and protests in Saudi Arabia, Kuwait and Sultanate of Oman which reached to the degree of threatening the existence of the state as in Bahrain. The Gulf Regional Security is influenced by Revolution and Civil War in Yemen as a result of that Iranian support to Houthis within light of security competition between Iran and Saudi Arabia, leading to the threat of the Arabian Gulf Security as Yemen is the southern gate to the GCC Countries and having joint borders with Saudi Arabia and Sultanate of Oman. Moreover, the GCC countries dealt with that threat individually, such as, performing internal reforms, or collectively through using military force, such as Bahrain and Yemen (Offensive Realism).
Originality/value
This study is an introduction to explain the Arab Spring Revolutions, conflict in Yemen and its threat to the Arab Gulf Security according to the Neorealism based on that the GCC countries sought to keep its existence and sovereignty in confrontation to the demonstrations and internal protests and to keep the regional security in confrontation to the threats of neighboring countries such as the Civil War in Yemen and the Iranian Support to Houthis in light of the regional anarchy.
Details
Keywords
During the period 1962-2001 (9/11), the author identified 25 terrorist acts in the English-speaking Caribbean. Apart from US action in Grenada in 1983, the extra-regional response…
Abstract
During the period 1962-2001 (9/11), the author identified 25 terrorist acts in the English-speaking Caribbean. Apart from US action in Grenada in 1983, the extra-regional response to these acts was minimal. However, in the aftermath of 9/11, the US has introduced a number of counter-terrorist measures into the region from Washington through such agencies as Southcom, the FBI, the DEA, and the Department of Homeland Security, now including the Coast Guard, to forestall future acts of terrorism. Also the UN, the OAS, and the CARICOM, at the instigation of the US, have encouraged Caribbean nations to adopt resolutions and pass anti-terrorist legislation at the local level in the fight against terrorism. US policy toward the region is based on its own self-interest since it considers the Caribbean its “Third Border,” one that is difficult to close to security threats. In all of this, the Caribbean nations welcome the security, more so because of the incidental protection it offers to their fragile tourist-dependent economies that are sensitive to political and other threats. This coincidence of interest has seen the US merge drug-trafficking and terrorism into one consolidated threat. Traditionally, the Caribbean region has not allocated a large part of its budget to security concerns, but with external assistance, particularly from the US, the region's police and military forces have been called upon to adapt to the global threats of the post-9/11 era by strengthening operational capacity, mission readiness, and intensify regional cooperation. This new thrust also includes making border tightening security measures more comprehensive and robust as well as the sharing of information, including intelligence. As long as the US perceives the terrorist threat a priority, Caribbean security policy will continue apace.
Forough Nasirpouri Shadbad and David Biros
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional…
Abstract
Since the emergence of the Internet in the twentieth century and the rapid growth of different types of information technologies (IT), our lives, either personal or professional, have become digitised. Adoption and diffusion of IT enhance individuals and organisational performance, yet scholars discovered a dual nature of IT in which IT usage may have negative aspects too. First, the inability to cope with IT in a healthy manner creates stress in users, termed technostress. Second, digitisation and adoption of new technologies (e.g. IoT and multi-cloud environments) have increased vulnerabilities to information security (InfoSec) threats. Although organisations utilise counteraction strategies (e.g., security systems, security policies), end-users remain the top source of security incidents. Existing behavioural research has approached technostress and InfoSec independently. However, it is not clear how technology-stressors influence employees’ security-related behaviours. This chapter reviews the interaction effect of these concepts in detail by proposing a conceptual model that explains that technostress is the main reason for employees’ non-compliance with security policies in which users with high-level perceptions of technostress are more likely to violate InfoSec policies. Counteraction strategies to mitigate technostress and security threats are also discussed.
Details
Keywords
Border security is a crucial part of the country’s broader homeland security efforts. It is a multifaceted and complex issue which attempts to accomplish two seemingly…
Abstract
Border security is a crucial part of the country’s broader homeland security efforts. It is a multifaceted and complex issue which attempts to accomplish two seemingly contradictory objectives – the prevention of people and goods from entering the country, while at the same time, facilitating lawful travel and trade. Although it is primarily a federal responsibility, securing the border crosses over multiple homeland security domains, as well jurisdictions. In recent years, numerous strategies and structures have been implemented to foster a whole-of-government approach to border security. This chapter presents border security in the larger context of homeland security. It examines the strategies and coordinating structures developed to create a secured border and an overview of the interaction of law enforcement agencies at the various jurisdictional levels. Although these structures create a robust network of mutually supportive agencies to effectuate border security, a major strategic challenge to securing the nation’s borders still persists.
Details
Keywords
Kai S. Koong, Mohammad I. Merhi and Jun Sun
The purpose of this study is to find out whether efforts to improve the information security of government agencies and homeland information security have paid off and also…
Abstract
Purpose
The purpose of this study is to find out whether efforts to improve the information security of government agencies and homeland information security have paid off and also different incentives (internal/external) impact s on the improvement of information security of the government agencies?
Design/methodology/approach
This study examines the information security status of 24 federal agencies in the USA over the period 2002 through 2007 using latent growth modeling. The information security status of these agencies was tracked with the grades revealed in the Federal Computer Security Report Cards. In addition, the number of employees (internal threat incentives) and budgets incentives of federal agencies were gathered from the agencies and other governmental websites for the same period of time.
Findings
Results indicated that high critical‐information agencies even though they have an overall low performance in information security, they are performing better than the low critical‐information agencies regarding solving external threats. Results also revealed that whereas agencies have generally paid more attention to information security over the years, their performances are more pertinent to change in budget incentives than other incentives.
Research limitations/implications
The outcomes reported are confined to the data presented by the Federal Computer Security Report Cards. Another limitation is the number of employees that counts the total number of employees in the agencies whether they are related to the systems of the agencies or not. Finally, using a time‐lag analysis of budget to predict the current security score would be more straightforward, but this could not be applied in this study due to the insufficient sample size, as “the House Committee on Oversight and Government Reform” no longer released the report cards after 2007.
Practical implications
The results should be of interest for the federal agencies that are included in this study, as well as for the organizations that are responsible for the information security of government agencies at different levels. Policy makers, IT managers, software developers and security specialists can also use the outcomes reported in this study for the better decision making that can enhance the information security in the public sector. The theoretical and methodological framework used in this study may also contribute to the current literature of homeland information security incentives and be helpful for future studies on its critical success factors.
Originality/value
This study examines fundamental issues that have not yet to be established. To our knowledge, this is the first study that assesses different incentives that have an effect on the Federal agencies' information security performance because of the lack of data in this domain. Also, the statistical techniques used to test the research propositions fit the objective of the study. Not only this, but the results found in this research assure the importance of one of the incentives that has been identified in the literature as a crucial element that affects the information security performance of the organizations.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Thomas Stafford, George Deitz and Yaojie Li
The purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the…
Abstract
Purpose
The purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the workplace, with specific focus on the role of non-malicious insiders who unknowingly or innocuously thwart corporate information security (IS) directives by engaging in unsafe computing practices. The ameliorative effects of auditor-identified training and motivational programs to emphasize pro-security behaviors are explored.
Design/methodology/approach
This study applies qualitative case analysis of technology user security perceptions combined with interpretive analysis of depth interviews with auditors to examine and explain the rubrics of non-malicious technology user behaviors in violation of cybersecurity directives, to determine the ways in which auditors can best assist management in overcoming the problems associated with security complacency among users.
Findings
Enterprise risk management benefits from audits that identify technology users who either feel invulnerable to cyber threats and exploits or feel that workplace exigencies augur for expedient workarounds of formal cybersecurity policies.
Research limitations/implications
Implications for consideration of CyberComplacency and Cybersecurity Loafing expand the insider threat perspective beyond the traditional malicious insider perspective.
Practical implications
Implications for consideration of CyberComplacency and Cybersecurity Loafing include broadened perspectives for the consultative role of IS audit in the firm.
Social implications
CyberComplacency is a practice that has great potential for harm in all walks of life. A better understanding of these potential harms is beneficial.
Originality/value
This study is the first to characterize CyberComplacency as computer users who feel they operate invulnerable platforms and are subsequently motivated to engage in less cybersecurity diligence than the company would desire. This study is also the first to characterize the notion of Cybersecurity Loafing to describe technically competent workers who take unauthorized but expedient steps around certain security polices in the name of workgroup efficiency.
Details
Keywords
– This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.
Abstract
Purpose
This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.
Design/methodology/approach
A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems.
Findings
The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft.
Research limitations/implications
Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future.
Practical implications
Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement.
Social implications
Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk.
Originality/value
The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.
Details
Keywords
Sissel Haugdal Jore, Inger-Lise Førland Utland and Victoria Hell Vatnamo
Despite the common focus on studying future events, the study of risk management and foresight have developed as two segmented scientific fields. This study aims to investigate…
Abstract
Purpose
Despite the common focus on studying future events, the study of risk management and foresight have developed as two segmented scientific fields. This study aims to investigate whether current risk management methodology is sufficient for long-term planning against threats from terrorism and other black swan events, and whether perspectives from foresight studies can contribute to more effective long-term security planning.
Design/methodology/approach
This study investigates the planning process of the rebuilding of the Norwegian Government Complex destroyed during a terrorist attack in 2011. The study examines whether security risk managers find current security risk management methodology sufficient for dealing with long-term security threats to the Norwegian Government Complex.
Findings
Current security risk management methodology for long-term security planning is insufficient to capture black swan events. Foresight perspectives could contribute by engaging tools to mitigate the risk of these events. This could lead to more robust security planning.
Originality/value
The main contribution of this paper is to investigate whether perspectives and methodology from foresight studies can improve current security risk management methodology for long-term planning and look for cross-fertilization between foresight and risk studies. A framework for scenario development based on security risk management methodology and foresight methodology is proposed that can help bridge the gap.
Details
Keywords
The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…
Abstract
Purpose
The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data.
Design/methodology/approach
This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.
Findings
The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey).
Originality/value
It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.
Details