Search results

1 – 10 of over 84000
Book part
Publication date: 7 September 2018

Dean Karalekas

The China threat is the first and most obvious answer when it comes to the question of threat perception in Taiwan, but the issue encompasses much more. The ruling elite for years…

Abstract

The China threat is the first and most obvious answer when it comes to the question of threat perception in Taiwan, but the issue encompasses much more. The ruling elite for years considered the subject population a threat, for example, and even the nature and severity of the China threat varies greatly depending on an individual’s identification. How do those who identify as Taiwanese see the consequences of an attack from China? There is a very different threat perception among the Taiwanese population, who view annexation by China in much the same way as their Mainlander counterparts would see annexation by Japan, for example. Persons self-identifying as Taiwanese do not view themselves as being culturally the same as the people across the Taiwan Strait, having grown apart from them (in a cultural sense) over the past 120 years that they have been separated. Moreover, after Taiwan’s long history of being colonized by one alien power after another – from the Dutch and Spanish, to Koxinga, and then the Manchu dynasty; by the Japanese; and finally by the KMT (for being colonized is how many Taiwanese perceive the ROC period) – finally the inhabitants of the island have the opportunity to chart their own future, and enjoy a newfound sovereignty and identity separate from that of any colonizing power: thus the prospect of being colonized by China is anathema, and therefore a much greater existential threat for them than for Mainlanders.

Details

Civil-Military Relations in Taiwan
Type: Book
ISBN: 978-1-78756-482-4

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 1 May 2006

Rita Dalton and Helen Eracleous

This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. It is in two parts. The…

Abstract

This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. It is in two parts. The first part considers the definitions and classification of threats, the prevalence of threat‐making and suggestions for assessment and management. The second part concerns the characteristics of those who threaten and the impact of the threats on the victims, and considers threats as predictors of, and part of, the escalating process which leads to further violence.

Details

The British Journal of Forensic Practice, vol. 8 no. 2
Type: Research Article
ISSN: 1463-6646

Keywords

Article
Publication date: 1 May 2006

Rita Dalton and Helen Eracleous

This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. This is the second of two…

Abstract

This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. This is the second of two parts, and concerns the characteristics of those who threaten and the impact of the threats on the victims. It considers threats as predictors of, and part of, the escalating process which leads to further violence.

Details

The British Journal of Forensic Practice, vol. 8 no. 2
Type: Research Article
ISSN: 1463-6646

Keywords

Article
Publication date: 25 December 2023

Changlong Ma, Yuhui Ge and Heng Zhao

Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they…

Abstract

Purpose

Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they have adopted seemingly conflicting theoretical perspectives to explain how it works. Drawing on ideas from the threat rigidity theory, the authors integrated these perspectives by proposing a contingency model in which the relationships between TMT diversity and adaptive firm performance depend on the matching between the internal context (i.e. overlapping team tenure) and external context (i.e. severity of threat).

Design/methodology/approach

This study sampled 579 Chinese A-share listed companies that have been severely affected by the COVID-19 pandemic, and multilevel linear regression analysis was used to test the hypothesis.

Findings

Results provided support for this hypothesis. Specifically, the interaction between TMT age/tenure diversity and overlapping team tenure is significant only when the severity of threat is high, while the interaction between TMT functional diversity and overlapping team tenure is significant only when the severity of threat is low.

Originality/value

The results of this study provide a comprehensive perspective to predict the performance impact of team diversity and contribute to diversity research and practice.

Details

Journal of Organizational Change Management, vol. 37 no. 1
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 9 January 2024

Almaas Sultana and Rayees Farooq

The purpose of the study is to develop a valid measure of stereotype threat.

Abstract

Purpose

The purpose of the study is to develop a valid measure of stereotype threat.

Design/methodology/approach

A convenience sample of 2,900 respondents from different occupational sectors, including managers, engineers and health-care professionals, was used for the present study. The data were collected from various government and private organizations in North India. The questionnaire survey was administered in three phases. During the first phase, 800 questionnaires were circulated, followed by 1,200 questionnaires in the second phase, and the third phase involves 900 questionnaires. The data were analysed using exploratory factor analysis, confirmatory factor analysis and structural equation modelling.

Findings

The results indicate nine dimensions, namely, occupational identification, occupational stigma consciousness, gender identification, gender stigma consciousness, religion identification, religion stigma consciousness, caste identification, caste stigma consciousness and negative effect of stereotype threat. The study ensures the reliability and validity of the stereotype threat scale. The measure also fulfils the assumptions of nomological validity.

Originality/value

To the best of the authors’ knowledge, the study is the first of its kind to develop and validate the stereotype threat scale adhering to scale development procedures.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Abstract

Details

Multinational Enterprises and Terrorism
Type: Book
ISBN: 978-1-83867-585-1

Book part
Publication date: 6 September 2018

Malcolm D. Holmes

Purpose – Police violence involving minority citizens is a significant problem in the United States. Efforts to explain the disparate treatment of minorities have often relied on…

Abstract

Purpose – Police violence involving minority citizens is a significant problem in the United States. Efforts to explain the disparate treatment of minorities have often relied on structural-level racial threat hypotheses. However, research framed by this macro-level approach fails to consider meso-level characteristics of spatially specified places within cities. The place hypothesis maintains that police see disadvantaged minority neighborhoods as especially threatening and, therefore, use more violence in them. Reconceptualizing the racial threat model to include meso-level characteristics of place is essential to better explain police violence.

Design/methodology/approach – The argument is investigated using literature drawn from quantitative analyses of structural predictors of police violence and qualitative/quantitative studies of the police subculture and police behavior within disadvantaged neighborhoods.

Findings – Research on the effects of city-level racial segregation on police violence supports the place hypothesis that the incidence of police violence is higher in segregated minority neighborhoods. City-level segregation is, however, only a proxy for the degree of concentrated minority disadvantage existing at the meso-level. Community-level studies suggest that the police do see disadvantaged places as especially threatening and use more violence in them. Plausibly, meso-level neighborhood characteristics of cities may prove to be better predictors of the incidence of police violence than are structural-level characteristics in cross-city comparisons.

Originality/value – This analysis builds on structural-level racial threat theories by demonstrating that meso-level characteristics of cities are central to explaining disparities in the use of police violence. A multilevel approach to studying police violence using this analytic framework is proposed.

Details

Homicide and Violent Crime
Type: Book
ISBN: 978-1-78714-876-5

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

1 – 10 of over 84000