Search results

1 – 10 of 206
Article
Publication date: 3 August 2015

Maria Ela L. Atienza

The purpose of this paper is to look into how people in risky environments define human security by using the framework of the draft human security index of the Third World…

Abstract

Purpose

The purpose of this paper is to look into how people in risky environments define human security by using the framework of the draft human security index of the Third World Studies Center, University of the Philippines to study five municipalities. The concept of human security used here is the comprehensive definition that covers “freedom from fear” and “freedom from want” dimensions but using a more local/bottom-up perspective in getting people’s sense of security and threats/risks. As a pilot research, the paper also reveals the shortcomings of the draft index as it does not highlight yet other factors like gender, ethnicity and other sectoral identities.

Design/methodology/approach

The pilot municipalities all have a history of violent conflicts or insurgency and they also face other security threats/risks, e.g., natural disasters and effects of climate change, limited sources of livelihood, lack of food, water shortage, etc. Through surveys, focus group discussions and interviews, people were asked about their sense of security and experiences, perceived threats to individuals and the community, understanding of human security and their capacity, as individuals and as a community, to cope with and/or do something about these threats. The focus of the manuscript, however, is the more qualitative responses of informants.

Findings

In these conflict areas, poverty and the limited livelihood opportunities are major threats, followed by threats to food, environmental, personal and community security (particularly peace and order). The perceived intensity of certain threats also varies depending on the type of community or group one belongs to. It appears that respondents have a comprehensive view of human security; what they lack are resources and skills to mitigate such threats. Community empowerment and improved local governance are crucial with support from external actors.

Research limitations/implications

It is important to look at the experiences of other areas without histories of armed conflicts to understand possibly different security issues and threats/risks and include perspectives of people based on gender, ethnicity and other identities.

Originality/value

The research shows the value of using local/bottom-up perceptions of people apart from available development and security statistics (which are usually top-down, very general and universalistic) to assess, monitor actual and plan future interventions to address human security threats and vulnerabilities at different levels. The qualitative and quantitative data from the ground are also useful in refining human security-related concepts, hypotheses and theories.

Details

Disaster Prevention and Management, vol. 24 no. 4
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 7 September 2015

Mayank Yuvaraj

– In recent years, a large number of organizations have found that cloud computing has many advantages leading to a surge in its adoption.

2070

Abstract

Purpose

In recent years, a large number of organizations have found that cloud computing has many advantages leading to a surge in its adoption.

Design/methodology/approach

Cloud computing involves the usage of large servers for the access of data, its storage and manipulation as well as provisioning of other services.

Findings

When infrastructure, applications, data and storage are hosted by cloud providers, there are huge security risks associated with each type of service offered.

Originality/value

There are a number of considerations, apart from cost which must be evaluated before choosing any particular provider. Sometimes, the physical location of the servers may also be a factor to consider, if sensitive duty is involved.

Details

Library Hi Tech News, vol. 32 no. 7
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 August 2001

M.T. Chan and L.F. Kwok

Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance…

5060

Abstract

Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance. Non‐functional requirements such as performance added to the system as an after thought would lead to extremely high cost and undesirable effects. Security, rarely regarded in the past as one of the non‐functional requirements, has to be integrated into the software development process due to its impact on e‐commerce systems. In this paper, a design methodology based on systems security engineering capability maturity model (SSE‐CMM) is proposed to specify design details for the three defined processes: risk, engineering and assurance. By means of an object‐oriented security design pattern, security design covering impact, threats, risks and countermeasures for different parts of an e‐commerce system can be examined systematically in the risk process. The proposed software development process for secured systems (SDPSS), representing the engineering process, consists of four steps: object and collaboration modeling, tier identification, component identification and deployment specification. Selected unified modeling language notations and diagrams are used to support the SDPSS. Using a simplified supply‐chain e‐commerce system as an example, integration of security design into the software development process is shown with discussions of possible security assurance activities that can be performed on a design.

Details

Information Management & Computer Security, vol. 9 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 2006

Czesław Mesjasz

To present which properties of social systems can be used in studying and determining their broadly defined security. A core concept of security is to be developed into a typology…

1258

Abstract

Purpose

To present which properties of social systems can be used in studying and determining their broadly defined security. A core concept of security is to be developed into a typology of attributes of security of social systems.

Design/methodology/approach

The interpretation of security has become one of the most important challenges of theory of international relations and of related areas. Unfortunately, theory only follows the processes and provides descriptions and interpretations. Explanations are rare or superficial. Predictions or normative approaches, essential for security considerations, are mainly embedded either in ideological discourse or in common sense conclusions. A broadly defined systems thinking is applied as an instrument allowing for enhancement of methodology of security research in dealing with complex social phenomena.

Findings

It may not be expected that systems thinking could provide all the answers to the questions arising in security theory and policy. At the same time, it can be shown how strongly the discourse on a broadly defined security, not only in international relations, has been influenced by systems thinking.

Research limitations/implications

It is but an introductory survey study and includes omissions and simplifications that have to be explained in detail in further studies.

Practical implications

An introduction to the further research on the links between systems thinking and discourse on broadly defined security of individuals and social systems.

Originality/value

Allows systems specialists to avoid simplifications in understanding social systems and at the same time helps security specialists to avoid abuses and trivialization of systems thinking.

Details

Kybernetes, vol. 35 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 May 1996

Alice Sturgeon

Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have…

3193

Abstract

Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have encouraged its growth. Examines the security threats and vulnerabilities which are inherent in teleworking and assesses the risks associated with employees working on sensitive material from a remote site. Postulates a framework for threat and risk assessment with a generic model, and a specific example using a hypothetical telework situation.

Details

Information Management & Computer Security, vol. 4 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Abstract

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Book part
Publication date: 23 December 2013

Peter Adey

The chapter explores the sustainability of European aeromobility and the socio-technical systems that enable it by examining how certain threats, risk and uncertainties are…

Abstract

Purpose

The chapter explores the sustainability of European aeromobility and the socio-technical systems that enable it by examining how certain threats, risk and uncertainties are managed in European airspace.

Methodology/approach

The chapter examines the discussions around the inception and deployment of methods of ‘crisis management’ to airspace governance and focuses on the importation of particular systems of knowledge, practices and technologies from other contexts.

Findings

The chapter finds that European authorities have installed a combination of capacities involving central and decentralised coordination and decision making – as well as training and simulation – in order to better anticipate and respond to moments of crisis, although the politics of such an arrangement is not unproblematic to the interests of state sovereignty and the airlines’ suspicion of regulation or lack thereof.

Originality/value

The chapter is one of the first to make explicit how ash-cloud crises and disruption to airspace are being governed post the more immediate consequences of the 2010 ash cloud.

Details

Sustainable Aviation Futures
Type: Book
ISBN: 978-1-78190-595-1

Keywords

Article
Publication date: 1 March 2009

Christopher G. Reddick and Howard A. Frank

Survey findings from Florida reveal that larger, higher risk communities perceive greater budgetary trade-offs, a view that supports in part the U.S. Department of Homeland…

Abstract

Survey findings from Florida reveal that larger, higher risk communities perceive greater budgetary trade-offs, a view that supports in part the U.S. Department of Homeland Security’s recently implemented strategy in distributing its grants. Per expectations, city managers with graduate education saw higher levels of readiness and lower threat risk than fire chiefs. Consistent with prior research, cities were reprogramming and using existing funds rather than new levies for homeland security initiatives. This finding was buttressed by results that recently enacted property tax limits and cuts in federal aid were seen as the greatest challenges to increased funding. Contrary to mainstream public administration writing, our respondents stated that restrained funding rather than intergovernmental coordination was the biggest issue they faced in meeting homeland security needs. Overall, our respondents saw a low risk of terror threat, a perception that may represent an accurate read of the operating environment or an implicit belief that higher levels of government will provide significant assistance in the event of a major terrorist attack or other conflagration.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 21 no. 4
Type: Research Article
ISSN: 1096-3367

Book part
Publication date: 22 October 2020

Charis Gerosideris and Ioanna Ferra

The mobilisations against the wildfires in Greece (2007) redefined the notion of environmentalism in the country, and it was one of the first examples which showcased the…

Abstract

The mobilisations against the wildfires in Greece (2007) redefined the notion of environmentalism in the country, and it was one of the first examples which showcased the potential of digital media for protests and resistance in the Greek context. At the same time, the global recession strongly affected the environmental politics and policies applied in Greece, indicating threats, risks and areas of conflict (e.g., privatisation of recourses, water, etc.). Following the environmental protests of 2007, this study provides an insight into the case of #Skouries forest and the antimining protests, focussing on the period 2015–2017. The study developed through the analysis of online data (Twitter) which was collected during the period March 2015 to March 2017 (#skouries). This chapter develops an insight into the online networks, coalitions and dominant actors (SNA) and also investigates the hashtags evolution and discourse (Semantic analysis). The collection and visualisation of the data developed using NodeXL. This case is considered one of the most indicative examples of the Greek environmental movement, as this shaped during the evolution of social media and in the crisis context. As such, this chapter demonstrates that the importance of the use of Twitter for the organisation of the movement, as well as an alternative space for public engagement/debate on climate change and environmental-related issues.

Details

The Emerald Handbook of Digital Media in Greece
Type: Book
ISBN: 978-1-83982-401-2

Keywords

Article
Publication date: 19 June 2007

Lindsay Meredith

This paper seeks to focus more attention on market threat variables, their role in contributing to market risk and how to anticipate them.

4000

Abstract

Purpose

This paper seeks to focus more attention on market threat variables, their role in contributing to market risk and how to anticipate them.

Design/methodology/approach

Selected marketing and economics variables are considered in the context of their potentially dangerous or destructive impacts on business markets. Numerous “real world” examples are used to demonstrate the negative effects of these variables.

Findings

A matrix based on market information levels and lead times is introduced to demonstrate how the threat variables can be classified in terms of their potential risk to the business marketer. The threat variables can then be located on the risk matrix and the degree of their potential danger can be defined.

Originality/value

The discussion should hopefully be of use to both students and practitioners. An “early warning” template is provided to help identify specific variables and their risk potential so that scanning efforts can be prioritized according to the most likely sources of market threats.

Details

Journal of Business & Industrial Marketing, vol. 22 no. 4
Type: Research Article
ISSN: 0885-8624

Keywords

1 – 10 of 206