Search results
1 – 10 of 206The purpose of this paper is to look into how people in risky environments define human security by using the framework of the draft human security index of the Third World…
Abstract
Purpose
The purpose of this paper is to look into how people in risky environments define human security by using the framework of the draft human security index of the Third World Studies Center, University of the Philippines to study five municipalities. The concept of human security used here is the comprehensive definition that covers “freedom from fear” and “freedom from want” dimensions but using a more local/bottom-up perspective in getting people’s sense of security and threats/risks. As a pilot research, the paper also reveals the shortcomings of the draft index as it does not highlight yet other factors like gender, ethnicity and other sectoral identities.
Design/methodology/approach
The pilot municipalities all have a history of violent conflicts or insurgency and they also face other security threats/risks, e.g., natural disasters and effects of climate change, limited sources of livelihood, lack of food, water shortage, etc. Through surveys, focus group discussions and interviews, people were asked about their sense of security and experiences, perceived threats to individuals and the community, understanding of human security and their capacity, as individuals and as a community, to cope with and/or do something about these threats. The focus of the manuscript, however, is the more qualitative responses of informants.
Findings
In these conflict areas, poverty and the limited livelihood opportunities are major threats, followed by threats to food, environmental, personal and community security (particularly peace and order). The perceived intensity of certain threats also varies depending on the type of community or group one belongs to. It appears that respondents have a comprehensive view of human security; what they lack are resources and skills to mitigate such threats. Community empowerment and improved local governance are crucial with support from external actors.
Research limitations/implications
It is important to look at the experiences of other areas without histories of armed conflicts to understand possibly different security issues and threats/risks and include perspectives of people based on gender, ethnicity and other identities.
Originality/value
The research shows the value of using local/bottom-up perceptions of people apart from available development and security statistics (which are usually top-down, very general and universalistic) to assess, monitor actual and plan future interventions to address human security threats and vulnerabilities at different levels. The qualitative and quantitative data from the ground are also useful in refining human security-related concepts, hypotheses and theories.
Details
Keywords
– In recent years, a large number of organizations have found that cloud computing has many advantages leading to a surge in its adoption.
Abstract
Purpose
In recent years, a large number of organizations have found that cloud computing has many advantages leading to a surge in its adoption.
Design/methodology/approach
Cloud computing involves the usage of large servers for the access of data, its storage and manipulation as well as provisioning of other services.
Findings
When infrastructure, applications, data and storage are hosted by cloud providers, there are huge security risks associated with each type of service offered.
Originality/value
There are a number of considerations, apart from cost which must be evaluated before choosing any particular provider. Sometimes, the physical location of the servers may also be a factor to consider, if sensitive duty is involved.
Details
Keywords
Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance…
Abstract
Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance. Non‐functional requirements such as performance added to the system as an after thought would lead to extremely high cost and undesirable effects. Security, rarely regarded in the past as one of the non‐functional requirements, has to be integrated into the software development process due to its impact on e‐commerce systems. In this paper, a design methodology based on systems security engineering capability maturity model (SSE‐CMM) is proposed to specify design details for the three defined processes: risk, engineering and assurance. By means of an object‐oriented security design pattern, security design covering impact, threats, risks and countermeasures for different parts of an e‐commerce system can be examined systematically in the risk process. The proposed software development process for secured systems (SDPSS), representing the engineering process, consists of four steps: object and collaboration modeling, tier identification, component identification and deployment specification. Selected unified modeling language notations and diagrams are used to support the SDPSS. Using a simplified supply‐chain e‐commerce system as an example, integration of security design into the software development process is shown with discussions of possible security assurance activities that can be performed on a design.
Details
Keywords
To present which properties of social systems can be used in studying and determining their broadly defined security. A core concept of security is to be developed into a typology…
Abstract
Purpose
To present which properties of social systems can be used in studying and determining their broadly defined security. A core concept of security is to be developed into a typology of attributes of security of social systems.
Design/methodology/approach
The interpretation of security has become one of the most important challenges of theory of international relations and of related areas. Unfortunately, theory only follows the processes and provides descriptions and interpretations. Explanations are rare or superficial. Predictions or normative approaches, essential for security considerations, are mainly embedded either in ideological discourse or in common sense conclusions. A broadly defined systems thinking is applied as an instrument allowing for enhancement of methodology of security research in dealing with complex social phenomena.
Findings
It may not be expected that systems thinking could provide all the answers to the questions arising in security theory and policy. At the same time, it can be shown how strongly the discourse on a broadly defined security, not only in international relations, has been influenced by systems thinking.
Research limitations/implications
It is but an introductory survey study and includes omissions and simplifications that have to be explained in detail in further studies.
Practical implications
An introduction to the further research on the links between systems thinking and discourse on broadly defined security of individuals and social systems.
Originality/value
Allows systems specialists to avoid simplifications in understanding social systems and at the same time helps security specialists to avoid abuses and trivialization of systems thinking.
Details
Keywords
Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have…
Abstract
Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have encouraged its growth. Examines the security threats and vulnerabilities which are inherent in teleworking and assesses the risks associated with employees working on sensitive material from a remote site. Postulates a framework for threat and risk assessment with a generic model, and a specific example using a hypothetical telework situation.
Details
Keywords
The chapter explores the sustainability of European aeromobility and the socio-technical systems that enable it by examining how certain threats, risk and uncertainties are…
Abstract
Purpose
The chapter explores the sustainability of European aeromobility and the socio-technical systems that enable it by examining how certain threats, risk and uncertainties are managed in European airspace.
Methodology/approach
The chapter examines the discussions around the inception and deployment of methods of ‘crisis management’ to airspace governance and focuses on the importation of particular systems of knowledge, practices and technologies from other contexts.
Findings
The chapter finds that European authorities have installed a combination of capacities involving central and decentralised coordination and decision making – as well as training and simulation – in order to better anticipate and respond to moments of crisis, although the politics of such an arrangement is not unproblematic to the interests of state sovereignty and the airlines’ suspicion of regulation or lack thereof.
Originality/value
The chapter is one of the first to make explicit how ash-cloud crises and disruption to airspace are being governed post the more immediate consequences of the 2010 ash cloud.
Details
Keywords
Christopher G. Reddick and Howard A. Frank
Survey findings from Florida reveal that larger, higher risk communities perceive greater budgetary trade-offs, a view that supports in part the U.S. Department of Homeland…
Abstract
Survey findings from Florida reveal that larger, higher risk communities perceive greater budgetary trade-offs, a view that supports in part the U.S. Department of Homeland Security’s recently implemented strategy in distributing its grants. Per expectations, city managers with graduate education saw higher levels of readiness and lower threat risk than fire chiefs. Consistent with prior research, cities were reprogramming and using existing funds rather than new levies for homeland security initiatives. This finding was buttressed by results that recently enacted property tax limits and cuts in federal aid were seen as the greatest challenges to increased funding. Contrary to mainstream public administration writing, our respondents stated that restrained funding rather than intergovernmental coordination was the biggest issue they faced in meeting homeland security needs. Overall, our respondents saw a low risk of terror threat, a perception that may represent an accurate read of the operating environment or an implicit belief that higher levels of government will provide significant assistance in the event of a major terrorist attack or other conflagration.
Charis Gerosideris and Ioanna Ferra
The mobilisations against the wildfires in Greece (2007) redefined the notion of environmentalism in the country, and it was one of the first examples which showcased the…
Abstract
The mobilisations against the wildfires in Greece (2007) redefined the notion of environmentalism in the country, and it was one of the first examples which showcased the potential of digital media for protests and resistance in the Greek context. At the same time, the global recession strongly affected the environmental politics and policies applied in Greece, indicating threats, risks and areas of conflict (e.g., privatisation of recourses, water, etc.). Following the environmental protests of 2007, this study provides an insight into the case of #Skouries forest and the antimining protests, focussing on the period 2015–2017. The study developed through the analysis of online data (Twitter) which was collected during the period March 2015 to March 2017 (#skouries). This chapter develops an insight into the online networks, coalitions and dominant actors (SNA) and also investigates the hashtags evolution and discourse (Semantic analysis). The collection and visualisation of the data developed using NodeXL. This case is considered one of the most indicative examples of the Greek environmental movement, as this shaped during the evolution of social media and in the crisis context. As such, this chapter demonstrates that the importance of the use of Twitter for the organisation of the movement, as well as an alternative space for public engagement/debate on climate change and environmental-related issues.
Details
Keywords
This paper seeks to focus more attention on market threat variables, their role in contributing to market risk and how to anticipate them.
Abstract
Purpose
This paper seeks to focus more attention on market threat variables, their role in contributing to market risk and how to anticipate them.
Design/methodology/approach
Selected marketing and economics variables are considered in the context of their potentially dangerous or destructive impacts on business markets. Numerous “real world” examples are used to demonstrate the negative effects of these variables.
Findings
A matrix based on market information levels and lead times is introduced to demonstrate how the threat variables can be classified in terms of their potential risk to the business marketer. The threat variables can then be located on the risk matrix and the degree of their potential danger can be defined.
Originality/value
The discussion should hopefully be of use to both students and practitioners. An “early warning” template is provided to help identify specific variables and their risk potential so that scanning efforts can be prioritized according to the most likely sources of market threats.
Details