Search results

1 – 10 of over 9000
Article
Publication date: 2 October 2017

Craig R. Scott and SoeYoon Choi

The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members…

Abstract

Purpose

The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members increasingly use and misuse various terms to restrict their communication. This includes formal classifications for data security, financial/knowledge management, human resources, and other functions as well as those used informally by organizational members. Especially in a data-rich environment where our word-processing programs, e-mail tools, and other technologies afford us opportunities to engage in classification, a wide range of people at all organizational levels may serve as custodians of their own data and thus have the ability (as well as perhaps the need) to classify messages in various ways. The purpose of this paper is to describe key classification terms ranging from those found in government (e.g. top secret, confidential) to those in the private sector (e.g. business use only, trademarked) to an even wider set of terms used informally by organizational members (e.g. personal, preliminary). The growing use of message classifications will likely create various challenges and opportunities for organizations, their members, and the broader public/society. A set of future research questions is offered for corporate communication researchers and practitioners, who are well positioned to examine this emerging phenomenon.

Design/methodology/approach

This paper draws on existing literature related to the growing use of message classifications to offer a list of classification terms and an agenda for future research.

Findings

This work describes key classification terms ranging from those found in government (e.g. top secret, confidential) to those in the private sector (e.g. business use only, trademarked) to an even wider set of terms used informally by organizational members (e.g. personal, preliminary). This expanded notion of classification will likely create various challenges and opportunities for organizations, their members, and the broader public/society.

Originality/value

The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members increasingly use and misuse various terms to restrict their communication. A set of future research questions is offered for corporate communication researchers and practitioners, who are well positioned to examine this emerging phenomenon.

Details

Corporate Communications: An International Journal, vol. 22 no. 4
Type: Research Article
ISSN: 1356-3289

Keywords

Book part
Publication date: 26 January 2011

Thomas C. Ellington

Since the early years of the Cold War, two countervailing trends have been present in the treatment of officially held information in the United States. On the one hand, as the…

Abstract

Since the early years of the Cold War, two countervailing trends have been present in the treatment of officially held information in the United States. On the one hand, as the foundations of U.S. information policy were being set after World War II, wartime practices were remade and made permanent in a crisis atmosphere, with the establishment of a classification system (essentially the same one used to this day) by executive order, as well, as the passage of the Atomic Energy Act in 1946 and the National Security Act in 1947. However, even as the practice of official secrecy took root, the United States took the lead in formalizing standards of openness by statute, beginning with the 1946 passage of the Administrative Procedures Act and culminating in the passage (and 1974 strengthening) of the Freedom of Information Act. This article traces the development of U.S. information policy since World War II and describes the impact of official secrecy on decision making and democratic practice more generally.

Details

Government Secrecy
Type: Book
ISBN: 978-0-85724-390-4

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

Book part
Publication date: 26 January 2011

Jonathan Felbinger and Judith Reppy

This chapter analyzes the construction of secrecy under the current U.S. export control regime for dual-use technologies and discusses its application for two technologies…

Abstract

This chapter analyzes the construction of secrecy under the current U.S. export control regime for dual-use technologies and discusses its application for two technologies: research on a class of semiconductors used in military and civilian applications and biotechnology research on select agents. We argue that the assignment of technologies and countries to categories controlled under the export regime is an exercise in creating secret knowledge, in which the broad category of “the other” is subdivided between those who are forbidden to know and those who are not (and thus implicitly are qualified to become a party to the secret). We draw attention to the social cost of errors made in applying these categories, and point to some remaining issues.

Article
Publication date: 1 November 1984

WITH the supreme confidence of the newspaper correspondent pundit, a reader of the Daily Telegraph sent a letter which solved ‘at a stroke’ the whole problem of unemployment.

Abstract

WITH the supreme confidence of the newspaper correspondent pundit, a reader of the Daily Telegraph sent a letter which solved ‘at a stroke’ the whole problem of unemployment.

Details

Work Study, vol. 33 no. 11
Type: Research Article
ISSN: 0043-8022

Article
Publication date: 21 November 2008

Eli Winjum and Bjørn Kjetil Mølmann

The purpose of this paper is to propose and describe a concept for multilevel security (MLS) that may be advantageous in information systems with a limited number of security…

1287

Abstract

Purpose

The purpose of this paper is to propose and describe a concept for multilevel security (MLS) that may be advantageous in information systems with a limited number of security levels. The concept should also adapt to information systems with limited capacities.

Design/methodology/approach

Assuming that confidentiality, integrity and availability are mutually independent security attributes of a generic information object, security requirements are modelled as a multidimensional vector space. Each axis represents one dimension of security. An axis is divided into an arbitrary number of levels. The paper shows how rules from the classic MLS models may enforce one‐directional information flow simultaneously and independently along each axis. By controlling flow this way, insecure or undefined states cannot be reached.

Findings

Handling different MLS properties independently enables an effective verification algorithm based on simple logical or binary operations. Verification of rights can be executed within a few clock cycles.

Research limitations/implications

Future research includes formal in‐depth studies of potential applications in databases, sensor information, operating systems and communication networks.

Practical implications

Simple logical port circuits may implement the proposed verification method. The method is well suited for tamper proof devices immune to software‐based attacks.

Originality/value

The paper describes a MLS concept that combines dimensions of security, like confidentiality, integrity and availability. The concept intends to be a “light‐weight” alternative to classic MLS models.

Details

Information Management & Computer Security, vol. 16 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 3 December 2005

Paul Paolucci, Micah Holland and Shannon Williams

Machiavelli's dictums in The Prince (1977) instigated the modern discourse on power. Arguing that “there's such a difference between the way we really live and the way we ought to…

Abstract

Machiavelli's dictums in The Prince (1977) instigated the modern discourse on power. Arguing that “there's such a difference between the way we really live and the way we ought to live that the man who neglects the real to study the ideal will learn to accomplish his ruin, not his salvation” (Machiavelli, 1977, p. 44), his approach is a realist one. In this text, Machiavelli (1977, p. 3) endeavors to “discuss the rule of princes” and to “lay down principles for them.” Taking his lead, Foucault (1978, p. 97) argued that “if it is true that Machiavelli was among the few…who conceived the power of the Prince in terms of force relationships, perhaps we need to go one step further, do without the persona of the Prince, and decipher mechanisms on the basis of a strategy that is immanent in force relationships.” He believed that we should “investigate…how mechanisms of power have been able to function…how these mechanisms…have begun to become economically advantageous and politically useful…in a given context for specific reasons,” and, therefore, “we should…base our analysis of power on the study of the techniques and tactics of domination” (Foucault, 1980, pp. 100–102). Conceptualizing such techniques and tactics as the “art of governance”, Foucault (1991), examined power as strategies geared toward managing civic populations through shaping people's dispositions and behaviors.

Details

Social Theory as Politics in Knowledge
Type: Book
ISBN: 978-1-84950-363-1

Article
Publication date: 25 October 2018

Wenbin Cai

This paper aims to expound the composition and characteristics of “SMR Data”, to elaborate the role of the “SMR Data” in the comprehensive study of Anti-Japanese War from three…

Abstract

Purpose

This paper aims to expound the composition and characteristics of “SMR Data”, to elaborate the role of the “SMR Data” in the comprehensive study of Anti-Japanese War from three aspects.

Design/methodology/approach

There are several methodologies included in this thesis, such as literature inquiry, questionnaire survey, field investigation and expert consultation.

Findings

The SMR Data is a historical portrayal of the 40 years of SMR. Its content is integrative, comprehensive and systematic. It covers a large area and a wide range of topics and can reflect the whole process of Japanese militarism’s invasion of China from different aspects.

Originality/value

The study of historical subject is not for the historical fact itself, exploring yesterday is looking for lessons for today. Because the imperialism phenomenon still exists and has not completely withdrew from the historical stage, people step into the typical imperialist colonial aggression, mighty and quite rich mysterious “SMR kingdom” historic sites, to explore the profound truth, unravel mysteries and find out the warning. Taking history as a mirror, all peace-loving people in the world call for a new international order and realize the harmonious coexistence of mankind.

Details

Global Knowledge, Memory and Communication, vol. 67 no. 8/9
Type: Research Article
ISSN: 0024-2535

Keywords

Article
Publication date: 1 August 2003

Miles Cook and Russ Hagey

A consultant with Greenwich Partners based in New York looks at the often overlooked human factor in security infrastructures.

1618

Abstract

A consultant with Greenwich Partners based in New York looks at the often overlooked human factor in security infrastructures.

Details

Journal of Business Strategy, vol. 24 no. 4
Type: Research Article
ISSN: 0275-6668

Keywords

Abstract

Details

European Security in a Post-Brexit World
Type: Book
ISBN: 978-1-78769-837-6

1 – 10 of over 9000