Search results
1 – 10 of over 9000Craig R. Scott and SoeYoon Choi
The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members…
Abstract
Purpose
The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members increasingly use and misuse various terms to restrict their communication. This includes formal classifications for data security, financial/knowledge management, human resources, and other functions as well as those used informally by organizational members. Especially in a data-rich environment where our word-processing programs, e-mail tools, and other technologies afford us opportunities to engage in classification, a wide range of people at all organizational levels may serve as custodians of their own data and thus have the ability (as well as perhaps the need) to classify messages in various ways. The purpose of this paper is to describe key classification terms ranging from those found in government (e.g. top secret, confidential) to those in the private sector (e.g. business use only, trademarked) to an even wider set of terms used informally by organizational members (e.g. personal, preliminary). The growing use of message classifications will likely create various challenges and opportunities for organizations, their members, and the broader public/society. A set of future research questions is offered for corporate communication researchers and practitioners, who are well positioned to examine this emerging phenomenon.
Design/methodology/approach
This paper draws on existing literature related to the growing use of message classifications to offer a list of classification terms and an agenda for future research.
Findings
This work describes key classification terms ranging from those found in government (e.g. top secret, confidential) to those in the private sector (e.g. business use only, trademarked) to an even wider set of terms used informally by organizational members (e.g. personal, preliminary). This expanded notion of classification will likely create various challenges and opportunities for organizations, their members, and the broader public/society.
Originality/value
The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members increasingly use and misuse various terms to restrict their communication. A set of future research questions is offered for corporate communication researchers and practitioners, who are well positioned to examine this emerging phenomenon.
Details
Keywords
Since the early years of the Cold War, two countervailing trends have been present in the treatment of officially held information in the United States. On the one hand, as the…
Abstract
Since the early years of the Cold War, two countervailing trends have been present in the treatment of officially held information in the United States. On the one hand, as the foundations of U.S. information policy were being set after World War II, wartime practices were remade and made permanent in a crisis atmosphere, with the establishment of a classification system (essentially the same one used to this day) by executive order, as well, as the passage of the Atomic Energy Act in 1946 and the National Security Act in 1947. However, even as the practice of official secrecy took root, the United States took the lead in formalizing standards of openness by statute, beginning with the 1946 passage of the Administrative Procedures Act and culminating in the passage (and 1974 strengthening) of the Freedom of Information Act. This article traces the development of U.S. information policy since World War II and describes the impact of official secrecy on decision making and democratic practice more generally.
Details
Keywords
Jonathan Felbinger and Judith Reppy
This chapter analyzes the construction of secrecy under the current U.S. export control regime for dual-use technologies and discusses its application for two technologies…
Abstract
This chapter analyzes the construction of secrecy under the current U.S. export control regime for dual-use technologies and discusses its application for two technologies: research on a class of semiconductors used in military and civilian applications and biotechnology research on select agents. We argue that the assignment of technologies and countries to categories controlled under the export regime is an exercise in creating secret knowledge, in which the broad category of “the other” is subdivided between those who are forbidden to know and those who are not (and thus implicitly are qualified to become a party to the secret). We draw attention to the social cost of errors made in applying these categories, and point to some remaining issues.
Details
Keywords
WITH the supreme confidence of the newspaper correspondent pundit, a reader of the Daily Telegraph sent a letter which solved ‘at a stroke’ the whole problem of unemployment.
Eli Winjum and Bjørn Kjetil Mølmann
The purpose of this paper is to propose and describe a concept for multilevel security (MLS) that may be advantageous in information systems with a limited number of security…
Abstract
Purpose
The purpose of this paper is to propose and describe a concept for multilevel security (MLS) that may be advantageous in information systems with a limited number of security levels. The concept should also adapt to information systems with limited capacities.
Design/methodology/approach
Assuming that confidentiality, integrity and availability are mutually independent security attributes of a generic information object, security requirements are modelled as a multidimensional vector space. Each axis represents one dimension of security. An axis is divided into an arbitrary number of levels. The paper shows how rules from the classic MLS models may enforce one‐directional information flow simultaneously and independently along each axis. By controlling flow this way, insecure or undefined states cannot be reached.
Findings
Handling different MLS properties independently enables an effective verification algorithm based on simple logical or binary operations. Verification of rights can be executed within a few clock cycles.
Research limitations/implications
Future research includes formal in‐depth studies of potential applications in databases, sensor information, operating systems and communication networks.
Practical implications
Simple logical port circuits may implement the proposed verification method. The method is well suited for tamper proof devices immune to software‐based attacks.
Originality/value
The paper describes a MLS concept that combines dimensions of security, like confidentiality, integrity and availability. The concept intends to be a “light‐weight” alternative to classic MLS models.
Details
Keywords
Paul Paolucci, Micah Holland and Shannon Williams
Machiavelli's dictums in The Prince (1977) instigated the modern discourse on power. Arguing that “there's such a difference between the way we really live and the way we ought to…
Abstract
Machiavelli's dictums in The Prince (1977) instigated the modern discourse on power. Arguing that “there's such a difference between the way we really live and the way we ought to live that the man who neglects the real to study the ideal will learn to accomplish his ruin, not his salvation” (Machiavelli, 1977, p. 44), his approach is a realist one. In this text, Machiavelli (1977, p. 3) endeavors to “discuss the rule of princes” and to “lay down principles for them.” Taking his lead, Foucault (1978, p. 97) argued that “if it is true that Machiavelli was among the few…who conceived the power of the Prince in terms of force relationships, perhaps we need to go one step further, do without the persona of the Prince, and decipher mechanisms on the basis of a strategy that is immanent in force relationships.” He believed that we should “investigate…how mechanisms of power have been able to function…how these mechanisms…have begun to become economically advantageous and politically useful…in a given context for specific reasons,” and, therefore, “we should…base our analysis of power on the study of the techniques and tactics of domination” (Foucault, 1980, pp. 100–102). Conceptualizing such techniques and tactics as the “art of governance”, Foucault (1991), examined power as strategies geared toward managing civic populations through shaping people's dispositions and behaviors.
This paper aims to expound the composition and characteristics of “SMR Data”, to elaborate the role of the “SMR Data” in the comprehensive study of Anti-Japanese War from three…
Abstract
Purpose
This paper aims to expound the composition and characteristics of “SMR Data”, to elaborate the role of the “SMR Data” in the comprehensive study of Anti-Japanese War from three aspects.
Design/methodology/approach
There are several methodologies included in this thesis, such as literature inquiry, questionnaire survey, field investigation and expert consultation.
Findings
The SMR Data is a historical portrayal of the 40 years of SMR. Its content is integrative, comprehensive and systematic. It covers a large area and a wide range of topics and can reflect the whole process of Japanese militarism’s invasion of China from different aspects.
Originality/value
The study of historical subject is not for the historical fact itself, exploring yesterday is looking for lessons for today. Because the imperialism phenomenon still exists and has not completely withdrew from the historical stage, people step into the typical imperialist colonial aggression, mighty and quite rich mysterious “SMR kingdom” historic sites, to explore the profound truth, unravel mysteries and find out the warning. Taking history as a mirror, all peace-loving people in the world call for a new international order and realize the harmonious coexistence of mankind.
Details
Keywords
Miles Cook and Russ Hagey
A consultant with Greenwich Partners based in New York looks at the often overlooked human factor in security infrastructures.
Abstract
A consultant with Greenwich Partners based in New York looks at the often overlooked human factor in security infrastructures.
Details