Search results

1 – 10 of over 20000
Book part
Publication date: 6 September 2021

Robert C. Kenter and Michael Goldsmith

The system of critical infrastructure in the United States is vast in size and geographic layout. These two factors along with the American system of Federalism impose great…

Abstract

The system of critical infrastructure in the United States is vast in size and geographic layout. These two factors along with the American system of Federalism impose great challenges in protecting these systems. Much of the physical protection of these assets is left to state and local governments making protection more difficult is that a large number of these critical infrastructures are owned by multinational corporations. It is through a complex coordinated effort spanning across all three levels of government that these systems are kept secure in the United States.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Content available
Book part
Publication date: 6 September 2021

Abstract

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Article
Publication date: 2 October 2007

Christine Sund

The purpose of this paper is to show that the full potential of the internet has not yet been realised. One of the key reasons for this is users' declining trust in the internet…

2783

Abstract

Purpose

The purpose of this paper is to show that the full potential of the internet has not yet been realised. One of the key reasons for this is users' declining trust in the internet. Over the past two decades, the internet has transformed many aspects of modern life. With an estimated four million users worldwide at the end of 2006, the use of the internet continues to grow. Building trust and confidence is one of the main enablers for the future growth and use of the internet. The paper aims to review some of the reasons behind the declining trust, the changing nature of cyber‐threats, and aims to look at cybersecurity in the context of developing countries and the specific problems these countries are facing when dealing with growing number of cyber‐threats.

Design/methodology/approach

This contribution gives an overview of some of the evolving cyber‐threats and their potential impact in order to determine whether the growth of the information society is really at risk. It further considers what the different stakeholders can do to build a safer and more secure information society. The paper poses questions, outlines possible options for a way forward and based on this gives the readers a better understanding of the issues and challenges involved in building confidence and security in the use of ICTs. The paper proposes a framework with increased co‐operation, collaboration, and information sharing, to connect the individual cybersecurity communities and single initiatives, in order to allow stakeholders to build together a roadmap for cybersecurity.

Findings

During the discussions leading up to and during the two phases of the World Summit on the information society, country representative participants re‐affirmed their commitment to deal effectively with the significant and growing problems posed by spam and other cyber‐threats. As no single country or entity can alone create trust, confidence and security in the use of ICTs, it is clear that increased international action is needed to address the issues involved.

Practical implications

This paper tries to provide readers with a simple overview of the state of cybersecurity, and with a framework for further considering how new technologies and the growing use of the internet will impact upon stakeholders' trust in the use of ICTs.

Originality/value

Along with increasing dependency on ICTs, new threats to network and information security have emerged. These include growing misuse of electronic networks for criminal purposes or for objectives that can furthermore adversely affect the integrity of critical infrastructures within states. This paper puts forward some concrete suggestions on how countries could look at the issues related to cybersecurity.

Details

Online Information Review, vol. 31 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 11 September 2017

Brenden Kuerbis and Farzaneh Badiei

There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors…

1967

Abstract

Purpose

There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors believe these developments are based on an incomplete picture of how cybersecurity is actually governed in practice and theory. Given this disconnect, this paper aims to attempt to provide a cohesive understanding of the cybersecurity institutional landscape.

Design/methodology/approach

Drawing from institutional economics and using extensive desk research, the authors develop a conceptual model and broadly sketch the activities and contributions of market, networked and hierarchical governance structures and analyze how they interact to produce and govern cybersecurity.

Findings

Analysis shows a robust market and networked governance structures and a more limited role for hierarchical structures. Ex ante efforts to produce cybersecurity using purely hierarchical governance structures, even buttressed with support from networked governance structures, struggle without market demand like in the case of secure internet identifiers. To the contrary, ex post efforts like botnet mitigation, route monitoring and other activities involving information sharing seem to work under a variety of combinations of governance structures.

Originality/value

The authors’ conceptual framework and observations offer a useful starting point for unpacking how cybersecurity is produced and governed; ultimately, we need to understand if and how these governance structure arrangements actually impact variation in observed levels of cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 13 March 2018

Kate Pangbourne, Dominic Stead, Miloš Mladenović and Dimitris Milakis

This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its…

Abstract

This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its future implications for urban policymakers in terms of governance and sustainability (i.e., social and environmental impacts). We begin by describing the origins of the MaaS concept, along with the features of precursor technologies and current early examples. We then reflect on the marketing of MaaS and use it to consider how we might anticipate some potentially less desirable aspects of the promoted business models. Finally, we discuss the implications for governance.

Details

Governance of the Smart Mobility Transition
Type: Book
ISBN: 978-1-78754-317-1

Keywords

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

86938

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Article
Publication date: 1 March 2001

K.G.B. Bakewell

Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18;…

14378

Abstract

Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.

Details

Property Management, vol. 19 no. 3
Type: Research Article
ISSN: 0263-7472

Article
Publication date: 1 May 2001

K.G.B. Bakewell

Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18;…

14155

Abstract

Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.

Details

Journal of Property Investment & Finance, vol. 19 no. 5
Type: Research Article
ISSN: 1463-578X

Article
Publication date: 5 April 2022

M. Serhat Yenice and Emine Yagmur

The aim of this paper is to determine the scope and content for a holistic conservation and development strategies in the case of Gaziantep Rumkale. This approach seeks an answer…

Abstract

Purpose

The aim of this paper is to determine the scope and content for a holistic conservation and development strategies in the case of Gaziantep Rumkale. This approach seeks an answer to the question of “How can Rumkale archaeological heritage be preserved with their original values and passed on to future generations?”

Design/methodology/approach

The materials of the paper are based on field research and written and visual resource. The paper has been handled with a four-step method setup. The first stage is to examine the spatial and functional background of Rumkale and its immediate surroundings based on the historical development process. The second stage is to evaluate the upper- and lower-scale planning experiences of the heritage site. The third stage of the research methodology is strengths, weaknesses, opportunities, and threats (SWOT) analysis. The fourth stage is the creation of cultural heritage conservation-development strategies that define strategies for the protection and development of archaeological heritage in the context of sustainability.

Findings

The paper emphasizes the development of a holistic perspective that theoretically deals with the archaeological heritage sites of Rumkale together with the surrounding rural areas. In this context, the paper suggests ecological, spatial, socio-cultural, economic and institutional protection development strategies for the Rumkale archaeological site together with the surrounding rural areas for their delivery to future generations.

Originality/value

Although the area has an important cultural heritage value for different religions and cultures, it has not been subject to sufficient scientific research. The paper develops a holistic approach by considering Rumkale and its surroundings together.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. 14 no. 2
Type: Research Article
ISSN: 2044-1266

Keywords

1 – 10 of over 20000