Search results
1 – 10 of over 21000Robert C. Kenter and Michael Goldsmith
The system of critical infrastructure in the United States is vast in size and geographic layout. These two factors along with the American system of Federalism impose great…
Abstract
The system of critical infrastructure in the United States is vast in size and geographic layout. These two factors along with the American system of Federalism impose great challenges in protecting these systems. Much of the physical protection of these assets is left to state and local governments making protection more difficult is that a large number of these critical infrastructures are owned by multinational corporations. It is through a complex coordinated effort spanning across all three levels of government that these systems are kept secure in the United States.
Details
Keywords
The purpose of this paper is to show that the full potential of the internet has not yet been realised. One of the key reasons for this is users' declining trust in the internet…
Abstract
Purpose
The purpose of this paper is to show that the full potential of the internet has not yet been realised. One of the key reasons for this is users' declining trust in the internet. Over the past two decades, the internet has transformed many aspects of modern life. With an estimated four million users worldwide at the end of 2006, the use of the internet continues to grow. Building trust and confidence is one of the main enablers for the future growth and use of the internet. The paper aims to review some of the reasons behind the declining trust, the changing nature of cyber‐threats, and aims to look at cybersecurity in the context of developing countries and the specific problems these countries are facing when dealing with growing number of cyber‐threats.
Design/methodology/approach
This contribution gives an overview of some of the evolving cyber‐threats and their potential impact in order to determine whether the growth of the information society is really at risk. It further considers what the different stakeholders can do to build a safer and more secure information society. The paper poses questions, outlines possible options for a way forward and based on this gives the readers a better understanding of the issues and challenges involved in building confidence and security in the use of ICTs. The paper proposes a framework with increased co‐operation, collaboration, and information sharing, to connect the individual cybersecurity communities and single initiatives, in order to allow stakeholders to build together a roadmap for cybersecurity.
Findings
During the discussions leading up to and during the two phases of the World Summit on the information society, country representative participants re‐affirmed their commitment to deal effectively with the significant and growing problems posed by spam and other cyber‐threats. As no single country or entity can alone create trust, confidence and security in the use of ICTs, it is clear that increased international action is needed to address the issues involved.
Practical implications
This paper tries to provide readers with a simple overview of the state of cybersecurity, and with a framework for further considering how new technologies and the growing use of the internet will impact upon stakeholders' trust in the use of ICTs.
Originality/value
Along with increasing dependency on ICTs, new threats to network and information security have emerged. These include growing misuse of electronic networks for criminal purposes or for objectives that can furthermore adversely affect the integrity of critical infrastructures within states. This paper puts forward some concrete suggestions on how countries could look at the issues related to cybersecurity.
Details
Keywords
Brenden Kuerbis and Farzaneh Badiei
There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors…
Abstract
Purpose
There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors believe these developments are based on an incomplete picture of how cybersecurity is actually governed in practice and theory. Given this disconnect, this paper aims to attempt to provide a cohesive understanding of the cybersecurity institutional landscape.
Design/methodology/approach
Drawing from institutional economics and using extensive desk research, the authors develop a conceptual model and broadly sketch the activities and contributions of market, networked and hierarchical governance structures and analyze how they interact to produce and govern cybersecurity.
Findings
Analysis shows a robust market and networked governance structures and a more limited role for hierarchical structures. Ex ante efforts to produce cybersecurity using purely hierarchical governance structures, even buttressed with support from networked governance structures, struggle without market demand like in the case of secure internet identifiers. To the contrary, ex post efforts like botnet mitigation, route monitoring and other activities involving information sharing seem to work under a variety of combinations of governance structures.
Originality/value
The authors’ conceptual framework and observations offer a useful starting point for unpacking how cybersecurity is produced and governed; ultimately, we need to understand if and how these governance structure arrangements actually impact variation in observed levels of cybersecurity.
Details
Keywords
Kate Pangbourne, Dominic Stead, Miloš Mladenović and Dimitris Milakis
This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its…
Abstract
This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its future implications for urban policymakers in terms of governance and sustainability (i.e., social and environmental impacts). We begin by describing the origins of the MaaS concept, along with the features of precursor technologies and current early examples. We then reflect on the marketing of MaaS and use it to consider how we might anticipate some potentially less desirable aspects of the promoted business models. Finally, we discuss the implications for governance.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
Irina Farquhar and Alan Sorkin
This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…
Abstract
This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18;…
Abstract
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18;…
Abstract
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.
M. Serhat Yenice and Emine Yagmur
The aim of this paper is to determine the scope and content for a holistic conservation and development strategies in the case of Gaziantep Rumkale. This approach seeks an answer…
Abstract
Purpose
The aim of this paper is to determine the scope and content for a holistic conservation and development strategies in the case of Gaziantep Rumkale. This approach seeks an answer to the question of “How can Rumkale archaeological heritage be preserved with their original values and passed on to future generations?”
Design/methodology/approach
The materials of the paper are based on field research and written and visual resource. The paper has been handled with a four-step method setup. The first stage is to examine the spatial and functional background of Rumkale and its immediate surroundings based on the historical development process. The second stage is to evaluate the upper- and lower-scale planning experiences of the heritage site. The third stage of the research methodology is strengths, weaknesses, opportunities, and threats (SWOT) analysis. The fourth stage is the creation of cultural heritage conservation-development strategies that define strategies for the protection and development of archaeological heritage in the context of sustainability.
Findings
The paper emphasizes the development of a holistic perspective that theoretically deals with the archaeological heritage sites of Rumkale together with the surrounding rural areas. In this context, the paper suggests ecological, spatial, socio-cultural, economic and institutional protection development strategies for the Rumkale archaeological site together with the surrounding rural areas for their delivery to future generations.
Originality/value
Although the area has an important cultural heritage value for different religions and cultures, it has not been subject to sufficient scientific research. The paper develops a holistic approach by considering Rumkale and its surroundings together.
Details