Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of over 63000
To view the access options for this content please click here
Article
Publication date: 17 October 2008

Construction of evaluation index system of national energy security based on CAS theory and PSR model

Fang Shuqiong, Yang Baoan and Yu Yin

The purpose of this paper is to provide a new mentality of constructing the evaluation index system on national energy security, in favor of analyzing its influencing…

HTML
PDF (122 KB)

Abstract

Purpose

The purpose of this paper is to provide a new mentality of constructing the evaluation index system on national energy security, in favor of analyzing its influencing factors and coupling relations thoroughly.

Design/methodology/approach

The complex adaptive system (CAS) theory has provided one kind analysis method on modeling and simulation for question of the social economic system, which based on the adaptive agent and mutual interaction. In view of this, the authors' expect to use this kind of new research paradigm for reference, and construct the evaluation index systems on national energy security using the integration of CAS theory and pressure‐state‐response (PSR) conceptual model.

Findings

Constructs a set of compound index system of “six parallel layers, gradually converge, six layers three dimensions three degrees.”

Research limitations/implications

The evaluation index system on national energy security is in the discussion stage at present, and the comparatively systematic or accepted index system has not been established. So the further study on influencing factors and measurement indicator system based on multi‐dimension of national energy security, is the emphasis of the continued further research.

Practical implications

Constructing the evaluation index system on national energy security integrating PSR conceptual model from the perspective CAS.

Originality/value

Divides the carrier of energy security problem's happening into three energy domains (non‐renewable energy), and introduces the theory and method of CAS to construct the agent layer to carry on the multi‐agent gambling analysis. Simultaneously separately analyses the coal security, the petroleum security as well as the natural gas security using the concept framework of PSR.

Details

Kybernetes, vol. 37 no. 9/10
Type: Research Article
DOI: https://doi.org/10.1108/03684920810907580
ISSN: 0368-492X

Keywords

  • Complexity theory
  • Systems theory
  • Adaptive system theory
  • Energy technology
  • Cybernetics

To view the access options for this content please click here
Book part
Publication date: 3 December 2018

National Security Intelligence in the Five Eyes Countries

Frederic Lemieux

HTML
PDF (211 KB)
EPUB (762 KB)

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
DOI: https://doi.org/10.1108/978-1-78769-171-120181003
ISBN: 978-1-78769-171-1

Content available
Article
Publication date: 23 March 2020

Government Cloud Computing and National Security

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Open Access
HTML
PDF (192 KB)

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/REPS-09-2019-0125
ISSN: 2356-9980

Keywords

  • National security
  • Cybersecurity
  • Digital government
  • Government cloud computing
  • National threats
  • E-government

To view the access options for this content please click here
Article
Publication date: 1 March 2012

Budgeting for national security: A whole of government perspective

Douglas A. Brook

There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities…

HTML
PDF (160 KB)

Abstract

There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that contribute to “the common defense.“ A whole of government approach is suggested as a means for integrating and coordinating national security policies and programs. To support this approach, recommendations have been made for an integrated national security budget. Focusing on the executive budget process, three approaches to an integrated national security budget are examined: organization-based, program-based and function-based. Though there are questions about the importance of budget structure and the effectiveness of program budgeting, a whole of government integrated unified national security budget could facilitate the fiscal trade-offs required between alternative means of pursuing national security objectives in the executive budget.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 24 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/JPBAFM-24-01-2012-B002
ISSN: 1096-3367

To view the access options for this content please click here
Article
Publication date: 27 June 2008

Information systems for national security in Thailand: ethical issues and policy implications

Krisana Kitiyadisai

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai…

HTML
PDF (119 KB)

Abstract

Purpose

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.

Design/methodology/approach

The methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community (IC) in Thailand. The relevant literature survey consists of the literature on US intelligence databases for Homeland Security, criticisms of the IC, the ethical debate on national databases in the USA, the Thai National Security Council, ethical debates on the Internal Security Act and Computer Crime Act, Buddhism and “spiritual computing.”

Findings

The findings reflect that the US model of national security has significant influence on the Thai intelligence approach and application of IT for national security while both intelligence communities have similar intelligence problems and have raised ethical debates on violations of human rights.

Research limitations/implications

The research limitations include the nature of the topic which is a closed subject under legal restrictions in Thailand so that the sources of official information could not be disclosed nor elaborated in details; and literature on this topic has not been widely available except unclassified information which limits a more in‐depth investigation and analysis.

Originality/value

The value of this paper lies in being the first attempt to throw light on a “forbidden” subject in Thailand by discussing the US experiences against the Thai case study. The application of “spiritual computing” and Buddhist precepts to the context of national security and intelligence databases could be a starting point for developing a “happier” and “successful” IC and possibly open a new approach to national security.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/14779960810888356
ISSN: 1477-996X

Keywords

  • Thailand
  • Religion
  • Human rights
  • Database management
  • State security

To view the access options for this content please click here
Article
Publication date: 14 January 2019

Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exception

Martina Francesca Ferracane

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic…

HTML
PDF (335 KB)

Abstract

Purpose

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under General Agreement on Trade in Services (GATS) security exception.

Design/methodology/approach

If a case were to be brought before the WTO dispute settlement, the defender could support its case by invoking the security exception. This paper analyzes three main arguments that could be brought up: protection from cyber espionage, protection from cyberattacks on critical infrastructure and access to data needed to prevent terrorist threats. These three cases are analyzed both legally and technically to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era.

Findings

In the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyberattacks and terrorist threats.

Originality/value

This paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/DPRG-09-2018-0052
ISSN: 2398-5038

Keywords

  • WTO
  • Cybersecurity
  • GATS
  • National security
  • Data flows
  • Digital trade

To view the access options for this content please click here
Article
Publication date: 12 August 2014

Analyses of issues of information security in Indian context

Manmohan Chaturvedi, Abhishek Narain Singh, Manmohan Prasad Gupta and Jaijit Bhattacharya

The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian…

HTML
PDF (806 KB)

Abstract

Purpose

The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency.

Design/methodology/approach

Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them.

Findings

The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels.

Research limitations/implications

The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts” judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation.

Practical implications

It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation.

Social implications

A “digital divide” in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction.

Originality/value

This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.

Details

Transforming Government: People, Process and Policy, vol. 8 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/TG-07-2013-0019
ISSN: 1750-6166

Keywords

  • Information security
  • Delphi
  • Hierarchical analysis
  • Interpretive structural modeling (ISM)

To view the access options for this content please click here
Book part
Publication date: 16 December 2009

EU harmonisation reforms, democratisation and a new modality of civil-military relations in Turkey

Nilufer Narli

The EU harmonisation has created changes in the military's formal and informal influence in the directions of decreased formal and informal military influence in civilian…

HTML
PDF (316 KB)
EPUB (502 KB)

Abstract

The EU harmonisation has created changes in the military's formal and informal influence in the directions of decreased formal and informal military influence in civilian politics. The EU reforms have created changes in the mindset of the citizens, by creating changes in the security culture of the citizens and in the civil-military related political culture. The desired level of alignment has not been reached. Therefore, the study examines the areas where further alignment is required. Moving from Rebecca L. Schiff's concordance theory, the article examines the relationship between the Turkish military, the civilian politics and the society before and after the EU harmonisation process. It examines the effects of the EU harmonisation process on the changes in the civil-military balance of power, and on the related security culture and political values. The analysis focuses on: (i) increased civilian control and consequent changes in the policy of accountability; (ii) transparency building in the defence sector; (iii) parliamentary oversight; and (iv) the change in the political culture related to the civil-military issues. It also investigates the extent the EU harmonisation has achieved in building democratic civil-military relations in order to align with the EU standards.

Details

Advances in Military Sociology: Essays in Honor of Charles C. Moskos
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2009)000012B023
ISBN: 978-1-84855-893-9

To view the access options for this content please click here
Article
Publication date: 1 June 2003

Polish mass privatisation scheme: the legal framework

Joanna Kruczalak‐Jankowska and Kazimerz Kruczalak

The main purpose of this paper is to approach the legal problems of mass privatisation in Poland. The authors present the structure of national investment funds which…

HTML
PDF (296 KB)

Abstract

The main purpose of this paper is to approach the legal problems of mass privatisation in Poland. The authors present the structure of national investment funds which intend to be the experimental financial intermediaries in Poland. Their assets are quoted on the Stock Exchange in Warsaw from the beginning of May 1997. New and controversial roles of management firms are discussed in this paper.

Details

Journal of Economic Studies, vol. 30 no. 3/4
Type: Research Article
DOI: https://doi.org/10.1108/01443580310483565
ISSN: 0144-3585

Keywords

  • Poland
  • Privatization
  • Investment funds
  • Shares

To view the access options for this content please click here
Book part
Publication date: 23 September 2019

Comprehensive Evaluation of National Energy Security

Yi-Ming Wei, Qiao-Mei Liang, Gang Wu and Hua Liao

HTML
PDF (1.3 MB)
EPUB (780 KB)

Abstract

Details

Energy Economics
Type: Book
DOI: https://doi.org/10.1108/978-1-83867-293-520191013
ISBN: 978-1-83867-294-2

Access
Only content I have access to
Only Open Access
Year
  • Last week (220)
  • Last month (635)
  • Last 3 months (1715)
  • Last 6 months (3525)
  • Last 12 months (6541)
  • All dates (63241)
Content type
  • Article (45489)
  • Book part (9716)
  • Expert briefing (3597)
  • Earlycite article (2074)
  • Executive summary (1591)
  • Case study (742)
  • Graphic analysis (32)
1 – 10 of over 63000
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here