Search results

1 – 10 of over 84000
Article
Publication date: 17 October 2008

Fang Shuqiong, Yang Baoan and Yu Yin

The purpose of this paper is to provide a new mentality of constructing the evaluation index system on national energy security, in favor of analyzing its influencing factors and…

Abstract

Purpose

The purpose of this paper is to provide a new mentality of constructing the evaluation index system on national energy security, in favor of analyzing its influencing factors and coupling relations thoroughly.

Design/methodology/approach

The complex adaptive system (CAS) theory has provided one kind analysis method on modeling and simulation for question of the social economic system, which based on the adaptive agent and mutual interaction. In view of this, the authors' expect to use this kind of new research paradigm for reference, and construct the evaluation index systems on national energy security using the integration of CAS theory and pressure‐state‐response (PSR) conceptual model.

Findings

Constructs a set of compound index system of “six parallel layers, gradually converge, six layers three dimensions three degrees.”

Research limitations/implications

The evaluation index system on national energy security is in the discussion stage at present, and the comparatively systematic or accepted index system has not been established. So the further study on influencing factors and measurement indicator system based on multi‐dimension of national energy security, is the emphasis of the continued further research.

Practical implications

Constructing the evaluation index system on national energy security integrating PSR conceptual model from the perspective CAS.

Originality/value

Divides the carrier of energy security problem's happening into three energy domains (non‐renewable energy), and introduces the theory and method of CAS to construct the agent layer to carry on the multi‐agent gambling analysis. Simultaneously separately analyses the coal security, the petroleum security as well as the natural gas security using the concept framework of PSR.

Details

Kybernetes, vol. 37 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7074

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 1 March 2012

Douglas A. Brook

There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that…

Abstract

There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that contribute to “the common defense.“ A whole of government approach is suggested as a means for integrating and coordinating national security policies and programs. To support this approach, recommendations have been made for an integrated national security budget. Focusing on the executive budget process, three approaches to an integrated national security budget are examined: organization-based, program-based and function-based. Though there are questions about the importance of budget structure and the effectiveness of program budgeting, a whole of government integrated unified national security budget could facilitate the fiscal trade-offs required between alternative means of pursuing national security objectives in the executive budget.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 24 no. 1
Type: Research Article
ISSN: 1096-3367

Article
Publication date: 27 June 2008

Krisana Kitiyadisai

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence…

2037

Abstract

Purpose

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.

Design/methodology/approach

The methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community (IC) in Thailand. The relevant literature survey consists of the literature on US intelligence databases for Homeland Security, criticisms of the IC, the ethical debate on national databases in the USA, the Thai National Security Council, ethical debates on the Internal Security Act and Computer Crime Act, Buddhism and “spiritual computing.”

Findings

The findings reflect that the US model of national security has significant influence on the Thai intelligence approach and application of IT for national security while both intelligence communities have similar intelligence problems and have raised ethical debates on violations of human rights.

Research limitations/implications

The research limitations include the nature of the topic which is a closed subject under legal restrictions in Thailand so that the sources of official information could not be disclosed nor elaborated in details; and literature on this topic has not been widely available except unclassified information which limits a more in‐depth investigation and analysis.

Originality/value

The value of this paper lies in being the first attempt to throw light on a “forbidden” subject in Thailand by discussing the US experiences against the Thai case study. The application of “spiritual computing” and Buddhist precepts to the context of national security and intelligence databases could be a starting point for developing a “happier” and “successful” IC and possibly open a new approach to national security.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 19 December 2018

Martina Francesca Ferracane

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual…

Abstract

Purpose

The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework to assess data flows’ restrictions under General Agreement on Trade in Services (GATS) security exception.

Design/methodology/approach

If a case were to be brought before the WTO dispute settlement, the defender could support its case by invoking the security exception. This paper analyzes three main arguments that could be brought up: protection from cyber espionage, protection from cyberattacks on critical infrastructure and access to data needed to prevent terrorist threats. These three cases are analyzed both legally and technically to assess the relevance of restrictions on data flows under GATS security exception. This analysis can, more generally, inform the debate on the protection of national security in the digital era.

Findings

In the three cases, restrictions on data considered critical for national security might raise the cost of certain attacks. However, the risks would remain pervasive and national security would not be significantly enhanced both legally and technically. The implementation of good security standards and encryption techniques appears to be a more effective way to ensure a better response to cyber threats. All in all, it will be important to investigate on a case by case basis whether the scope of the measure (sectors and data covered) is considered proportionate and whether the measure in question in practice reduces the exposure of the country to cyber espionage, cyberattacks and terrorist threats.

Originality/value

This paper represents a contribution to the literature because it is the first paper to address systematically the issue of data flows and national security in the context of a GATS dispute and because it provides a unique perspective that looks both at legal and technical arguments.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 1
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 12 August 2014

Manmohan Chaturvedi, Abhishek Narain Singh, Manmohan Prasad Gupta and Jaijit Bhattacharya

The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and…

1054

Abstract

Purpose

The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency.

Design/methodology/approach

Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them.

Findings

The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels.

Research limitations/implications

The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts” judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation.

Practical implications

It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation.

Social implications

A “digital divide” in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction.

Originality/value

This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.

Details

Transforming Government: People, Process and Policy, vol. 8 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Book part
Publication date: 16 December 2009

Nilufer Narli

The EU harmonisation has created changes in the military's formal and informal influence in the directions of decreased formal and informal military influence in civilian…

Abstract

The EU harmonisation has created changes in the military's formal and informal influence in the directions of decreased formal and informal military influence in civilian politics. The EU reforms have created changes in the mindset of the citizens, by creating changes in the security culture of the citizens and in the civil-military related political culture. The desired level of alignment has not been reached. Therefore, the study examines the areas where further alignment is required. Moving from Rebecca L. Schiff's concordance theory, the article examines the relationship between the Turkish military, the civilian politics and the society before and after the EU harmonisation process. It examines the effects of the EU harmonisation process on the changes in the civil-military balance of power, and on the related security culture and political values. The analysis focuses on: (i) increased civilian control and consequent changes in the policy of accountability; (ii) transparency building in the defence sector; (iii) parliamentary oversight; and (iv) the change in the political culture related to the civil-military issues. It also investigates the extent the EU harmonisation has achieved in building democratic civil-military relations in order to align with the EU standards.

Details

Advances in Military Sociology: Essays in Honor of Charles C. Moskos
Type: Book
ISBN: 978-1-84855-893-9

Article
Publication date: 1 June 2003

Joanna Kruczalak‐Jankowska and Kazimerz Kruczalak

The main purpose of this paper is to approach the legal problems of mass privatisation in Poland. The authors present the structure of national investment funds which intend to be…

Abstract

The main purpose of this paper is to approach the legal problems of mass privatisation in Poland. The authors present the structure of national investment funds which intend to be the experimental financial intermediaries in Poland. Their assets are quoted on the Stock Exchange in Warsaw from the beginning of May 1997. New and controversial roles of management firms are discussed in this paper.

Details

Journal of Economic Studies, vol. 30 no. 3/4
Type: Research Article
ISSN: 0144-3585

Keywords

1 – 10 of over 84000