Search results

1 – 10 of over 110000

Abstract

Details

Environmental Security in Greece
Type: Book
ISBN: 978-1-80071-360-4

Book part
Publication date: 30 June 2004

Georges A. Tanguay and Marie-Christine Therrien

We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and…

Abstract

We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the United States. Next, we discuss the options of status quo and adoption of a common security perimeter relative to sovereignty and security. We show that efficient border policies could require cooperation among countries but motivating such collaboration may be difficult since joint border security policies may involve a prisoners’ dilemma problem. On the other hand, we show that the likelihood of joint increased security will be higher if there are country-specific benefits for a country improving security at its border. If this is the case, we demonstrate it is possible to reach optimal security using independent border policies.

Details

North American Economic and Financial Integration
Type: Book
ISBN: 978-0-76231-094-4

Book part
Publication date: 15 October 2005

Michael D. Intriligator

The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a…

Abstract

The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role in contributing to global security or it can play a major role in undermining global security. The next section will present an interpretation of the nature of global security, followed by a discussion of recent changes in the global situation. Next, the current position of Russia in the global system and how that position has changed will be considered. Finally, the global security agenda and the contribution that Russia can make to this agenda will be examined. It will be shown that Russia can play a major role in the achievement of global security.

Details

Eurasia
Type: Book
ISBN: 978-1-84950-011-1

Article
Publication date: 17 May 2022

Hawi Gemechu Dinegde, Adugna Eneyew Bekele and Akalu Dafisa Sima

Ethiopia suffers from structural food insecurity due to its low food production, low purchasing power, and climatic shocks such as drought. Coffee is Ethiopia's primary…

Abstract

Purpose

Ethiopia suffers from structural food insecurity due to its low food production, low purchasing power, and climatic shocks such as drought. Coffee is Ethiopia's primary source of foreign earnings, and 95% of it is produced by smallholder farmers. Coffee also provide better income to smallholder farmers than other crops. However, it is unclear how much smallholder coffee producers participate in cash savings and if their savings help them attain food security. In this study, the authors aim to assess the impact of cash savings on the food security of smallholder coffee farmers in Ethiopia.

Design/methodology/approach

Using cross-sectional quantitative data from 336 randomly selected households and qualitative data from the local community, this study examines the impact of cash savings on household food security. Logistic regression and propensity score matching models were used to analyze the impact of cash savings on households' food security.

Findings

About, 43.5% of coffee farmers did not participate in cash savings during the study period, while 50.6% had no access to credit. The major factors that limit households' likelihood of participating in cash saving were the gender of household head and family size. Approximately, 38.4 and 27.1% of coffee farmers were food poor based on calorie intake and consumption scores, respectively. Households' participation in saving increases their ability to meet dietary energy requirements and consume diverse foods.

Originality/value

To the knowledge of the author, empirical studies that examined the impact of cash saving on the food security status of smallholder farmers in the study area are limited. Therefore, this study brings original contribution and fills research gap on coffee farmers' cash saving and food security; that received little attention from previous researchers in Ethiopia.

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 18 June 2021

Holly Smith

To explain how the U.S. Securities and Exchange Commission (SEC), in its Digital Asset Securities Release, issued on December 23, 2020, laid out its vision for how…

Abstract

Purpose

To explain how the U.S. Securities and Exchange Commission (SEC), in its Digital Asset Securities Release, issued on December 23, 2020, laid out its vision for how broker-dealers can comply with the custody requirements of Rule 15c3-3 under the Exchange Act (the Customer Protection Rule) for investments in digital asset securities.

Design/Methodology/Approach

Explains the current regulatory uncertainty for broker-dealers doing a business in digital asset securities and developing systems and procedures that result in compliance with the custody requirements of the Customer Protection Rule; seven minimum steps that broker-dealers can take and nine terms and conditions with which they can comply to protect against SEC enforcement action; and the SEC’s request for comment in response to its position statement.

Findings

A broker-dealer operating pursuant to the terms and conditions of the position statement articulated in the Release will not be subject to SEC enforcement action on the basis that the broker-dealer deems itself to have obtained and maintained physical possession or control of customer fully paid and excess margin digital asset securities for the purposes of paragraph (b)(1) of the Customer Protection Rule.

Originality/Value

Practical guidance from experienced financial services, broker-dealer and securities lawyer.

Open Access
Article
Publication date: 4 April 2022

Nelson Chanza and Walter Musakwa

Against a milieu of fragmented research that documents indigenous practices related to food security, and the heterogeneous settings from which the studies have been…

Abstract

Purpose

Against a milieu of fragmented research that documents indigenous practices related to food security, and the heterogeneous settings from which the studies have been conducted, this study aims to synthesize the evidence of indigenous knowledge-food security nexus to strengthen the call for the revitalization of indigenous knowledge (IK) as part of the mechanisms to manage food security challenges being aggravated by climate change.

Design/methodology/approach

Drawing on insights from sub-Saharan Africa (SSA), this study reviews 122 articles accessed from the Web of Science and Scopus databases, which covered indigenous methods used for producing, gathering, processing, preserving and storing diverse food sources that indigenous people deploy in securing their food systems.

Findings

The surge in attention to focus on IK-food security nexus tends to be influenced by the growing acknowledgement of climate change impacts on food systems. Essentially, the IK-based practices adopted address all the four food security pillars that are specified by the Food and Agricultural Organization (FAO) as availability, accessibility, utilization and stability. The main motivation behind the continued use of IK-based ways relates largely to the interest to be food secure against climatic shocks and partly to the desire to maintain people’s food cultures and food sovereignty.

Originality/value

This study deploys the food security pillars provided by the FAO (2012) to demonstrate that IK-based ways of food management are capable of addressing all the four food security dimensions, a critical observation toward revitalizing IK in managing growing food security challenges that are intensified by climate change in SSA.

Details

International Journal of Climate Change Strategies and Management, vol. 14 no. 3
Type: Research Article
ISSN: 1756-8692

Keywords

Article
Publication date: 27 April 2022

Noran Shafik Fouad

The education sector is increasingly targeted by malicious cyber incidents, resulting in huge financial losses, cancelation of classes and exams and large-scale breaches…

Abstract

Purpose

The education sector is increasingly targeted by malicious cyber incidents, resulting in huge financial losses, cancelation of classes and exams and large-scale breaches of students’ and staff’s data. This paper aims to investigate education technology (EdTech) vendors’ responsibility for this cyber (in)security challenge, with a particular focus on EdTech in India as a case study.

Design/methodology/approach

Theoretically, building on the security economics literature, the paper establishes a link between the dynamics of the EdTech market and the education sector’s cyber insecurities and investigates the various economic barriers that stand in the way of improving EdTech vendors’ security practices. Empirically, the paper analyses publicly reported cyber incidents targeting the Indian education sector and EdTech companies in the past 10 years as published in newspapers, using the LexisNexis database. It also examines existing EdTech procurement challenges in India and elsewhere and develops a number of policy recommendations to address the misaligned incentives and information asymmetries between EdTech vendors and educational institutions.

Findings

Market forces alone cannot create sufficient incentives for EdTech vendors to prioritise security in product design. Considering the infant stage of the EdTech industry, the lack of evidence about the efficacy of EdTech tools, the fragmentation in the EdTech market and the peculiarities of educational institutions as end-users, a regulatorily and policy intervention is needed to secure education through procurement processes.

Originality/value

This paper introduces a novel exploration to the cybersecurity challenge in the education sector, an area of research and policy analysis that remains largely understudied. By adding a cybersecurity angle, the paper also contributes to the literature using a political economy approach in scrutinising EdTech.

Details

Digital Policy, Regulation and Governance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 26 October 2020

Dejan Kosutic and Federico Pigni

The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is…

Abstract

Purpose

The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is achieved by explaining the relationship between cybersecurity and competitive advantage.

Design/methodology/approach

The impact of cybersecurity on competitive advantage was explored through a qualitative research study – the authors conducted an extensive literature review and conducted two rounds of semi-structured interviews with executives and security professionals from companies in four countries, from the financial, IT and security industries.

Findings

The analysis of the findings enabled the conceptualization of the Cybersecurity Competitive Advantage Model that explains how to build up cybersecurity dynamic capabilities to achieve long-term competitive advantage.

Research limitations/implications

The research presents the theorization of the model based on an extensive literature review, gathered information, insight from qualified respondents and the authors’ experience in the field. While we controlled for saturation and rigorously collected and analyzed the data, the inductive approach followed may limit the generalizability of the findings.

Practical implications

The proposed model helps explain to executives how to differentiate their company in a novel way and how to retain that competitive advantage; security professionals can use the model to organize cybersecurity and communicate to their superiors more effectively.

Originality/value

The presented model differs from existing literature, cybersecurity frameworks and industry standards by presenting a method of avoiding technological bias and for achieving competitive advantage.

Article
Publication date: 26 November 2020

TieCheng Yang, Yang Chen, Scarlett Zhang, Virginia Qiao, Zhenyu Wang and Shuozhu Zheng

To introduce the Securities Law of the People's Republic of China (the “Securities Law 2019”) revised on 28 December 2019, and provide a detailed analysis on its key…

Abstract

Purpose

To introduce the Securities Law of the People's Republic of China (the “Securities Law 2019”) revised on 28 December 2019, and provide a detailed analysis on its key implications to the securities regulatory regime and market activities, especially securities issuance and trading activities in China.

Design/methodology/approach

This article starts from a historical overview of the Securities Law and its several revisions and amendments, highlights the notable core revisions in the Securities Law 2019, analyzes the key legal and regulatory impacts to the securities-related activities and market players, and finally, provides an outlook to the future developments of securities regulatory regime in conformity with the Securities Law 2019.

Findings

This article concludes that the revisions made to the Securities Law 2019 cover a broad range of issues including the issuance and trading of securities, acquisition of a listed company, information disclosure, securities registration and settlement, etc. Such revisions to the Securities Law will lead to far-reaching and profound implications on the securities regulatory system and industry practice in China.

Practical implications

The Securities Law 2019 attracts broad attention from securities market players as well as relevant professionals of the industry, including securities lawyers. As this is a novel and hot topic within the industry, it is important for securities lawyers to keep on track.

Originality/value

High-level guidance from experienced lawyers in the Capital Markets and Financial Regulation practices.

Details

Journal of Investment Compliance, vol. 22 no. 1
Type: Research Article
ISSN: 1528-5812

Keywords

1 – 10 of over 110000