Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
698,953
result(s) for
"security policy"
Sort by:
Cybersecurity public policy : SWOT analysis conducted on 43 countries
\"This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy. This book seeks to become the gateway to understanding what approaches can best serve the needs of the public and private sector, educating the public, and partnering with governments, parliaments, ministries, and cybersecurity public policy analysts, to help mitigate vulnerabilities currently woven into public and private sector information systems, software, hardware, and web interface applications relied upon for daily business activities\"-- Provided by publisher.
States, Citizens and the Privatisation of Security
by
Krahmann, Elke
in
Civil-military relations
,
Civil-military relations -- Case studies
,
Contracting out
2010,2011
Recent years have seen a growing role for private military contractors in national and international security. To understand the reasons for this, Elke Krahmann examines changing models of the state, the citizen and the soldier in the UK, the US and Germany. She focuses on both the national differences with regard to the outsourcing of military services to private companies and their specific consequences for the democratic control over the legitimate use of armed force. Tracing developments and debates from the late eighteenth century to the present, she explains the transition from the centralized warfare state of the Cold War era to the privatized and fragmented security governance, and the different national attitudes to the privatization of force.
Everyday security threats
by
Daniel Stevens
,
Nick Vaughan-Williams
in
Conflict & Peace 2018
,
International security studies
,
manchesterhive variable pricing textbooks
2016,2023
Everyday security threats explores public perceptions of security threats in contemporary Britain, using data from extensive fieldwork and drawing on perspectives from International Relations, security studies and political psychology.
The Routledge Handbook of European Security Law and Policy
by
Scopelliti, Marzia
,
Yaneva, Zhaklin V.
in
Brexit
,
Climate Change
,
competition for common goods
2020,2019
The Routledge Handbook of European Security Law and Policy offers a holistic discussion of the contemporary challenges to the security of the European Union and emphasizes the complexity of dealing with these through legislation and policy.
Considering security from a human perspective, the book opens with a general introduction to the key issues in European Security Law and Policy before delving into three main areas. Institutions, policies and mechanisms used by Security, Defence Policy and Internal Affairs form the conceptual framework of the book; at the same time, an extensive analysis of the risks and challenges facing the EU, including threats to human rights and sustainability, as well as the European Union's legal and political response to these challenges, is provided.
This Handbook is essential reading for scholars and students of European law, security law, EU law and interdisciplinary legal and political studies.
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
by
Shoss, Mindy K.
,
D'Arcy, John
,
Herath, Tejaswini
in
Ambiguity
,
Behavior
,
Cognitive-behavioral factors
2014
We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements (termed \"security-related stress\" or SRS) and deliberate information security policy (ISP) violations. Results from a survey of 539 employee users suggest that SRS engenders an emotion-focused coping response in the form of moral disengagement from ISP violations, which in turn increases one's susceptibility to this behavior. Our multidimensional view of SRS-comprised of security-related overload, complexity, and uncertainty-offers a new perspective on the workplace environment factors that foster noncompliant user behavior and inspire cognitive rationalizations of such behavior. The study extends technostress research to the information systems security domain and provides a theoretical framework for the influence of SRS on user behavior. For practitioners, the results highlight the incidence of SRS in organizations and suggest potential mechanisms to counter the stressful effects of information security requirements.
Journal Article
Cyber Security Meets National Security
2023,2022
Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.