Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
698,953 result(s) for "security policy"
Sort by:
Cybersecurity public policy : SWOT analysis conducted on 43 countries
\"This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy. This book seeks to become the gateway to understanding what approaches can best serve the needs of the public and private sector, educating the public, and partnering with governments, parliaments, ministries, and cybersecurity public policy analysts, to help mitigate vulnerabilities currently woven into public and private sector information systems, software, hardware, and web interface applications relied upon for daily business activities\"-- Provided by publisher.
States, Citizens and the Privatisation of Security
Recent years have seen a growing role for private military contractors in national and international security. To understand the reasons for this, Elke Krahmann examines changing models of the state, the citizen and the soldier in the UK, the US and Germany. She focuses on both the national differences with regard to the outsourcing of military services to private companies and their specific consequences for the democratic control over the legitimate use of armed force. Tracing developments and debates from the late eighteenth century to the present, she explains the transition from the centralized warfare state of the Cold War era to the privatized and fragmented security governance, and the different national attitudes to the privatization of force.
Everyday security threats
Everyday security threats explores public perceptions of security threats in contemporary Britain, using data from extensive fieldwork and drawing on perspectives from International Relations, security studies and political psychology.
The Routledge Handbook of European Security Law and Policy
The Routledge Handbook of European Security Law and Policy offers a holistic discussion of the contemporary challenges to the security of the European Union and emphasizes the complexity of dealing with these through legislation and policy. Considering security from a human perspective, the book opens with a general introduction to the key issues in European Security Law and Policy before delving into three main areas. Institutions, policies and mechanisms used by Security, Defence Policy and Internal Affairs form the conceptual framework of the book; at the same time, an extensive analysis of the risks and challenges facing the EU, including threats to human rights and sustainability, as well as the European Union's legal and political response to these challenges, is provided. This Handbook is essential reading for scholars and students of European law, security law, EU law and interdisciplinary legal and political studies.
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements (termed \"security-related stress\" or SRS) and deliberate information security policy (ISP) violations. Results from a survey of 539 employee users suggest that SRS engenders an emotion-focused coping response in the form of moral disengagement from ISP violations, which in turn increases one's susceptibility to this behavior. Our multidimensional view of SRS-comprised of security-related overload, complexity, and uncertainty-offers a new perspective on the workplace environment factors that foster noncompliant user behavior and inspire cognitive rationalizations of such behavior. The study extends technostress research to the information systems security domain and provides a theoretical framework for the influence of SRS on user behavior. For practitioners, the results highlight the incidence of SRS in organizations and suggest potential mechanisms to counter the stressful effects of information security requirements.
Cyber Security Meets National Security
Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.